• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Impact of the Computer

Extracts from this document...


Impact of the Computer Case Study #1 1. Come up with ten examples of computers in society and, beside each example, describe what happens or would happen if that computer malfunctioned. 1Stock market computers - will affect the economy of the country and other related countries. 2Calculators - will make people calculate themselves so students who are having some math tests will face the hell =) 3Banding machine - will bring wrong products or nothing. 4Elevators - will make people to use stairs. 5Microwave - for melting something frozen, people will put it into hot water or wait it to be melted naturally. 6Air conditioner - will not turn off so make the room really cold or will not work well so it will not make the room cool. 7Room temperature control - will not be able to keep the room in the proper temperature. 8Oven - will make people use fire. 9Electronic dictionary - will make people use paper dictionary. ?Security system at BSS - will make security guard work at every door that need to be secured. 2. Come up with five examples of hidden computers and, beside each example, describe what happens or would happen if that computer malfunctioned. 1Automatic car washer-will make scratches on the car and will not wash the car properly and make people wash their cars with their hands. ...read more.


Take the rules to their logical extreme consequences. e.g. Following rule 1, would humans be allowed to drive cars or play football? Both activities are potentially dangerous. --> Rule 1 - would humans be allowed to ride and ride on the planes, elevators or trains? If people embark on them, they will just stop. Rule 2 - would human be able to order the robots to do dangerous works instead of human like dealing with strong chemicals or radioactive substances? Rule 3 - if human need to destroy them, how are human going to destroy them? They will not allow people to destroy them. --> In conclusion, Isaac Asimov's rules are not safeguards. Those rules restrict the usage of robots so much that human will not try to use them. What is the point of these rules if human even doesn't use the robots? 3. There are tiny computers hidden in appliances and cars. Would "Robot Rules" have to be built into them? Why? Even without Robot Rules, could such computers/robots turn on humans? What could happen if they did turn on humans? --> I do not think that those rules should be built into them, because in case of cars, the only way to turn on human will be done by destroying themselves, Also, usually tiny computers do simple works, so they will do what they are supposed to do. ...read more.


4. Is the Turing Test enough to decide whether a computer is intelligent, or not? For example, to be considered intelligent, is it enough that a computer can play chess, or should it know that it is playing chess? Is self-awareness a factor? Should it be? --> The Turing Test is not enough to decide whether a computer is intelligent. For example, some people thinks that ELIZA is a real therapist and it seemed that ELIZA passed the Turing Test, but ELIZA even cannot give a single advice to the user. Also, to be considered intelligent, computer should know that it is playing chess. If it even doesn't know what it is doing, it is just a machine not an intelligent computer. Therefore self-awareness is the strongest factor and it should be one of the most important factor that decides whether a computer is intelligent or not. Also if a computer has self-awareness, that would give computer the power to think itself like a living animal (perhaps smarter than human beings). Marking Scheme Knowledge/ Understanding Thinking/ Inquiry Communication Application Case Study #1 - Do Computers Have a Hidden Agenda? 1. 5 5 2. 2.5 2.5 3. 5 4. 3 Case Study #2 - Robot Rules 1. 4 1 2. 1 4 3. 1 6 Case Study #3 - Turing Test 1. 5 2. 5 3. 5 4. 1 4 Total 3 48.5 8.5 Percentages Test Total - out of 60 marks ?? ?? ?? ?? ICS4MI Ms. Shen Case study Sue Hyun Lee ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Peer reviewed

    HCI shortened for Human Computer Interaction is the study of the human and computer ...

    3 star(s)

    Also it has made more people to be more committed to being watchful of their diet and people use it as way of working out, basically having your own gym in your personal inn. P2 - explain the fundamental principles of HCI design Perception; Perception is the way that we see things as an individual.

  2. Peer reviewed

    Networking Diagrams and Case Study

    3 star(s)

    Basically, DingoMobile want a networking solution to connect all of their store(s) and Head Office together, and I?ve explained the majority of this networking solution in the past two parts of this ?report?. An overview of how the new system would be implemented, replacing the old system - 1.

  1. Peer reviewed

    Principles of Computer Networks

    3 star(s)

    the transmitting data station detects that another station is transmitting signal that the first station will transmit a jam signal. Jam signal is used to request other transmission station that it needs to stop transmitting it does this by carrying a 32 bit binary pattern.

  2. GCSE I.T Security Case Study - Riverside Leisure Centre

    Or * Add a password to the encryption process so that the next user has to know the password to activate the encrypter or decoder. Back-Up Disks Another way to insure that the data on Riverside's computer system is secure is to make back up disks of everything on the computer.

  1. Internet pre-History: Ancient Roads of Telecommunications & Computers.

    The key element to the von Neumann architecture was the central processing unit, which allowed all computer functions to be coordinated through a single source. In 1951, the UNIVAC I (Universal Automatic Computer), built by Rand, became one of the first commercially available computers to take advantage of these advances.

  2. Smart Card System

    The following process describes the lock-and-key access operation: 1. A user opens a Telnet session to a border (firewall) router configured for lock-and-key. The user connects via the virtual terminal port on the router. 2. The Cisco IOS software receives the Telnet packet, opens a Telnet session, prompts for a password, and performs a user authentication process.

  1. Flexible Architectures in Communication Security Application

    but at the same time allows the intended recipient to retrieve the original information using a secret key. Cryptographic algorithms (or ciphers, as they are often called) are special programs designed to protect sensitive information on public communication networks. During encryption, ciphers transform the original plaintext message into unintelligible ciphertext.

  2. Creating a computer system for Wooten Basset Rugby Club

    1.4 Data Requirements From the interview it has become apparent that I will need to store a considerable amount of data. I have divided this data into the following groups: Players, Fixtures, Rivals, Rival Players, Players-Fixtures and Rival Players-Fixtures. A primary key will be used in every case to uniquely

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work