• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Impact of the Computer

Extracts from this document...

Introduction

Impact of the Computer Case Study #1 1. Come up with ten examples of computers in society and, beside each example, describe what happens or would happen if that computer malfunctioned. 1Stock market computers - will affect the economy of the country and other related countries. 2Calculators - will make people calculate themselves so students who are having some math tests will face the hell =) 3Banding machine - will bring wrong products or nothing. 4Elevators - will make people to use stairs. 5Microwave - for melting something frozen, people will put it into hot water or wait it to be melted naturally. 6Air conditioner - will not turn off so make the room really cold or will not work well so it will not make the room cool. 7Room temperature control - will not be able to keep the room in the proper temperature. 8Oven - will make people use fire. 9Electronic dictionary - will make people use paper dictionary. ?Security system at BSS - will make security guard work at every door that need to be secured. 2. Come up with five examples of hidden computers and, beside each example, describe what happens or would happen if that computer malfunctioned. 1Automatic car washer-will make scratches on the car and will not wash the car properly and make people wash their cars with their hands. ...read more.

Middle

Take the rules to their logical extreme consequences. e.g. Following rule 1, would humans be allowed to drive cars or play football? Both activities are potentially dangerous. --> Rule 1 - would humans be allowed to ride and ride on the planes, elevators or trains? If people embark on them, they will just stop. Rule 2 - would human be able to order the robots to do dangerous works instead of human like dealing with strong chemicals or radioactive substances? Rule 3 - if human need to destroy them, how are human going to destroy them? They will not allow people to destroy them. --> In conclusion, Isaac Asimov's rules are not safeguards. Those rules restrict the usage of robots so much that human will not try to use them. What is the point of these rules if human even doesn't use the robots? 3. There are tiny computers hidden in appliances and cars. Would "Robot Rules" have to be built into them? Why? Even without Robot Rules, could such computers/robots turn on humans? What could happen if they did turn on humans? --> I do not think that those rules should be built into them, because in case of cars, the only way to turn on human will be done by destroying themselves, Also, usually tiny computers do simple works, so they will do what they are supposed to do. ...read more.

Conclusion

4. Is the Turing Test enough to decide whether a computer is intelligent, or not? For example, to be considered intelligent, is it enough that a computer can play chess, or should it know that it is playing chess? Is self-awareness a factor? Should it be? --> The Turing Test is not enough to decide whether a computer is intelligent. For example, some people thinks that ELIZA is a real therapist and it seemed that ELIZA passed the Turing Test, but ELIZA even cannot give a single advice to the user. Also, to be considered intelligent, computer should know that it is playing chess. If it even doesn't know what it is doing, it is just a machine not an intelligent computer. Therefore self-awareness is the strongest factor and it should be one of the most important factor that decides whether a computer is intelligent or not. Also if a computer has self-awareness, that would give computer the power to think itself like a living animal (perhaps smarter than human beings). Marking Scheme Knowledge/ Understanding Thinking/ Inquiry Communication Application Case Study #1 - Do Computers Have a Hidden Agenda? 1. 5 5 2. 2.5 2.5 3. 5 4. 3 Case Study #2 - Robot Rules 1. 4 1 2. 1 4 3. 1 6 Case Study #3 - Turing Test 1. 5 2. 5 3. 5 4. 1 4 Total 3 48.5 8.5 Percentages Test Total - out of 60 marks ?? ?? ?? ?? ICS4MI Ms. Shen Case study Sue Hyun Lee ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Peer reviewed

    Networking Diagrams and Case Study

    3 star(s)

    Set up all of the workstations/other required devices in both the store and Head Office. 4. Connect all of the devices in each premises to the router, and each router to the modem (Setting up the LAN). 5. Once both LAN networks have been established, ensure that both are also connected to the internet.

  2. Peer reviewed

    Principles of Computer Networks

    3 star(s)

    This is the maximum jam-time. Since the time a data station transmits a jam signal it has to wait before it can send that frame again. CSMA performance is increase by using Collision Detection. When a collision is detected Collision detection will terminate the transmission and this will also stop the probability of second collision on retry.

  1. Peer reviewed

    HCI shortened for Human Computer Interaction is the study of the human and computer ...

    3 star(s)

    It allows you to call other people using face time and there are downloadable app available, either educational, social or for personal use. Impact it has on economy; The iphone has impacted economy is many ways, one of which, many people, spend a huge amount of capital just to purchase the phone.

  2. The impact of the availability of electric information on individuals and society

    It has many advantages against simple paper mails, because it's only a matter of seconds to send someone a message or to receive it; it also costs much less. According to NY Times the reason why video conferences, e-mails and intranet are getting more popular within non-public organisations is that

  1. GCSE I.T Security Case Study - Riverside Leisure Centre

    Or * Add a password to the encryption process so that the next user has to know the password to activate the encrypter or decoder. Back-Up Disks Another way to insure that the data on Riverside's computer system is secure is to make back up disks of everything on the computer.

  2. Smart Card System

    authorized user may have to get the output at the server in order to make decision. The output has to be produced on time in order to allow the user to make any necessary decision on a critical situation. The designing of this kind of output is very important in output design.

  1. Feasibility Study.

    of: * The date the script was received * The date the script was remarked Entity Relationship Diagram The attributes to be considered for the Grade Boundaries entity are: * Subject Reference Code * Grade Boundaries for grades A-E and U What procedures will be required to achieve the desired outputs?

  2. Flexible Architectures in Communication Security Application

    Public-key ciphers (or asymmetric-key ciphers) use a well-known public key to encrypt and require a different private key to decrypt. The process may also be reversed to produce what is known as a digital signature. Digital signatures authenticate the sender.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work