• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

ICT and special needs Stephen Hawking

Extracts from this document...


Stephen Hawking - Physicist Stephen Hawking was born on January 8th 1942. His parents' house was situated in North London, but during the Second World War, which commenced in 1939, his parents re-located to the city of Oxford due to safety fears in London. At this time, Oxford was considered to be one of, if not the safest place in England to have babies. Stephen was born in Oxford, and he lived there with his parents for the first eight years of his life. It was at this point that he moved back down to London to an area about 20 miles away from where he first lived. It was at eleven years of age that Stephen went to St Albans School, and then on to University College in Oxford. This college in Oxford was the college where his father used to go in his schooling days. Stephen initially went there to study mathematics, a subject he thoroughly enjoyed but his father wanted otherwise. He then ended up studying physics, as mathematics was not available at the University College. Stephen then went on to Cambridge University to study Cosmology, the metaphysical study of the origin and nature of the universe. After gaining a PhD in this subject, he became a Research Fellow, and a Professorial Fellow at Gonville and Caius College. ...read more.


Social use. As Stephen is a world famous Physicist, it is essential for him to have contact with the outside world. This is where his telephone comes in. He can either use his mobile phone, or connect his chair computer directly to a telephone socket on the wall. The process works by sending digital commands from his computer, instructing the telephone to dial a particular number, answer the ringing phone or hang up at the end of a call. Work Use. Stephen Hawking was given a brand new computer system by major firm Intel. At the time it was fastest, highest specification machine of its type. It was because of the latest Pentium II mobile chip, at 33 MHz. He also has to do a huge amount of E-mailing to all of his associates. He does this by using the digital technology enabled on his computer. The technology allows him to connect to the Internet via the process in the above category, Social Use. He can review, and comment on recently released publications on-line before many other people get to view them. The Computer. Stephen relies on his computer for everything, as his is confined to his wheelchair due to the non-existent movement in his limbs. His computer is a massive help to him, as it helps him in the working environment. ...read more.


He can also see who is calling because the name and number will appear on his computer monitor, situated on the arm of his chair. However, he could also do with a voice-activated phone, which would allow him to call people, without even dialling from his chair. Evaluation Comment - Work Life. Stephen's wheel chair plays a huge part in his working life, and his computer also meets his working life needs greatly. He can do his work at home or while he is on the go because of the mobile Internet capability on his chair. Without his computer, Stephen wouldn't be able to do any work what so ever, because of his illness. As he is a lecturer, it is vital that he prepares lecturers before hand, and enters them into his speech synthesizer, which enables his to give his lecture. This speech synthesizer plays a huge part in his working life because if he didn't have it, he couldn't give a lecture. The switch on his wheel chair also plays a vital part of his working life because it controls the cursor on his computer, letting him choose what words he wants to select for his everyday speech, or lecture. This technology is vital for Stephen because of his special needs. As he has restricted movement in his limbs, he cannot write out, or present his lectures, so he relies on his computer and speech synthesizer greatly. ?? ?? ?? ?? Scott Adshead. Page 1 08/05/2007 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our University Degree Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related University Degree Computer Science essays

  1. Do we now live in a 'surveillance' society?

    Whether we now live in a surveillance society depends on which time periods are compared, i.e. comparing now with prior September 11th 2001 or much earlier e.g. pre-industrialisation. Since September 11th surveillance has intensified across the globe, but did exist the month before, showing how we can only anticipate surveillance to a certain point; it is not comprehensible.

  2. Star College Student Accommodation

    ID,student name,student age and sex where the room type is apartment 4) SQL> select sid,duration,room_no from lease; SID DURATION ROOM_N ----- ---------- ------ 1001 1 Year 101-5 1002 1 Year 101-5 1003 1 Year 101-5 1004 1 Year 101-5 1005 1 Year 101-5 1006 1 Semester 101-4 1007 1 Semester

  1. Information systems development literature review. Since the 1960s Methodologies, Frameworks, Approaches and CASE ...

    Employing this writing style enables the reader to easily understand the information being conveyed. Strengths: Succinct Weaknesses: This paper provides an opinonated view of the methodologies outline. A number of the web references stated are no longer accessible doubting the validity and integrity of the information provided.

  2. What is research?

    Source: http://www.dictionary.com/ Indeed personality can be summarized (though not conclusively by any means) as: 'The quality or condition of being a person. The totality of qualities and traits, as of character or behavior, that is peculiar to a specific person.

  1. Methods and technology used in Computer Forensics

    Altering a disk's HPA (Host Protected Area) and DCO (Device Configuration Overlay) are two methods through which data can be hidden on a hard drive10. The majority of hardware manufacturers incorporate both of these into their disks. HPA sets a hidden partition, or in the case of some vendors, like Dell for example, a recovery partition, which

  2. Database projects in MS Access.

    3.4 Data Descriptions (Data Dictionary) You will need to describe in detail the attributes of every piece of stored data in your system. For each table described above complete a table design sheet - Appendix B. Attention to detail here is particularly important. You receive better marks for showing an appreciation of the importance of

  1. Wireless Local Area Network (WLAN) technology is rapidly becoming a crucial component of computer ...

    the feasibility of the Wireless LAN on 4th floor of Poole House was examined. The performance testing results received during the testing of the IEEE 802.11b Wireless LAN prototype were analysed and compared with the Wired LAN. Although the Wireless LAN is operating at 11Mbps and the Wired LAN at 10Mbps, the performance testing results differ significantly.

  2. Computer Health and Safety

    viii A stable and adjustable document holder should be used if documents are being referred to during typing. The document holder should be at the same distance from the eye and the screen. This will prevent constant change of focus and also enable exchanging glances from the document folder and the screen without frequent movement of the neck and back.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work