• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

ICT and special needs Stephen Hawking

Extracts from this document...

Introduction

Stephen Hawking – Physicist

Stephen Hawking was born on January 8th 1942. His parents’ house was situated in North London, but during the Second World War, which commenced in 1939, his parents re-located to the city of Oxford due to safety fears in London. At this time, Oxford was considered to be one of, if not the safest place in England to have babies. Stephen was born in Oxford, and he lived there with his parents for the first eight years of his life. It was at this point that he moved back down to London to an area about 20 miles away from where he first lived. It was at eleven years of age that Stephen went to St Albans School, and then on to University College in Oxford. This college in Oxford was the college where his father used to go in his schooling days. Stephen initially went there to study mathematics, a subject he thoroughly enjoyed but his father wanted otherwise. He then ended up studying physics, as mathematics was not available at the University College.

        Stephen then went on to Cambridge University to study Cosmology, the metaphysical study of the origin and nature of the universe. After gaining a PhD in this subject, he became a Research Fellow, and a Professorial Fellow at Gonville and Caius College.

...read more.

Middle

wheelchair is operated by Hawking manually through a single switch, which, along with programs called Equalizer and EZKeys, allows him to talk; compose speeches, research papers, and books; browse the World Wide Web; write e-mail; and perform most other computer tasks. The system also uses radio transmission to provide control over doors, lights, and lifts at his home and office.

Personal use.

        At home, Stephen Hawking watches television like many other people do in their spare time. In order for him to change the channels on the television set via the remote control, he has got a computer system, with many peripherals attached to it. However, these peripherals are not conventional, but have been specially made for his special needs. One of these peripherals is a universal infrared remote control. This enables him to operate many electronic items around the home, such as, televisions, video and DVD players and music centres. Another one of these peripherals that he has got attached to his computer is a radio-controlled device, which enables him to open doors, and lights around his home.

Social use.

        As Stephen is a world famous Physicist, it is essential for him to have contact with the outside world. This is where his telephone comes in. He can either use his mobile phone, or connect his chair computer directly to a telephone socket on the wall.

...read more.

Conclusion

Evaluation Comment – Work Life.

        Stephen’s wheel chair plays a huge part in his working life, and his computer also meets his working life needs greatly. He can do his work at home or while he is on the go because of the mobile Internet capability on his chair. Without his computer, Stephen wouldn’t be able to do any work what so ever, because of his illness. As he is a lecturer, it is vital that he prepares lecturers before hand, and enters them into his speech synthesizer, which enables his to give his lecture. This speech synthesizer plays a huge part in his working life because if he didn’t have it, he couldn’t give a lecture. The switch on his wheel chair also plays a vital part of his working life because it controls the cursor on his computer, letting him choose what words he wants to select for his everyday speech, or lecture. This technology is vital for Stephen because of his special needs. As he has restricted movement in his limbs, he cannot write out, or present his lectures, so he relies on his computer and speech synthesizer greatly.

Scott Adshead.                               Page                                          08/05/2007

...read more.

This student written piece of work is one of many that can be found in our University Degree Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related University Degree Computer Science essays

  1. Do we now live in a 'surveillance' society?

    since September 11th this has occurred in terms of race - particularly Arabs (www.socresonline.org.uk). In some countries 'Arab' and 'Muslim' minorities are extremely targeted by these methods. Other higher risk categories e.g. sex offenders are tracked and monitored, also the new American legislation requiring airline companies to inform the government

  2. Information systems development literature review. Since the 1960s Methodologies, Frameworks, Approaches and CASE ...

    Topic: The Soft Information Systems and Technologies Methodology (SISTem): A Contingency Approach to Integrated Decision Making and Development Reference: Akinson, C.J. (2000). The Soft Information Systems and Technologies Methodology (SISTem): A Contingency Approach to Integrated Decision Making and Development.

  1. Methods and technology used in Computer Forensics

    3.1.2 Integrated Configurations (Forensic Workstations) FRED (Forensic Recovery of Evidence Device) For the purpose of discussing integrated hardware configurations used in computer forensics, I will be taking the Digital Information's line of devices known as FRED, as an example case study.

  2. The purpose of this project is to discuss the issues associated with the deployment ...

    In the following section the pieces of the application code will be shown. The below code is for the Index.html file which is the welcome screen. <?xml version="1.0" encoding="iso-8859-1"?> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head> <title> Welcome</title> <meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1" /> </head> <body text="#000000"

  1. The project explains various algorithms that are exercised to recognize the characters present on ...

    == 2 ) + ((a & 0x0001)== 1) ; match_percentage4 = ((16 - result_match)*100)/16 ; } match_percentage = (match_percentage1 + match_percentage2 + match_percentage3 + match_percentage4)/4; if (highest_percentage < match_percentage) { highest_percentage = match_percentage; mapping_quadrant[x] = tt; mapping_percentile[x] = highest_percentage; } else { } tt = tt + 1; } } } for (int i = 0; i < total_nos; i ++)

  2. Database projects in MS Access.

    This isn't important! You can show, by including the original designs (annotated, in the appendices) how your project has progressed. 6. Other Issues Some, if not all, of the data in your application is going to be commercially sensitive. Assigning passwords and/or security levels allows you to control who sees what in your application.

  1. What are Computer Viruses & what types of viruses are there?

    identity so the general public will take on a false impression of the writer. The realistic scenario is that most virus writers are normal people with normal lifestyles and they often do not write codes for malicious purposes. Virus writers come from different age groups, backgrounds, and countries.

  2. Development of an Online Lecturer Assessment System

    * Create a WBS to know whether the project is feasible and also to keep track of the project development. (Having time as constrain). * Identify a suitable work model to use for this project. Waterfall model, spiral model, v model as example * Identify the most convenient way to

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work