M.17 Migrate To New Technology
M.17 Migrate To New Technology
Comprehensive Nursing
Level IV
1|Page
LEARNING GUIDE #01
Unit of Competence: Migrate to new technology
Title : Migrating to new technology
Learning Activities
1. Read the information written in the “Information Sheets”.
2. If you earned a satisfactory evaluation proceed to next module. However, if
your rating is unsatisfactory, see your teacher for further instructions.
3. Read the “Operation Sheet” and try to understand the procedures discussed.
4. Practice the steps or procedures as illustrated in the operation sheet. Go to
your teacher if you need clarification or you want answers to your questions
or you need assistance in understanding a particular step or procedure.
2|Page
Apply existing knowledge and techniques to technology transfer
Information Sheet – 1
After completing this chapter (LO), the student should be able to:
1. Identify of existing situation for developing new idea.
2. Know methods of upgrading technology skill.
3. Understand methods of identifying and using upgraded equipment.
3|Page
You may also consider approaching someone who has the skills you want to
develop and asking them to mentor or coach you.
4|Page
Managerial skills
It is important that the IT professional be conversant in managerial and design
skills so that new technology is chosen and implemented in line with business
objectives.
Storage devices
5|Page
Computer data storage, often called storage or memory, refers to
computer components and recording media that retain digital data. Data
storage is one of the core functions and fundamental components of
computers.
communications equipment
Communication equipment - facility consisting of the physical plants and
equipment for disseminating information
6|Page
familiarize themselves with the equipment and then pass this knowledge onto
the relevant staff of the organization. Different organizations have varying
procedures for this process. Some may be quite rigorous, involving filling in
paperwork to ensure that warranties/guarantees are kept valid.
7|Page
thin panel, while older monitors use a cathode ray tube about as deep as the
screen size.
Modem is a device that allows computer information to be
transmitted and received over a telephone line Modems are most commonly used
to connect to the Internet.
A modem is a peripheral device that enables computers to communicate with
each other over conventional telephone lines
The word modem comes from combining the words MOdulator and DEModulator.
It converts digital information to analog by Modulating it on the sending end and
Demodulating the analog information into digital information at the receiving end.
Other Connectivity devices
The majority of external peripheral devices connect to the back of the computer’s
system unit with cables. The computer’s system unit has a variety of ports
available for use by different peripheral device cables. A port is a socket that is
used to connect the cables from peripheral devices to the computer.
Printer
In computing, a printer is a peripheral which produces a text and/or graphics of
documents stored in electronic form, usually on physical print media such as
paper or transparencies. Many printers are primarily used as local peripherals,
and are attached by a printer cable or, in most newer printers, a USB cable to a
computer which serves as a document source.
Digital subscriber line (DSL) modem is a device used to connect
a computer or router to a telephone line which has the digital subscriber
line service configured, to allow the computer to connect to the Internet. Put
simply, a DSL modem or DSL router is what is needed in order to connect to DSL
broadband.
8|Page
Switch
In networks, a device that filters and forwards packets between LAN segments.
Switches operate at the data link layer (layer 2) and sometimes the network
layer (layer 3) of the OSI Reference Model and therefore support any packet
protocol. LANs that use switches to join segments are called switched LANs or, in
the case of Ethernet networks, switched Ethernet LANs.
Hub
A common connection point for devices in a network. Hubs are commonly used to
connect segments of a LAN. A hub contains multiple ports. When a packet arrives
at one port, it is copied to the other ports so that all segments of the LAN can see
all packets.
9|Page
Self-Check LO-1 Written Test
Matching
__1. Hardware A) is a high end micro computer designed for technical or scientific application
__4. Hub D) a device that allows computer information to be transmitted & received over a telephone line
__5. Work station E) a common connection point for devices in a net work
Score = ___________
Rating: ____________
10 | P a g e
Name: _________________________ Date: _______________
2. C) Net works
Matching
1. B
2. C
3. D
4. E
5. A
11 | P a g e
Araya Kahsu Health Science College
Learning Activities
1. Read the information written in the “Information Sheets”.
2. If you earned a satisfactory evaluation proceed to next module. However, if
your rating is unsatisfactory, see your teacher for further instructions.
3. Read the “Operation Sheet” and try to understand the procedures discussed.
4. Practice the steps or procedures as illustrated in the operation sheet. Go to
your teacher if you need clarification or you want answers to your questions or
you need assistance in understanding a particular step or procedure.
13 | P a g e
Apply functions of technology to assist in solving
Information Sheet– 2
organizational problems
14 | P a g e
systems, APUs, gas turbine engine fuel nozzle testing, and gas turbine engine
air flow and vacuum leakage testing.
Customers that have upgraded their legacy equipment have received the
following benefits:
Automation
Flexibility for in cell testing
Zero changeover downtime
SPC software
Condition based monitoring
Automated email alerts warning of potential issues
More user friendly interfaces
More ergonomic footprint
Lower energy costs
and much more
Contact a HABCO representative today to discuss your system upgrade.
15 | P a g e
variations, both of which describe a DPRAM which provides exactly 2 ports,
allowing 2 separate electronic components (such as 2 CPUs) access to every
memory location on the DPRAM.
Variation 1
When CPU 1 issues a test-and-set instruction, the DPRAM first makes an
"internal note" of this by storing the address of the memory location in a special
place. If at this point, CPU 2 happens to issue a test-and-set instruction for the
same memory location, the DPRAM first checks its "internal note", recognizes
the situation, and issues a BUSY interrupt, which tells CPU 2 that it must wait
and retry. This is an implementation of a busy waiting or spinlock using the
interrupt mechanism. Since this all happens at hardware speeds, CPU 2's wait
to get out of the spin-lock is very short.
Whether or not CPU 2 was trying to access the memory location, the DPRAM
performs the test given by CPU 1. If the test succeeds, the DPRAM sets the
memory location to the value given by CPU 1. Then the DPRAM wipes out its
"internal note" that CPU 1 was writing there. At this point, CPU 2 could issue a
test-and-set, which would succeed.
Variation 2
CPU 1 issues a test-and-set instruction to write to "memory location A". The
DPRAM does not immediately store the value in memory location A, but instead
simultaneously moves the current value to a special register, while setting the
contents of memory location A to a special "flag value". If at this point, CPU 2
issues a test-and-set to memory location A, the DPRAM detects the special flag
value, and as in Variation 1, issues a BUSY interrupt.
Whether or not CPU 2 was trying to access the memory location, the DPRAM
now performs CPU 1's test. If the test succeeds, the DPRAM sets memory
location A to the value specified by CPU 1. If the test fails, the DPRAM copies
the value back from the special register to memory location A. Either operation
16 | P a g e
wipes out the special flag value. If CPU 2 now issues a test-and-set, it will
succeed.
Transfer Speed
Data transfer rates vary on GBIC module model specifications, but they have a
minimum of 1 gigabit per second. Manufacturers, such as Cisco, make GBIC
modules with varying transfer speeds.
Uses
A GBIC module allows a user to reconfigure fiber links, configure tailor receiver
costs, link networking distances and organize network topologies based on set
requirements. Used on a fiber optic or an Ethernet system, GBIC modules can
be upgraded, swapped out or plugged in without turning off the computer. This
flexibility eliminates the need to replace entire system networking boards.
17 | P a g e
Commercial software, or sometimes payware, is computer software that
is produced for sale or that serves commercial purposes.
All or parts of software packages and services that support commerce are
increasingly made available as free software[citation needed].
organization-specific software
Software which are used only for specific purposes are called specific
purpose application software. For example, accounting software (like Tally,
Busy, etc.), custom made software (like payroll, billing, reservation, etc.).
Word processing
A word processing program (such as Microsoft Word) allows you to
produce letters, memos, etc., easily. You can easily mail merge a list of
names and addresses to produce mass mailers, individually addressed to
customers or subscribers.
Spreadsheets
A spreadsheet program (such as Microsoft Excel) allows you to work out a
company’s income, expenditure and then calculate the balance. It enables
you to make ‘what if ’ type projections of how the company will fair in the
future and to forecast how changes in prices will affect profits.
Databases
A database program (such as Microsoft Access) allows you to compile
information and then to search this information to extract just the
18 | P a g e
information you require. For instance, if you have a database of all the
equipment housed within an office you can very simply produce a report
listing only the equipment above a certain value.
Graphic Presentations
The presentation programs can make giving presentations and using
overheads easier. Other uses include:
Slide Shows
Repeating Computer Presentations on a computer monitor
Using Sound and animation in slide shows
The most recognized graphic presentation programs are Microsoft
PowerPoint and Harvard Graphics.
communication packages
Communication Service
The communication package of SEMPER provides connectivity between modules
in separate entities. The basic communication service is provided by ComPoints.
A ComPoint is an object which allows an application program to access the
underlying communication protocol, e.g., tcp or http. It allows a module to
receive all messages directed to its port. This service is refined by Channels,
which allow the receiving module to specify the correlator of the message that
it is expecting. ComPoint and Channel APIs are based on the synchronous, i.e.
blocking, model.
ComPoints
ComPoint, like socket, is an object which allows an application program to
access the underlying communication protocol. For each supported protocol,
there is class that implements ComPoint. In order to simplify the task of the
application programs, these implementation classes are not a part of API.
Instead, a ComManager class is provided which examines the protocol field in
the desired address and constructs a ComPoint of the corresponding
implementation class. The addresses themselves are defined
19 | P a g e
by ComPointAddress. The constants are defined in ComPointConstants. There
are also ComPointExceptions which are thrown in case of errors, but, for the
sake of simplicity, are not caught in the following code samples.
Note that the Communication Block must be initialized through the init method
of the ComManager class. This init method invokes the corresponding methods
of the classes implementing the communication protocols, currently
ComPointTCP, ComPointHTTP and ComPointMail. The invocation of the init
method of ComPointMail will result in an actual initialization, only if the three
parameters which are used by ComPointMail (see the section on the
configuration parameters below) are set in the configuration file. Otherwise, the
mail protocol may not be used.
20 | P a g e
book.[1] Prior to ISDN, the telephone system was viewed as a way to transport
voice, with some special services available for data. The key feature of ISDN is
that it integrates speech and data on the same lines, adding features that were
not available in the classic telephone system. There are several kinds of access
interfaces to ISDN defined as Basic Rate Interface (BRI), Primary Rate
Interface (PRI) and Broadband ISDN (B-ISDN).
ISDN is a circuit-switched telephone network system, which also provides
access to packet switched networks, designed to allow digital transmission of
voice and data over ordinary telephone copper wires, resulting in potentially
better voice quality than an analog phone can provide. It offers circuit-
switched connections (for either voice or data), and packet-switched
connections (for data), in increments of 64 kilobit/s. A major market
application for ISDN in some countries is Internet access, where ISDN typically
provides a maximum of 128 kbit/s in both upstream and downstream
directions. Channel bonding can achieve a greater data rate; typically the ISDN
B-channels of three or four BRIs (six to eight 64 kbit/s channels) are bonded.
ISDN should not be mistaken for its use with a specific protocol, such
as Q.931 whereby ISDN is employed as the network, data-link and physical
layers in the context of the OSI model. In a broad sense ISDN can be
considered a suite of digital services existing on layers 1, 2, and 3 of the OSI
model. ISDN is designed to provide access to voice and data services
simultaneously.
However, common use reduced ISDN to be limited to Q.931 and related
protocols, which are a set of protocols for establishing and breaking circuit
switched connections, and for advanced calling features for the user. They
were introduced in 1986.[2]
21 | P a g e
Self-Check LO-2 Written Test
You can ask you teacher for the copy of the correct answers.
Score = ___________
Rating: ____________
22 | P a g e
Short Answer Questions
2. Software which are used only for specific purposes are called specific purpose
application software. For example, accounting software (like Tally, Busy, etc.),
custom made software (like payroll, billing, reservation, etc.).
Logo
Community participation and mobilization
Level IV
23 | P a g e
Title: Migrating to new technology
Learning Activities
1. Read the information written in the “Information Sheets”.
2. If you earned a satisfactory evaluation proceed to next module. However, if
your rating is unsatisfactory, see your teacher for further instructions.
3. Read the “Operation Sheet” and try to understand the procedures discussed.
4. Practice the steps or procedures as illustrated in the operation sheet. Go to
your teacher if you need clarification or you want answers to your questions or
you need assistance in understanding a particular step or proce
24 | P a g e
Information Sheet – 1 data collection for business
25 | P a g e
OHS standards May include but not limited to:
correct posture
lighting
type of desk and style of chair
type of monitor
typing position
repetitive strain injury prevention
ventilation
light position
correct lifting method, and length of time in front of computer
physical safety considerations such as general electrical safety and cabling
Power supply and leads as they apply to computer and peripheral
installations
26 | P a g e
The performance of equipment should be evaluated. Equipment that no longer
performs to a certain standard should be marked for upgrading or replacement.
Performance can be evaluated in the following areas:
27 | P a g e
Heat produced by product;
28 | P a g e
the apparent need of many organisations to purchase large numbers of
new computers. (It is estimated that 1.8 tons of raw materials are
required to produce the average desktop personal computer and monitor.
Imagine the negative impact of the production on the environment!)
Another major consideration when purchasing new equipment is whether it is
designed with environmental attributes. The environmental responsibility does
not stop there. The users of technology must do so responsibly by using
software and hardware that can reduce wastage as well as minimise printed
material and energy consumption, etc.
29 | P a g e
Gathering feedback
The goal of collecting feedback from users and gathering information from other
sources is to enable the technology committee to assess how well the software
and hardware implementation is satisfying the key usability and performance
indicators.
Sources of information
You can gather data from people, documents, performance data, observation of
events or any other empirical method such as experiments and benchmarking.
Basic feedback gathering methods
The ideal form of feedback gathering is to use a combination of the following
methods depending on time and organisational factors.
Observations, walkthroughs and site visits
These are conducted to get first hand information on performance and usability
features of the system. The internal or external evaluators will observe all
stakeholders using the technology and observe usability and performance
indicators of the system.
Walkthroughs are conducted where an evaluator walks through a certain
feature to assess how the system performs that feature with respect to usability
and performance indicators.
Interviews
Here are some tips for conducting interviews:
Choose stakeholders who would have greater or unique involvement with
the new system.
Communicate the purpose of the interview to the interviewee.
Ask brief questions relevant to performance and usability of the system.
Don’t interrupt.
Be a good listener.
Take notes.
30 | P a g e
Focus groups
These are group interview situations where discussions can take place about
the usability and the performance of the hardware and software. Here are some
tips for conducting focus groups:
Reward the attendees by providing refreshments as this could be a good
motivator.
Start and finish on time.
Be prepared to hear positive and negative comments.
Be prepared with prompting questions to start the discussions about
usability and performance of the system.
Let the participants communicate and listen carefully.
Avoid being defensive.
Listen to all comments.
Engage a note-taker.
Surveys and questionnaires
These are used to gather quantifiable data about the system from a large
number of people. You should make allowances for the low response rate and
the slow response time. Here are some tips for conducting surveys:
State the objective of the survey as evaluating the performance and
usability of the new technology.
Keep the survey to a manageable length.
Use both open-ended and closed questions.
Analysing and processing feedback
All data regardless of how and from where it was collected must be summarised
against the performance and usability indicators so they are more manageable.
In almost all case, both quantitative and qualitative data will be collected and
used.
The performance measurements such as error rates will be quantitative
and will be easy to interpret.
31 | P a g e
Performance measurements such as reliability could be a combination of
qualitative and quantitative data.
Usability indicators could be qualitative or quantitative.
32 | P a g e
Earth sciences
Geological survey, an investigation of the subsurface of the ground to
create a geological map or model
Geophysical survey, the systematic collection of geophysical data for
spatial studies
Soil survey, the mapping of the properties and varieties of soil in a given
area
Hydrographic survey, the gathering of information about navigable waters
for the purposes of safe navigation of vessels
Cave survey, the three-dimensional mapping of underground caverns; the
resulting map is also referred to as a survey
Construction and mining
Construction surveying, the locating of structures relative to a reference
line, used in the construction of buildings, roads, mines, and tunnels
Deviation survey, used in the oil industry to measure a borehole's
departure from the vertical
Archaeology
Archaeological field survey, the collection of information by archaeologists
prior to excavation
Astronomy
Astronomical survey, imaging or mapping regions of the sky
Durchmusterung, a German word for a systematic survey of objects or
data, generally used in astronomy
Redshift survey, an astronomical survey of a section of the sky to
calculate the distance of objects from Earth
Academia
Survey article, a scholarly publication to summarize an area of research
Questionnaires
33 | P a g e
A questionnaire is a series of questions asked to individuals to obtain
statistically useful information about a given topic.[1] When properly
constructed and responsibly administered, questionnaires become a vital
instrument by which statements can be made about specific groups or
people or entire populations.
Questionnaires are frequently used in quantitative marketing
research and social research. They are a valuable method of collecting a
wide range of information from a large number of individuals, often
referred to as respondents. Adequate questionnaire construction is
critical to the success of a survey. Inappropriate questions, incorrect
ordering of questions, incorrect scaling, or bad questionnaire format can
make the survey valueless, as it may not accurately reflect the views and
opinions of the participants. A useful method for checking a questionnaire
and making sure it is accurately capturing the intended information is to
pretest among a smaller subset of target respondents.
34 | P a g e
Self-Check LO-3 Written Test
You can ask you teacher for the copy of the correct answers.
Score = ___________
Rating: ____________
2. A) Energy conservation
35 | P a g e
36 | P a g e