Data Modeling Process.

Rapid application development is used in development of software in which case a creation approach is applied. Short development cycle is involved in this process of data modeling. Limited time is used to obtain a functional system in applying this process. There are various processes which are involved in rapid application development. These phases include modeling of data, business modeling, process, generating the application and the resting phase. Data modeling involves determining the information to be analyzed. The generation of data includes determining the person involved in the generation  A functional information system is developed using rapid application development which involves team work.
   
In data modeling, group approach is used in rapid application development. A non existing information system is created in rapid application development. There are various activities and phases which are included in developing a new information system. These include requirements planning, user design, the construction phase and the cutover. During the requirement planning phase, business functions and the scope of the perceived business are obtained. The user design phase includes creation of models which enables user interaction. Prototypes are also formulated at this phase. Integration, coding and testing are effected during the construction stage. The information system may be changed to cover on the business functions.  Users are involved during the various phases. This reduces cost and development time. In rapid application developed an interactive system is obtained.
   
Rapid application development has various advantages and disadvantages. Cost reduction is achieved in creating systems using rapid application development. The involvement of users in every phase ensures reduction of costs. The rapid application development disadvantages include minimal time is required in developing quality systems, the business needs are not well presented. Highly specialized personnel are required to facilitate the completion of a system within the set time frame.
   
Software development makes use of the unified modeling language which makes use of various standards which were devised by the object oriented group. Visual models are created using the methods of graphical notation. The use of graphical notation enables the creation of rigorous systems.  Object oriented software are created using Unified Modeling language which involves modification, specifying, construction, visualization and documentation of the intensive system developed. The visualization is undertaken by considering various elements which includes activities, actors, components, and the statements which are used in the programming language. Unified Modified Language makes use of some techniques which are used in data modeling. This includes the modeling processes which involve object, business and component modeling.

The Unified Modified language is a programming language which various aspects from various techniques such as object modeling, Booch technique and the object oriented technique. This language can be considered as a standard language which can be used for modeling various systems such as distributed and coexisting systems. The Unified modeling language standards has been achieved as a result of various contributions of leaders within the information industry. There are various transformation languages which can be used to aid in transforming the Unified Modified Language.
   
Unified modeling language was devised with the support of several methods object oriented technique and the Booch method. There are various new techniques which have been devised based on the unified modeling language. This is because Unified Modeling Language has undergone some evolution. The various methods which have been devised from Unified Modeling Language include Dynamic Systems techniques and the abstraction technique. A system comprises of diagrams which should be differentiated from the Unified Modeling Language. A diagram can be considered to be a graphical representation which is shown in a system. The diagrams used in Unified Modeling language highlight some views of the system which may either be dynamic or static.
   
Prototypes are created during system development. Dynamic systems Development methods involves prototyping life cycle. Joint Application Design is involved in structuring of the prototypes in dynamic systems. There are various approaches which are involved in Joint Application Design. These include involvement of users in coming up with quality systems. Workshops are organized to bring together different ideas for modification of the system depending on the requirements of the business.

The workshops take on board both IT skilled personal and knowledge workers. To acquire the required information, top management people are involved in devising the system. A new information system may bring about difficulties and differences within the involved participate. This is handled by meeting consensus during the workshops. To eliminate any miscommunication in the new system, the workshop agenda is put forth clearly to ensure there is no misunderstanding between the involved parties. There are major steps which should be followed in having an appropriate Joint Application Development. The new information system attained appeals to the involved parties which include the users and the designers. This joint development of software eliminates miscommunication. The major participants in Joint Application Development include the documentation personnel, the sponsor amongst other participants. The workshops should be well stipulated with the limitations and objectives of the business being well highlighted.
   
There are some advantages and disadvantages in the use of Joint Application design. In the case of a large group, this technique is costly and awkward. The requirement modeling process includes the users. The new system may not face any differences since the users are involved in the designing stage. This technique is vulnerable to conflicts due to the various participants. This sets in the drawback of this technique in developing a new information system.
   
Functional Decomposition Diagram is a software development technique which makes use of the Agile techniques. In the development of software various methods such as agile are incorporated. The Functional Decomposition Diagram process includes blending of some of the well known techniques to enable the creation of a concrete process. The various practices included in the Functional Decomposition Diagram are devised from functional features. Functional software which is timed is attained through Functional Decomposition Technique. There are various basic activities which are involved in Functional Decomposition Diagram Process. The activities involved in developing software are well manned by the use of milestones. A concrete software model is achieved within the first three activities which are carried out.  Iteration occurs for the subsequent activities. The content and the coverage of the system are first highlighted to ensure a good system.

The overall model is attained through various alterations during the execution of the activities. The design process involves some inspection to ensure a functional system. The various practices involved in Functional Decomposition Diagram process include development by feature, Feature teams, Domain Object model. There are also inspection and subsequent which are done on the way to facilitate an efficient system.

Software Requirement Specifications for SDLC.

Operating System
The Operating System used for this application is Windows 2008 Server. It is the most advanced and it is a high secured server operating system. Since it has the new significant features, it deducts the expenditure of running corporate networks, together with Network Access Protection, Server Core, PowerShell and Read Only Domain Controllers. Many accessible components, like IIS, Terminal Services and the file-sharing protocol have also had a detailed renovate.

DBMS used to manage the data
The DBMS used for this application is MS-Access. Microsoft Access offers the users with one of the trouble-free and flexible DBMS solutions in the present market. A plenty of wizards reduce the complication of administrative tasks. Microsofts minimum system requirements must be present in order to load MS-access in a system. The three of the main components of MS-Access that several database users will face - tables, reports, queries, forms, web integration and SQL Server integration.
The Tables permits creating the framework for storing information in a database. Apparently, a database that only stored information would be found useless until there are methods to retrieve information. To retrieve the information stored in a table, Microsoft Access permits to display the table and scroll through the records consists within it. Though, the actual power of a database contains in its capabilities to respond more complicated requests, or questions.The queries of Access give the ability to unite data from several tables and put specific conditions on the data retrieved.

Access also gives user-friendly forms of interface which permits users to provide information in a graphical format and contain that information transparently transfer to the database.The MS-Access is the suitable database mostly in the case of Desktop application. In the case of Microsoft Access we use internally developed applications.

User interface
The user interface is a device to interact users with the application. A user interface provides graphical icons and indicators, text boxes to give input and to get output from the application. It displays labels of typed commands or navigation text to completely represent the information and the actions accessible to user. The actions are generally executed by directly manipulating the graphical objects.Whats new for File Services in Windows Server 2008

The Storage is not a marginal expense anymore. The managing storage is not a simple volume and availability the organizations require maintaining their data more efficiently and more effectively. The companies decrease the price of storing, managing and maintaining data. By implementing policies of company and knowing the procedure to use storage, can administrators professionally use the storage and alleviate the risks of disclosing the data. The next boundary for administrators is to be able to maintain data based on value of business. The storage and share management gives a centralized location to maintain two significant server resources.

Volumes and folders which are shared on the network
The content of folders and volumes can be shared on the server over the network utilizing the Shared Folder Wizards Provision that is obtainable in management of Share and Storage. This wizard directs through the required steps to share a volume or a folder and allocate all appropriate properties to it. The provision storage on disks that is available on the server by Share and Storage Management, or on subsystem storage that support Virtual Disk Service (VDS). The Provision Storage Wizard directs through the process of generating a volume on an obtainable disk, or on a subsystem storage attached to the server. If the volume is to be created on a storage subsystem, the wizard will also directs through the procedure of generating a logical unit number (LUN) to host that volume. There is the option of only creating the LUN and utilizing the Disk Management to produce the volume later.

Website proposal.

Buying and selling of cars has been a booming business in the market in todays society, people are tired of moving up and down the country in the yards to look for cars of their choice. Hence a car website (project) that will enhance the process of buying and selling at the comfort of your home or office or any other place will be the best thing that can ever happen to the citizens.

First, sellers are supposed to post photographs of their cars with different dimensions (front, back, right and left side, engine and interior) with full details of the car e.g. car make, car model, transmission, displacement, price, year of registration, interior and exterior color, type of fuel, mirage as this will enable the buyers to view the car comfortably and make wise decisions before getting into the transaction. 

Buyers will not need to make blind payments as they will be dealing with the car owners direct for negotiations since their full contacts (phone numbers and email addresses) are already displayed adjacent to the car, this means there will be no cases of fraud. Once cars have been posted, they will not be published (visible to the buyers) until payment is done, hence there is the admin section for publishing cars and only the website administrator (owner of the business) has the website pass codes.

It will be necessary to have the knowledge of information technology this means the buyers and sellers must be able to use computers and internet, use of digital cameras will also be important because of uploading photographs in the system, anyone willing to own a car will be able to access this website but documents of ownership like log books, identity cards or passports must be presented to avoid cases of theft and fraud as well. The home page will have a number of selected photos (say ten) with the vehicles which will have the flashing feature, the images will be on for 10 seconds each and on and on and on, this means different cars will be displayed systematically, but there will also be a link of sell a car where all cars are to be found.

Technology Integration in the Lessons Part II

1. The purpose of integrating technology into the lessons you saw -- what were some of the benefits
    The purpose of integrating technology into the lessons is basically to help the students develop their potentials and maximize their capacities to learn more and excel in school. Generally, technology integration motivates the students to go to school and learn the lessons well because of this new interesting approach in the learning method. Some of its benefits are largely seen in those students with disabilities since it enables them to easily cope up to the lessons. Primarily, through the aid of modern technology into their learning process, they function and live like any normal student do. Another benefit of technology integration is that it is enjoyable to do. Hence, a lot of students are taking interest in it. According to once professor in the video, this approach not just decreases the number of drop-outs in schools but it also enhances the students to learn something fun and different.

2. The computer experience you have had that might be similar to what you saw.
    In my own experience, a teacher in one of my subjects assigned us to report in class the history of our school. My group mates and I made of use Powerpoint presentation to narrate the schools history. We also utilized pictures and video clips to make the report interesting. At the end of the day, we made our teachers and our classmates impressed of our output.

3. The aspects of the technology integration that interested you most -- what might you like to be able to do as a teacher
    Personally, the aspect of technology integration that interests me most is the aspect where the elementary teacher in Tolenas Elementary School let her young students to explore and document their town using camcorders and computers. For me, it is best to teach children to participate in school at a young age and I found it effective since her students indeed took the project seriously by dedicating their time and effort. As a teacher, what I would like to do is to motivate my students to learn by making the subject appealing and interesting to them. There are actually a lot of ways to do that and one of them is to incorporate in the learning method the use of modern technology.

Technology Integration in the Lessons.

1.What was the purpose of integrating technology into the lessons
    The ultimate purpose of integrating technology into the lessons is to develop the learning method done in schools in order to maximize the potentials of the students. It enhances the students to become creative and participative since learning process now becomes interesting. At a young age, students were already trained to use modern gadgets because it encourages better learning. Technology is of great help as well, especially to those students with disabilities in coping up to the lessons and live like normal students.
2. How did the videos change how you think of using technology with students
    The videos made us understand that integration of technology is crucial not just in the process of learning but on making the students understand the society as a whole. It also portrays that technology, if used with proper guidance (e.g. teacher or instructor), can indeed help the students in maximizing their potentials.

Write an example from your own experience of the successful and meaningful integration of technology for learning purposes. What made the experience successful Meaningful
Based from my own experience, our school has made use of computers as a medium for the students to better understand the lesson. In reporting, we use PowerPoint presentations and video presentations. This way, students get to know the subject really well since there are now certain guides to the learning process aside from the normal lecture done by teachers. What made it more meaningful is not just the fact that our grades increased but more importantly, what we still do remember the lessons and incorporate them to our everyday lives.

Technology has come along way in assisting people with special needs. There are various kinds of people with special needs, these people just like any other need to live and do things the normal way. For example those who cannot walk need to have some form of mobility in one way or another, those who cannot talk need to communicate in one way or another, those who are deaf need to hear in a way and many other examples.
These paper looks at the various disorders and the way technology is made to assist. Here we look at five most special needs areas that we can tackle. We also look at the kind of technology used to assist the needs in each area.
First these are the special needs areas that the paper is going to analyze
Autism
Hearing
Sight
Mobility
Amyotrophic lateral sclerosis (ALS) (Lou Gehrigs Disease)
Autism
This is a disorder of some kind of neural development that has some attributes related to impaired social interaction and communication.
It is a disorder that takes place early in a Childs life, in North-America it is one of the fastest growing disabilities.
This kinds children with this disorder tend to fixate a times. Some do things for a very long time like gazing TV for a long time or coloring for a long time. There is no medical cure for this kind of disorder but, through technology autistic children are able to communicate using virtual peers.
Virtual Peers
Virtual peers are computer animated and enhanced children capable of carrying on realistic conversations. All these are carried out by researchers who would have autistic children shown virtual peers and then invite them to play together. The main communication between the two is a video game control interface.
Hearing
Hearing is one of the most important senses in all the sense there are. When one is incapable of hearing then he or she will not be able to communicate properly. There are two great technologies that can assist those with that kind of a disorder.
Personal Communications Software
The PSC is a system that actually puts together audio communication and hearing support that is used for the elderly and even the hearing impaired through a Personal Hearing System. The whole system uses the Wireless Body Area Network (WBAN).
This system has a perspective of giving the impaired a solution to enhance hearing.
Basically the Personal Communications System is a hand held device it has what is called concentrator information that helps in the facilitation of personal communication.



Cochlear implant
This complex electronic equipment that is small in size and assists in the provision of sound to those who are profoundly deaf, it consists of a microphone, a speech processor, a transmitter and receiver and an electrode array.
Its used to assist hearing and not to restore normal hearing. It normally gives a deaf person a representation of sounds in the area and also assists to understand speech.
Sight
This is a disorder that renders a person not able to see. There are several technologies put in place to assist this disorder.
Artificial retina implant

This is a small electrical implant that is attached to the retina. When used it may one day restore some sight.
This artificial retina is made to take the place of photoreceptor cells inside the brain that have the function of capturing and processing light.
Computer-assisted vision technology
This is the use of electronics and software to make images seen well. There is the technology of e-sight, it looks like a pair of sunglasses which has an added electronic device that is clipped to a belt of the user. The glasses have built in special camera and image processing software in the belt mounted part-that manipulates the cameras image in different ways to assist those with vision impairment to have a clear vision.  
Mobility
The disorder of mobility renders one incapable of moving around. The following are technologies that assist one to move around.
Standing wheelchair
This is simply a normal wheel-chair that assists people who are not able to walk. The only difference is that this wheel chair is able to move up to a considerable height making one think that it is standing. There are various types of this technology. There are some that can balance and climb stairs, and still some can support one on hisher legs and move around.
Artificial limb
This is a type of prosthesis that replaces some missing part of a body like a leg or an arm. The actual type of limb used is usually determined by the extent of loss and place of the missing part.
Artificial limbs are used for many reasons
Disease
Congenital defects
Accidents
Congenital defect create the need of having an artificial limb when one is born with a damaged or even missing part.
Emerging technologies related to this include Robotic limbs and Direct bone attachment.
Amyotrophic Lateral Sclerosis (ALS)
This is an auto neuron disorder that causes degeneration in the whole of the brain and even the spinal chord. It makes one be weak and robs himher of the ability to communicate.
Speech technology
 There is Voice for Joanie, it is operated using a computer screen. It creates and provides the gift of speech to those suffering from the disorder. It has been in existence for a long period of time.
This kind of system offers technical assistance and voice communicators for as long one needs when the person using it passes on then it is donated to another one with a similar complication.
Speech therapy and Assistive Devices
Since ALS mostly affects the muscles used to speak, one suffering from the problem can employ a speech therapist, who can teach the patient how to better understood. As it progresses they may learn how to use speech synthesizers and computers to communicate.
These devices can also help the patient to maintain mobility.
Conclusion
In a nut shell, the people who have special need like autism, hearing disorder, sight disorder, ALS, and mobility problems are well taken of by technology.  The various kinds of technology that are in place for these disorders are virtual pals, personal communications software, cochlear implant, artificial retina implant, computer assistance vision technology, standing wheelchair, artificial limb, and speech therapy. All these are some of the technologies put in place to help the people with special needs. There are researches that are in place to seek improvement in some technological aids so as to make the lives of the impaired much better.

Domestic Energy Policy.


The United States is the top energy consumer in the world. The consumption per capita ranks seventh while it is reported that the larger part of this consumption is fossil fuels. Current usage statistics indicate petroleum and coal at 40 and 23 percent respectively, with the rest coming from natural gas, nuclear power and renewable energy (comprising hydro electric, wind, geothermal and solar power). In the last 50 years, consumption has shot up overtaking production and this has led to the deficit being met through imports. This consumption is traceable to four major sectors industrial, transportation, residential and commercial, with the industrial sector leading with 33 consumption. Recently the global oil crises coupled with domestic demand supply benefits have led to high pump and consumer good prices. The environmental impact of Americas fossil energy usage has come to world attention with concerns of foreign oil dependency effects on national security being posed.
The current energy policy frameworks involves clauses on oil and gas energy, nuclear energy, renewable energy, clean technology and energy efficiency. America has a long standing dependency on fossil fuel, especially oil, this has brought up the greatest challenges the country has ever faced, being a threat to the planet and national security (Hinrichs et al). The question of energy dependency is rooted in the states reliance on foreign oil. The intensive use of fossil fuel has and continued to adversely affect global climate change. This calls for a radical policy change by the incoming Obama administration to address the shortcomings of previous energy policies.
The Kyoto protocol to the United Nations aimed at reversing global warming by reducing collective members green house emissions to 5.2 below 1990 levels. The United states under the bush administration rejected under the pretext of flaws in the pact. The irony is that the US was responsible for 36.1 of the 1990 green house gas levels. On the issue of national security oil imported from unstable and unfriendly nations has contributed to national security concerns for instance the petro-dollars are said to fan nuclear ambitions in Iran. As we have also seen the ordinary American has been affected by high costs of living accruing from flawed energy policy. The energy crisis has been caused by surging demand for energy in US industry and existence of a demand-supply gap. This results from energy inefficiencies and over-emphasis on fossil fuels which can only be sourced abroad.
This problem has not been solved due to partisanship and undue influence of parties within special interests. President Bushs rejection of the Kyoto pact was shored up by big US oil and auto companies. Oil and auto corporations made substantial contributions to the 2000 presidential race. This resulted in a series of policy pay backs and political appointments that culminate in the rejection of the Kyoto protocol.  
Long standing solutions are required that will bring America in proximity to energy independence. Options Include a Cap and Trade program that should be installed to curb greenhouse emissions. It will be structured to incentivize pollution adjustments by setting emission limits. These limits are to be allowed with emission rights or credits that represent an allowance to emit up to a certain level. These credits can subsequently be auctioned among companies ensuring that those who pollute more pay for it and that some one else pollutes less.
Investment in clean energy is to be made where auction proceeds from the cap and trade program are to be channeled into low carbon energy. This is meant to reduce reliance on foreign oil dependence. This investment should be in basic research, technology demonstration and aggressive commercial deployment and clean market. This is also projected to create jobs for the American population resulting from the commercialization of clean energy production.
In a policy that will see American vehicles become more fuel efficient procedures to increase fuel economy standards invest in developing advanced generation vehicles for instance plug in vehicles that are more fuel efficient. This will involve investment in advanced research and development, and purchase as well as conversion tax credits for owners of highly efficient cars partner with domestic automakers in form of retooling tax credits  and loan guarantees to enable the new fuel efficient cars built in the US mandating flexible fuel vehicles through policy develop the next generation of sustainable bio fuels and infrastructure establish a national low carbon fuel standard to speed the introduction of low carbon non-petroleum fuels.
Policy measures to promote the supply of domestic energy are to be instituted in realization that the economy cannot still do without oil and gas. Much of untapped reserves are protected by leases, over 68 million acres of oil reserves and 40 million offshore. A use it or lose it approach should be used to increase domestic production. Infrastructural challenges federal permitting delays usually hamper drilling initiatives and fixing them is to be part of this initiative. Over 85 billion barrels of oil exist in existing oil fields and are technically removable using enhanced oil recovery technique.
A policy initiative to diversify energy sources to achieve security and independence in energy. This would require that more electricity should come from renewable sources, approximately 10 . Clean coal technology also needs to be developed and deployed through revitalized carbon capture and storage technologies. Safe and secure nuclear energy will also play role in this policy objective addressing the relevant security of nuclear fuel and waste, waste storage and proliferation.
Finally a commitment to increase efficiency and reduce total energy use while lowering costs. Despite topping consumption statistics, the US as rated by the UN is the 22nd most energy efficient country. Efficiency can however be achieved through deploying the cleanest, cheapest and fastest energy sources. All national buildings should also be subjected to efficiency measures such as making them carbon neutral and improve new and existing building efficiency indices. An overhaul of federal efficiencies is required to improve her performance. There is a trend of missing deadlines of updated energy efficiency standards. Reducing federal energy consumption will play a perfect leadership role in the efficiency war. A final tactic would be to flip incentives to energy utilities by requiring states to implement incentives and offering targeted technical assistance.  These moves will benefit energy efficiency utilities instead of merely supporting high energy consumption.
Implementation of the above outlined policy should be able to free the US from foreign oil reliance, enable her to contribute to the global environmental cause, reduce the security threat associated with oil and most importantly improve Americans living standards.
Technology has come along way in assisting people with special needs. There are various kinds of people with special needs, these people just like any other need to live and do things the normal way. For example those who cannot walk need to have some form of mobility in one way or another, those who cannot talk need to communicate in one way or another, those who are deaf need to hear in a way and many other examples.
These paper looks at the various disorders and the way technology is made to assist. Here we look at five most special needs areas that we can tackle. We also look at the kind of technology used to assist the needs in each area.
First these are the special needs areas that the paper is going to analyze
Autism
Hearing
Sight
Mobility
Amyotrophic lateral sclerosis (ALS) (Lou Gehrigs Disease)
Autism
This is a disorder of some kind of neural development that has some attributes related to impaired social interaction and communication.
It is a disorder that takes place early in a Childs life, in North-America it is one of the fastest growing disabilities.
This kinds children with this disorder tend to fixate a times. Some do things for a very long time like gazing TV for a long time or coloring for a long time. There is no medical cure for this kind of disorder but, through technology autistic children are able to communicate using virtual peers.
Virtual Peers
Virtual peers are computer animated and enhanced children capable of carrying on realistic conversations. All these are carried out by researchers who would have autistic children shown virtual peers and then invite them to play together. The main communication between the two is a video game control interface.
Hearing
Hearing is one of the most important senses in all the sense there are. When one is incapable of hearing then he or she will not be able to communicate properly. There are two great technologies that can assist those with that kind of a disorder.
Personal Communications Software
The PSC is a system that actually puts together audio communication and hearing support that is used for the elderly and even the hearing impaired through a Personal Hearing System. The whole system uses the Wireless Body Area Network (WBAN).
This system has a perspective of giving the impaired a solution to enhance hearing.
Basically the Personal Communications System is a hand held device it has what is called concentrator information that helps in the facilitation of personal communication.

Cochlear implant
This complex electronic equipment that is small in size and assists in the provision of sound to those who are profoundly deaf, it consists of a microphone, a speech processor, a transmitter and receiver and an electrode array.
Its used to assist hearing and not to restore normal hearing. It normally gives a deaf person a representation of sounds in the area and also assists to understand speech.
Sight
This is a disorder that renders a person not able to see. There are several technologies put in place to assist this disorder.
Artificial retina implant

This is a small electrical implant that is attached to the retina. When used it may one day restore some sight.
This artificial retina is made to take the place of photoreceptor cells inside the brain that have the function of capturing and processing light.
Computer-assisted vision technology
This is the use of electronics and software to make images seen well. There is the technology of e-sight, it looks like a pair of sunglasses which has an added electronic device that is clipped to a belt of the user. The glasses have built in special camera and image processing software in the belt mounted part-that manipulates the cameras image in different ways to assist those with vision impairment to have a clear vision.  
Mobility
The disorder of mobility renders one incapable of moving around. The following are technologies that assist one to move around.
Standing wheelchair
This is simply a normal wheel-chair that assists people who are not able to walk. The only difference is that this wheel chair is able to move up to a considerable height making one think that it is standing. There are various types of this technology. There are some that can balance and climb stairs, and still some can support one on hisher legs and move around.
Artificial limb
This is a type of prosthesis that replaces some missing part of a body like a leg or an arm. The actual type of limb used is usually determined by the extent of loss and place of the missing part.
Artificial limbs are used for many reasons
Disease
Congenital defects
Accidents
Congenital defect create the need of having an artificial limb when one is born with a damaged or even missing part.
Emerging technologies related to this include Robotic limbs and Direct bone attachment.
Amyotrophic Lateral Sclerosis (ALS)
This is an auto neuron disorder that causes degeneration in the whole of the brain and even the spinal chord. It makes one be weak and robs himher of the ability to communicate.
Speech technology
 There is Voice for Joanie, it is operated using a computer screen. It creates and provides the gift of speech to those suffering from the disorder. It has been in existence for a long period of time.
This kind of system offers technical assistance and voice communicators for as long one needs when the person using it passes on then it is donated to another one with a similar complication.
Speech therapy and Assistive Devices
Since ALS mostly affects the muscles used to speak, one suffering from the problem can employ a speech therapist, who can teach the patient how to better understood. As it progresses they may learn how to use speech synthesizers and computers to communicate.
These devices can also help the patient to maintain mobility.

The Difference between Spreadsheet and Database.

There have been various discussions regarding spreadsheets and databases. This could be attributed to the fact that a lot of people contest the feasibility of one tool over the other. In this paper we will provide a definition of what a spreadsheet is, then derive the definition of a database and provide a comparative discussion between the two.
Spreadsheet applications, otherwise known simply as spreadsheets, are computer programs which allow for users to simulate the creation and manipulation of spreadsheets electronically. They can easily be described graphically as applications which display cells altogether forming a grid of columns and rows. Cells may contain alphanumeric texts or numerical values, and they can also contain formulas to describe cell relationships. Most spreadsheet applications have support for multi dimensional linkage, meaning two or more spreadsheets may be linked with each other using formulas.  Once the formulas required have been defined, the user may then experiment on the values to see effective changes and behavior. This characteristic of spreadsheets allows them to be considered as basic decision support system. Spreadsheet applications are widely used in homes, offices and business establishments. In cases of small businesses, the functionalities provided by spreadsheets prove to be enough to maintain daily operations. However, when businesses get bigger, more data is inputted and manipulated by more users, the need for better solutions becomes apparent. This is where database gets into the scene. A database is a computer program which offers mechanism for storing, manipulating and retrieving information in an organized manner. Like spreadsheets, databases approach this functionality by using tables. Database tables also consist of rows and columns, the data type that can be stored in cells under the same column is set by the user, and this characteristic of the column is called its attribute. A row or an entry in a database is called a record. At this point, it would seem obvious that databases share a lot of similarities with spreadsheets, if so, what exactly are the characteristics of a database that makes people consider using them instead of spreadsheets The answer is that databases are actually far more superior to spreadsheets in terms of the ways users are able to manipulate data. Databases are easier to share unlike spreadsheets multiple users may gain access to a single database simultaneously. They offer better security and data integrity because the data type in each column is defined and as a result, users are protected from committing simple mistakes. Databases have greater capacity, entries in a database may reach billions, and even with this staggering amount of data the user does not have to feel overwhelmed, since databases can be queried according to the needs of the user. Databases create less duplication both file duplication and duplication of source data.  Databases however, are more complex to understand than spreadsheets because of this it requires more investment in training but is sure to yield more profit. To wrap it all up, the differences that exist between these tools are mainly attributed to the level of complexity of the work being done and the user is willing to take.

Climate Change.

1) Several evidences point out that climate change is caused by human activities. Among these evidences are the speedy increase of carbon dioxide concentration in the earths atmosphere for the past decades consumption of more than half of surface fresh water elevated fixation of atmospheric nitrogen extinction of various flora and fauna species and, utilization of majority of the land and its resources (L2).  These events link to human activities and the occurrence of climate change has been intensively researched in the past years after humanity was struck with the drastic effects of climate changes like typhoons, El Nino, La Nina and low harvest.
The speedy elevation of carbon dioxide (CO2) atmospheric concentration has been well documented and monitored. Since 1957, a significant increase in CO2 atmospheric concentration from 315 ppm to 362 pmm has been observed. The continuous elevation of (CO2) is due to various human activities especially the employment of fossil fuels. Every year more than 5 billion metric tons of (CO2) is emitted into the atmosphere (Vitousek et al., 1997). Human activities have greatly increased the atmospheric carbon dioxide concentration which led to global warming and the consequent climate change.
The exploitation of majority of the land and its resources also has a big impact to the climate change phenomenon. Various human activities related to agriculture like land clearing, grazing intensification, forestry and animal domestication contributed negative effects to the earths ecosystem. Humans built diverse infrastructures like dams, irrigation systems, flood protection structures, buildings, roads and bridges which plastered the earth with asphalt and concrete (Kareiva et al., 2007). The employment of vast amounts asphalt and concrete did not only contribute negative impacts to the ecosystem but also helped retain more heat within the earths atmosphere. Without the intensive stresses in the earths resources inflicted by human beings, climate change could have occurred in its normal pace and its drastic effects would have been non-existent. It is already undeniable that change is indeed a result of human activities.
2)    The most pressing consequences of climate change are food supply depletion, low availability of water, extinction of animal and plant species, increase in the occurrence of natural disasters and emergence of various diseases (L13, L14, L15, L20).  At present, the terrestrial and marine ecosystem has been widely affected by the elevation of temperature. There has been continuous depletion of terrestrial and marine flora and fauna (L13). The reduction in the number of species and population of animals and plants are very significant to the survival of humans. Continuous consumption along with the effects of climate change for example has caused lowered harvest of crops, plants and marine food (L17, L18). In addition to this the food supply is also threatened by the occurrence of different global disasters like typhoon, landslides and flood which affected the agricultural production and cost numerous lives. These consequences of climate change are not minor because in just this decade the loss in food, infrastructure, livelihood and human lives has been gigantic.
3)    The most significant response to climate change is the reduction of greenhouse gases emission thru human lifestyle modifications. These adjustments include the utilization of alternative energy sources like biofuels, solar power and wind power instead of burning fossil fuels (L25).  The huge amount of CO2 generated from fossil fuel burning in power plants, industries and even cars can be considerably lowered with the use of biofuels. Aside from that this energy source is renewable and can contribute to the waste reduction process.

The All-Electric Car.

The all-electric car is a vehicle that only runs on electric power. An all-electric vehicle is different from a hybrid in the sense that a hybrid has the option of multiple fuels, usually electric and petrol, but these days hydrogen is becoming an electric fuel as well. The stored chemical energy in the batter is used to turn individual turbines at each wheel to propel the car. Therefore, it has no internal combustion. The Mercedes-Benz research centre at Stuttgart has revealed information regarding Daimler AG developing an all-electric version of Mercies luxury sedan, The S-Class that runs on lithium ion batteries. The battery will have two options for charging the first is a direct plug-in method in to a wall socket, like most conventional electric car and appliances. The second is through a dynamo like device fitted within the car that charges the battery through kinetic energy while the car is driving. The dynamo is similar to a turbine and will convert the kinetic energy in to stored chemical energy in the battery. However, the dynamo cannot fully charge the battery as the power generated will be consumed simultaneously. On one full charge, the battery can drive the car up to 170 kilometers or 105 miles.  There has also been news that in 2011, Mercedes will produce an all electric version of its new high performance luxury supercar, the SLS AMG. The SLS will use similar technology to the lithium-ion battery.  (Mercedes-Benz developing 100 electric car, 2008)
Pros
All-electric cars have an advantage that they are less complex to build and manage than hybrid cars. They have simpler mechanisms similar to laptop computers. In fact, the all-electric sports car, the Tesla Roadster runs on over a 100 laptop computer batteries.
The advantages of this technology includes the fact that it is environment friendly a regular S-class has a 6.0 liter V12 engine that consumes high-octane petrol and gives an average mileage of 16-18 miles per gallon. The electric powered vehicle will give 105 miles on a single charge. The luxury sedan will be affordable to run.
The car will also have zero carbon emissions, compared to petrol powered cars and are completely environment friendly. Performance will be similar to its petrol-powered counterpart.  (Mercedes-Benz developing 100 electric car, 2008)
Cons
Some disadvantages include the time for fully charging the cars battery. A petrol-powered S-class tank would fill up in a matter of minutes, while the lithium battery of the new S-class takes about six hours.
Another disadvantage is that there are still not enough charging stations along highways and motorways, so if a car runs out of power, it will have to be plugged in to a household or commercial wall socket, causing a lot of inconvenience.
Electric power cars are much more expensive than normal petrol powered cars. Recently, hybrid cars have become more affordable but all-electric cars are much expensive. The price of the S-Class, which is expected to be much higher than the petrol powered version. Mercedes states that the price of the vehicle depends on the option of whether the lithium-ion batteries will be purchased by the customer or leased.  (Mercedes-Benz developing 100 electric car, 2008)

COAL NATURAL ENERGY SOURCE.

Coal has been in use for hundreds of years as a source of energy by man. Apparently coal has been used for heating since the caveman. The new technologies invented during the industrial revolution provided coal with the real opportunity towards being the dominant worldwide supplier of energy due to the overwhelming need for energy. Mr. Watt, the inventor of the steam engine, used coal to power his engines which lead to coal being an important source of energy during the industrial revolution. Coal is formed as a result of decay of plants from primeval forests over a long time. It is less expensive than other energy sources and also one of the most abundant fuels. The United States has 25 of the worlds known coal reserves according to the National Center for Policy Analysis in Dallas, Texas. Traces of impurities like sulphur and nitrogen are found in coal. These substances are released into the atmosphere when coal burns thus creating acid rain. Coal burning also leads to carbon emission and eventually global warming. Emissions from coal burning are also known to cause respiratory diseases. Coal has the added disadvantage of being nonrenewablenon sustainable. Clean coal technology was started jointly by Canada and the US. Coal cleaning involves both simple and complex processes. Coal can simply be washed to get rid of pyritic sulfur. Smoke from burning coal can also be passed through flue gas desulfurization units that scrub away the sulfur from the smoke using limestone. Nitrogen oxides from nitrogen are taken care of by first preventing them from forming. This is achieved using staged combustion and catalysts. The fluidized bed boiler, yet another clean coal technology, eliminates sulfur and nitrogen oxides from coal by allowing limestone to mix with the coal and by burning at cooler temperatures respectively. The pressurized fluidized bed boiler is an improved version of the bed boiler. It has the capacity to spin a gas turbine and boil water for a steam turbine. Thus it is have two sources of electricity from the same fuel. Gasification of coal is the ultimate in clean coal technology. Impurities in sulfur are filtered out entirely. This technology also comes with the added advantage of using the hot combustion gases to spin a gas turbine and using the exhaust gases from the same turbine to heat water to steam and turn another type of turbine for even more electricity. With the above advances in coal technology, it is set to regain its stature as the worlds prime source for energy.

The Internet is a Lifelong Learning Tool.

The Internet is a powerful learning tool that students of all ages may benefit from. As professionals and housewives join online universities, doctors and nurses use Personal Digital Assistants and nursing informatics that are based on the Internet not only to ease communicationbut also to access critical information. As a matter of fact, all professions that rely on ongoing education may benefit from the Internet. No longer is classroom education considered a necessity. Moreover, research findings have revealed that students are nowadays increasingly using the Internet as a fundamental study aid both inside and outside the classroom (Lenhart, Simon,  Graziano, 2001).
 In the year 2000, a study was conducted by Pew Internet  American Life Project to understand the benefits of the Internet in education. A total of 754 students between the ages, 12 to 17, were interviewed as part of the study. According to the findings, 94 of students were using the Internet to conduct school research, while 78 believed that the Internet truly assists them with school work. Additionally, 71 of the students reported that they were using the Internet as an important source for their school reports as well as projects. A total of 41 mentioned that they used the Internet to contact their classmates in addition to teachers with essential questions related to school work. What is more, 34 of the students reported that they had downloaded online study aids, while 58 reported their use of websites that had been set up especially for their schools or particular classes (Lenhart, Simon,  Graziano).
 I believe that more students must be using the Internet today.  Besides, the benefits of the Internet for students are not limited to teenagers. College and university students are similarly known to benefit from the Internet. I, too, am one of those fortunate students, and intend to go on using the Internet for lifelong learning.
Email Ethics at Work
     Certainly, electronic communication is superior to paper communication and word of mouth, its main advantage being speed.  Schedules and individual assignments are easily communicated by electronic means.  If, for example, a technical support team must deal with a matter urgently, email notifications are speedier for everybody to retrieve.  In fact, members of the team that are online could be reached instantly by email.  It may be chaotic without emails notifying staff to organize themselves according to the situation at hand.  What if a junior organizational member had to be sent to knock on each team members office door to call his or her attention to the problem at hand
     Although electronic messaging is meant to reduce organizational errors as staff receives updated information directly from managers  depending on the stresses faced by staff, it is quite likely for at least some of the communication to turn unprofessional, especially if there have been problems with schedules.  If an organizational issue goes bad and fiery words are exchanged by means of email, regardless of the nature of the problem it is bound to get worse as people react to online messages with speed and emotion, which is why face to face communication is considered superior in such situations (Vleck, 1995).  In professional emails, therefore, each member of the organization is required to mind his or her manners watch his or her tone be to-the-point or concise ask whether the receiver is willing to open attachments (unless the job at hand requires them to be sent) and check for spelling and grammar mistakes.  What is more, personal email communication may consist of emotions or even emoticons, which professional communication must not consist of (McKay, 2009).  In short, it is work ethic that matters most in organizational emails.  I hope I never forget to observe this rule in my professional life.  
Business Made Easy with Business Intelligence Software
     I feel honored to be enjoying the Information Age, and look forward to my professional life with amazing application software to work with.  One of the technological breakthroughs is the business intelligence software.  Business intelligence refers to activities undertaken by a business to gather essential information about its competitors or the market.  Business intelligence systems, on the other hand, tend to be interdepartmental information gatherers.  With an emphasis on speedy retrieval of information, these technologies rely on data fed into them by data gatherers to relay to departments that require this information.  But, these systems may also perform the data mining function on their own before crunching that data in a highly efficient manner.  For example, business intelligence software may be designed to gather important information about competitors (McGuigan, 2009).  Likewise, this technology makes it possible for the business to predict future scenarios with predictive analytics, combining data mining and statistical analysis (Kelly, 2009). 
     Thus, business intelligence software is not only useful in collecting and disseminating information between separate departments, running reports, and making predictions based on past performance but also in conducting analyses of the external environment of the company, including market analysis based on latest economic trends (King, 2009).  Moreover, this technology is meant to help the organization with customer relationship management.  After all, employees using the system are able to speedily retrieve necessary information in order to satisfy customers (Jasra, 2009).  I would add that this software must undoubtedly satisfy both the user and the customer.  Business efficiency must undoubtedly benefit everybody.


All Files Reduced to the Size of a Thumb
     I have been using the C drive to manage all of my files for college. This is because the thumb or flash drive lacks compatibility with the operating system installed on my computer Windows 98. However, I have learned that I may purchase a thumb drive that is equipped with the software required to install a Windows 98 drive on my computer within sixty seconds (What is a Thumb Drive, 2009).
 Although I am not a user as yet, I understand that the thumb drive could provide great benefits to the student who uses it to store coursework. Using the thumb drive, a student may store his or her coursework for an entire year or even longer (Burns, 2007). The thumb drive may accommodate up to eight gigabytes, although most students may want to settle for 256 to 512 megabytes. Besides, the thumb drive is almost never scratched. It is the size of a thumb, so therefore students may carry it anywhere they want (What is a Thumb Drive). And, if their computers ever crash, the thumb drive would continue to hold their course material for them.
 Another important advantage of the thumb drive for students is that the drive is re-writable. Students do not have to buy new drives once they have completed the courses that they used their drives for. The material for their new courses may be stored into the old drives, allowing them to save money (What is a Thumb Drive). At the same time, however, students must be careful not to lose their thumb drives. Because these drives are exceptionally small, it is easy for students to misplace them. Hence, I would not recommend the thumb drive to a friend if he or she happens to be an absent minded individual.  Then again, components of the system unit require care and management lest they fail us.  My absent minded friends would automatically learn this lesson if they misplace their thumb drives containing important assignments.

Technological Power and Abuse of Power
     Rob Milliron, a construction worker, was enjoying his lunch in an entertainment area of Tampa, Florida, when a government camera equipped with face recognition technology took his photograph.  The photo was used without Millirons consent in an article published in the U.S. News  World Report.  When a woman in Oklahoma misidentified Milliron after seeing that photo and contacted the police to have him arrested on child neglect charges, the man in the picture was forced to explain his innocence to law enforcement agencies.  He told a newspaper once his explanation had been accepted They made me feel like a criminal (Alexander  Richert-Boe). 
     This case raises ethical concerns regarding use of facial recognition surveillance.  Although common use of this technology is yet to be realized, its future in areas of security and public safety appears rather promising.  However, as Millirons case shows, there are issues of legality with reference to face recognition surveillance.  We have to bring into consideration the Fourth Amendment to understand these issues (Bennett, 2001).  
     The United States Supreme Court held in Katz v. United States that the Fourth Amendment would afford constitutional protection in those areas in which an individual reasonably expects privacy (Bennett).  Of course, Milliron should not have expected privacy in a public place.  Even so, his photograph was used without his consent.  It was an invasion of Millirons privacy to publish the photo.  Hence, this case shows that the power of input devises such as face recognition technology must not be abused.  Damaging individuals with computing devices is a crime, regardless of the identity of the criminal.  Let us hope that everybody using powerful input devices  including my community  bears Milliron in mind.  I would not want to be in his place.
Imagine Workplaces without Printers
     Although there are various models provided by textbooks to understand and measure organizational effectiveness, the basic meaning of organizational effectiveness remains unchanged It is for the organization to be doing everything that it knows how to do, and to be doing it well.  The organization knows how to manage its employees, and manufacture the products or provide the services that it originally set out to manufacture or provide.  However, in order to be effective in its operations, the organization should be managing its employees well, and manufacturing good quality products or providing high quality services to its customers.  What is more, in the business environment today, the organization that is effective in its operations must be efficiently and productively using information technology.  This is, in fact, one of the requirements of organizational effectiveness (Helms). 
     Computers, with their input and output devices, help to organize plans, letters, legal documents, articles, and countless other files including indispensable information.  In other words, computing helps to modernize as well as simplify the whole process of working with documents.  Thus, the organization is able to do its job well, seeing that computers are designed to perform routine tasks that humans might perform only with mistakes because they dislike and get easily wearied with monotonous assignments.  What is more, time is money in the business world.  By using computers to handle routine tasks with speed, the organization is using its human resources for jobs that only skilled human beings would be able to handle.  Hence, everything at the organization runs well. 
     Can you imagine a workplace without printers  I certainly would not agree to work there.  I know that an organization that lacks access to a basic output device such as a printer is an ineffective one.  I would buy a printer for that organization if I must work there.  
Storage of Personal Data Positive or Largely Negative
     The fact that computer privacy is endangered in the era of abundant usage of information systems sheds negative light on the use of these systems. Unsurprisingly, countless individuals and organizations must shirk the use of information systems for this reason. Organizations where computer privacy is at risk may have to pay a heavy price for security breaches.
     Hollinger (2006) writes about a law in New Hampshire to fight the dangers of breach of data and information through the use of information systems. In effect since January 1, 2007, new sections to the right-to-privacy statute require businesses to promptly inform individuals that are likely to be affected by a breach of data and information (Hollinger). Even if a business is unsure that the stolen information would be misused, this requirement of the law stands. Individuals whose personal data has been stolen may be informed in writing, by email, or by telephone with a description of the incident, date of the breach, type of personal information accessed, and a telephone contact (Hollinger). If there are more than one thousand people who may be affected by the breach of data and information, and the total cost to be borne by the business for notifying them exceeds 5,000, the law allows statewide publication of the incident through a newspaper, website or electronic newsletter. Moreover, regulated businesses must inform their primary regulators about the security breach. Other businesses are required to inform the New Hampshire attorney generals office (Hollinger). If a business fails to meet all requirements of the new law, it may be subjected to severe penalties (Hollinger). 
     Of course, the organization also loses community goodwill if such a case is publicized.  Thus, storage of information on computerized systems could be very costly, even though the nature of the business may require storage of personal information about stakeholders.  I would feel very anxious if my doctor or bank informs me about a security breach that affects me.
The Miracle of Computer Communication in Coping with Disease
     Computers do not only connect people in business, schools, and healthcare centers, but also in their homes.  Individuals suffering from a particular disease may form their own support groups to gather invaluable information that may help them cope with the disease.  I personally know an individual who has had first-hand experience with such groups.  According to this person  a terminally ill patient  such groups are essential because family and friends may not always understand or have time to comprehend the psychology of the patient.  Chat support groups for women that are suffering from breast cancer have been scientifically proven as successful.  These support groups are known to have helped women suffering from breast cancer to experience a reduction in depression.  I have been further informed that even pain reactions may be reduced when many women suffering from the same illness use the Internet to chat with each other, thereby forming unique support systems for themselves.
     An Internet-based support system allows ailing individuals to feel safe, as they may hide their real identities if they must.  Chatting with some of the individuals using the system reveals that safety and anonymity are matters of great import for a terminally ill patient.  Because some of the patients believe in keeping their illness an absolute secret  to the extent that even their family and friends are unaware of the real problems they are confronting  computer communication using the Internet is an avenue for such individuals to get the emotional support they require, regardless of their face-to-face, personal relationships. 
     I commend the developers of such chat rooms.  In fact, I am urged to call them Christ-like.  Computer communication is, indeed, a miracle.  Moreover, it allows us to remember that we are never alone, regardless of what we face in our personal lives.  Computer communication connects us with the entire world.

The Role of Wireless Technology in Society.

Wireless technology is a global innovation through which its various functions in traditional form are made mobile and accessible without spatial limits. The antecedent to the continuous development of wireless technology is the necessity to bridge communication gaps. Different challenges and difficulties in communication and networking have prompted the development of wireless technology. (Rhoton, 2002) Apart from facilitating effortless communication, wireless technology also smoothen the progress of data or information transfer and offer entertainment on the go for its users. (Firestone, 2008)
    Due to the benefits and contributions of wireless technology, it has been adapted, developed, and established in different fields. Wireless technology may be for personal use through the utilization of cell phones, wireless Internet connections, and handheld devices such as PDAs (Firestone, 2008, p. 5). In the field of medicine, wireless technology is being utilized in order to improve networking and communications for a more efficient mode of providing medical services to patients. For instance, cardiac pacemakers are equipped with wireless technology for the purpose of correcting heart rhythms. (Firestone, 2008, p. 5).
Wireless technology also contributes to the field of business and commerce by providing a means by which corporations may expand and grow by relying on wireless technology for setting up and operating e-commerce. (Wheeler, 2004 Tsai, 2003) In education, wireless technology is instrumental in assisting academic institutions resolve certain problems that hinder the development and enrichment of the teaching and learning process. (Sharma  Nakamura, 2003) By and large, wireless technology has played an important part in modern society. With this in mind, the remainder of this text will look into the various influences of wireless technology to
The Influence of Wireless Technology to Man and Society   
    Initially, the presence of wireless technology creates a sudden need or demand for these kinds of devices. Various groups in society have assigned the roles or uses of wireless technology, whereas if nonexistent, these particular needs will peter out or cease to exist. For instance, most adolescents nowadays would regard mobile and smart phones essential parts of their daily lives, while this need was nonexistent beforehand. In the workplace, the use of wireless technology has also prompted the need for individuals to be well-versed about technology and how it is used. Working adults primarily regard these devices wireless technology devices as utilitarian business tools teenagers and young adults look at them as a platform for entertainment (Miller, 2004, p. 324).
    The influence of wireless technology in expanding the needs of man may be explained by the Theory of Needs by Abraham Maslow. According to Maslow, human need is a psychological construct composed of five levels physiological, safety, social, ego, and self-actualization (Taniar, 2009, p. 58). Wireless technology offers benefits that appeal to different human needs as explicated by Maslows theory. Wireless technology meets physiological and material needs the safety features of technology appeals to security needs wireless technology facilitates social interaction the knowledge and skills in utilizing and understanding wireless technology appeals to a mans pride or ego various wireless technological tools may be used in different aspects of life to accomplish success and make work more efficient, etc.
    Aside from human needs, wireless technology also affects an individuals culture of human beings in modern society. The platform of technology has changed the structure of society too much. For instance, impersonal communication or interaction has become common, lessening the value of personal interaction among individuals. Wireless technology also strongly influences the perspectives of individuals, which are reflected in their language. From an evolutionary view, we are seeing a new case in which the adoption of new technology affects language, including vocabulary and rules of grammar in practices. And these practices ultimately affect the common language, and language itself (Castells, 2007, p. 184).
    As previously mentioned, wireless technology also affects decision-making processes and priority setting. These arguments are palpable by observing purchasing decisions of individuals and the reason by which people choose to purchase wireless technology over other objects or goods. An example of this would be the popularity of mobile phones as opposed to telephones with fixed lines. (Shi, 2004) Cultural influences of wireless technology, that are inherent in decisions and priorities, are evident in adoption rates and styles (Shi, 2004, p. 8) of human beings. For instance, Cultural factors affect the preference for mobile phones over fixed phones they also influence handset sizes and style preferences (Shi, 2004, p. 8).
    In addition, the priorities of individuals change with the various contributions and opportunities that wireless technology plays in an individuals life. Technically speaking, Consumers may want different levels of detail in information depending on the situation. In a wireless world, we believe that they tend to prefer information in a compact form because they will tend to use wireless devices while on the go and because of technology limitations (Pal  Rangaswamy, 2003, p. 67). Thus, the priority of human beings have shifted from directly accomplishing their goals and objectives in the different aspects of their lives to the identification and acquisition of various tools and instruments by which the arduous process may be simplified and made less complex for them. Furthermore, the priority of human beings, which have led to heavy reliance on wireless technology, is to make life less difficult by looking for ways by which difficulties may be lessened. Customization of wireless technology to address the difficulties of individuals in accomplishing roles and responsibilities in different areas of life has been the priority of modern society.
    Finally, wireless technology leads to the ability of man to create and innovate. This is palpable in the increasing development of technology. The existence of Global Positioning Systems, Bluetooth, Wi-Fi, Broadband Internet, 3G and 4G technologies have proven that technology is heading towards one direction and the capacity of man to develop technology fuels it.
Conclusion 
    Overall, the major arguments presented above reveal that wireless technology, when it comes to man and society, has generally influenced and transformed culture. First, the existence of wireless technology along with the various benefits and contributions that it offers to man, appeals to human needs in various levels. Thus, man perceives wireless technology to be a need. Second, wireless technology influences decision-making processes, specifically in terms of purchasing or consumerism. Third, in relation to the second argument, wireless technology affects the priorities of man. From a goal-driven society, people have become more conscious or aware of the need to create several ways in which the accomplishment of goals and objectives in various areas or fields of life will become more efficient and less difficult. Finally, wireless technology enables man to create or innovate. The features of wireless technology allow man to fulfill his functions in different areas of his life, as well as to improve technology to fit the needs of man.
Genetic engineering has seen the production of genetically engineered foods which have brought about a lot of controversy regarding their safety for human consumption among other ethical issues. This hot debate has reigned in the public and also among professionals in this field with some arguing that the foods derived from this technology pose a great risk to human health whereas the other side sees no detrimental effects of consuming these foods. This paper argues for the use of genetically modified foods and therefore it gives justifications on why genetically modified foods are safe. By countering the controversial views of those who argue against these foods, important questions regarding safety of these foods have been answered eventually informing the organizations and other players in the genetic engineering field.
What are genetically modified foods
    To gain a clear understanding of this argument, it is pertinent to have a clear understanding of which foods are termed as genetically engineered and the process through which they are made. With this information, it is also possible to differentiate them from the organic and naturally occurring foods. Genetic modification entails altering the genetic composition of an organism. Genetically modified foods result from a combination of genes from different organisms (plants, animals or bacteria). The foods are also referred to as genetically engineered foods or transgenic (Human Genome project Information, para 1).
Other than introducing foreign genes in an organism to end up with a genetically modified food, it is also possible to obtain the same by rearranging the existing genes such that new characteristics are expressed on the original organism. Genetic modification is done using molecular tools. There are several foods that have undergone genetic modifications including tomatoes that have been made such that they delay in ripening as with the case of the Flavr SavrTM Tomato that contain a gene that helps the cell wall remain stable making the tomato remain firm for shipping and long storage (Schneider  Schneider, para 2). Other foods have been modified to resist pests whereas others have had their nutritional value added.
A clear point to note is that genetically modified foods date back to the ancient days whereby genetic alterations resulted from the practice hybridization and traditional breeding. The only difference with modern modifications is the use of recombinant technology in the process of recombinant DNA technology.
Have you ever consumed a genetically modified food
    Most likely you have consumed a genetically modified food with or without your knowledge. In any case, settled agriculture has been in practice in the last 8000 years ago and selective breeding was in practice then with farmers going for disease and pest resistant crops (McLean, para 3). Even in the current era of modern biotechnology, most of us have consumed these modified foods. With 252 million acres of genetically modified crops being planted in 22 countries by year 2006, it is likely that you could have used one of these foods. The United States had a 57 percent contribution followed by Argentina which took a share of 17. South Africa contributed a one percent production of the GM products in the same year (Human Genome project Information, para 5). This technology has helped in meeting the challenge of food in the globe without any considerable risk being mentioned with their consumption. Why then should we not continue consuming the genetically modified foods if for centuries we have been safe with their consumption
A case for use of genetically modified foods
    The debate against the use of GM food is not well founded and overlooks several existing facts. In actual sense, fighting the use of genetic food is a brutal refusal of accepting reality. Other than establishing that we have been consuming genetically altered foods over the decades without any harm, its point blank that the existing controversies are more of technical and procedural problems and not safety problems.
    A section of people argue that the transgene (foreign gene in a new organism) is toxic and that it can be transferred to the consumer. The fact is that every day we take up not less than 0.1 to 1 germ of DNA in our meals. A transgene in a GM food would therefore not be new to our system. Furthermore, the transgene is also in insignificant small amounts. Studies also show that foreign DNA introduced through the diet is not directly toxic. Instead, the foreign DNA has been found to be helpful in the functioning of the gut and the immune system. Why then should we think that consuming food products that have been modified will lead to the incorporation of the foreign genes in our genomes In any case, foreign DNA would be broken down by defense mechanisms such as hydrolytic breakdown, excision and silencing of the foreign gene via DNA methylation thus avoiding incorporation and expression in the consuming organism (Hollingworth et al, p 3). The above facts show that the possibility of undesirable effects coming up due to existence of foreign DNA in foods is negligible.
    We recognize that genetically modified foods may have increased risk of developing allergies or heighten allergic reactions in already susceptible individuals (Whitman, para 7). Why are the anti-GMOs focusing on this issue while it is well known that even conventional foods also cause allergies Upon introduction, the kiwi fruit in the United States and Europe in the 1960s, the kiwi fruit did not bring any allergies but has currently caused allergies in some people (Winter  Gallegos, p 1). It is needless to worry about such an issue since there are strict regulatory measures set up to evaluate any possibility of GM foods evoking allergies. The International Life Sciences Institute (ILSI) together with International Food and Biotechnology Council developed a way of assessing allergenicity in GM foods and has gained review approval from the World Health Organization (WHO) and food and Agricultural Organization of the United Nations (FAO) (Hollingworth et al, p 3). With such stringent control measures, the consumers should feel safe consuming GM foods. Genetic engineering may actually solve the problem of allergies as it is for instance possible to modify peanuts to make their proteins non-allergic or less allergic (Jegtvig, para 7). Why cant people focus on such positives and stop assuming some adverse effects
    There are arguments that genetically modified products such as Bt cotton or maize can produce toxins that can harm consumers and handlers. The fact however is that Bt toxins have been found to be safe on humans and animals as they are easily digested. The toxin is however effective on the target pests and this makes the technology superb. The genetic engineers have however been careful to consider every transegene separately thereby leaving the technology almost waterproof.
Regulation of genetically modified foods
    The safety of GM foods is ensured by the stringent regulations maintained by credible regulatory bodies. In the U.S, there are several regulatory and advisory bodies including the Animal and Plant Health Inspectorate Service (APHIS), the Environmental Protection Agency (EPA) and Food and Drug Administration (FDA) (Jason-Smith, para 1). The health concerns about GM foods are well addressed by the FDA as per the federal Food, Drug and Cosmetic Act. Safety requirements are set by FDA and communicated to producers of GM foods thus helping them to achieve the required safety standards. The companies have to submit their products to FDA for approval and if a product does not meet the standards, it is not allowed in the market. No one should fear consuming GM foods since all those that are currently in the market have gone through thorough safety assessment by FDA and have been found safe (Winter  Gallegos, p 2). If we can have confidence on FDA and other recognized food safety agencies when assessing conventional foods, why should we doubt the credibility of these bodies when it comes to GM foods To deal with potent allergens in GM foods, the FDA has established measures that ensure that all producers of genetically modified foods table scientific evidence to show that the product does not contain any allergenic substance. Failure to produce such evidence calls for labeling of the product as a GM food so that consumers are aware (Schneider  Schneider, para 3).
    Although controversy has risen with approval of several GM products in the U.S., no harm has been particularly associated with these. The U.S. has approved commercialization of the Flavr SavrTM Tomato, Bacillus thuringiensis (Bt) corn, the controversial StarLink corn and the L-tryptophan. Some of these have been found to have some adverse effects like the L-tryptophan related deaths in late 1980s but the risks were not as a result the transegene but rather due to lack of other quality control measures (Schneider  Schneider, para 4). This implies that we need not worry of the process of coming up with a safe food product but rather worry whether the product is safe. GM foods in this case are safe but unfortunately critics look into the technology too much and end up criticizing a safe food product.
    Those who worry of introducing antibiotic resistance genes should stop doing so since there is no documented evidence of such a transfer. Furthermore, the introduced genes are usually very negligible. To avoid probable introduction of the genes, the genetic engineering field is able to have the antibiotic resistant genes removed before incorporating the gene into the food product (Winter  Gallegos, p 5). The question of nutritional value of GM foods compared to conventional foods is nothing to worry about since the products are manufactured to meet the nutritional equivalents of conventional foods and if any further modification is done, this aims at improving the value of the food. The work of FDA and other regulatory bodies is to oversee these concerns and to give appropriate guidelines and restrictions.
    Stringent control measures are not only regulated by the U.S. FDA as other countries have even more strict guidelines concerning approval of GM foods. The European Union (EU) for instance is very thorough in this assessment. Manufacturers or importers of GM foods obtain approval from a member state which does case by case risk assessment of the GM food. In addition, the member state gives important information to the EU Commission which then informs other member states and waits for their approval. Failure of approval by a single state means that the food cannot be produced or imported. This rigorous procedure cannot allow health threats to pass through and therefore one should be confident when consumed an EU approved GM food (Berkey, para 4). In essence, regulatory measures and public awareness are the only lacking pieces of knowledge to the public and some governments and the way to consumption of the highly beneficial genetically modified foods will be opened.
    Currently, a new genetic modification known as marker-assisted selection (MAS) has come into the scene and this has proved beneficial and reliable as far as safety concerns are to be considered. This technology should give all consumers confidence of using GM foods since it involves using the organisms own DNA to select for desired characteristics such as quality of meat or plant productivity (Schneider  Schneider, para 7).
    Since no evidence has been documented on the harm caused by GM foods that have passed the necessary regulatory procedures, the anti-GMOs should arise and accept the reality of the potential benefits accrued to the GM foods. Millions of children are suffering from malnutrition whereas others especially in the developing countries die of hunger when a solution is at hand. Imagine of a technology that would ensure that a single food product such as maize containing all the essential nutrients in a diet This would save millions of lives. Unfounded fear of GM foods has posed serious food crisis as well as nutritional crisis.
    Many anti-GM food activists argue from a political perspective and not from an evidence-based position. There is no good reason to deny the public access to the highly beneficial GM products on the basis of whether a product is labeled as a GM food or not. The most essential question to raise here is whether it has gone the proper approval procedures by accredited bodies (World Health Organization, para 6). If however people demand that these products be labeled, then there is no reason why they should not be labeled to promote democracy and choice. The ultimate thing is that whether labeled or not, an approved GM product will always remain safe and beneficial with many of them being better in terms of quality than the conventional or organic foods. Were it not for continued improvement in food productivity from as early as the history of agriculture, man could have fallen short of food production culminate his existence.
Conclusion
    Genetically modified foods that have passed through the right risk assessment stages are already in the market and are safe for consumption. There should not be any fear while consuming such a product unless you are sure that it has not gone through assessment. It is unfortunate that the benefits of these foods have not been reaped by a majority due to lack of proper and reliable knowledge regarding GM foods. It is the responsibility of governments and scientists in this field to pass the accurate information to the public for us to enhance the adoption of this live-saving technology failure to which world food crisis and malnutrition will persist.

Computer Applications in Surgery

A computer applications given to help surgeons  to achieve great results in the patient operations and also technology has taken as the most important part of the surgery to achieve the required of operations, surgeons are using such as robot ,laser devices simulations and imaging scans for easier and safer treatment.
Computer application on surgery involves surgical concept and set methods that use computer technology for surgical planning and for guiding or performing surgical interventions .this can well be known as computer aided surgery, computer assisted intervention, image guided surgery and surgical navigation. The working principle behind this is that the anatomical region to be operated has to be scanned and uploaded into the computer systems where the system converts the results to be readable. This can also involve a number of scanning methods with datasets combined through data fusion technique. Surgery is a traumatic invasion of the body and should be deserved for situations that demand the actual removal of disease or damaged organs or tissue or the correction (social impacts of computer pg183)
The final objective is the creation of three dimensional dataset that reproduces the exact geometrical situation of the normal and pathological tissues and structures of that region. And of the available scanning methods the CT is preferred because MRI datasets are known to have volumetric deformations that may lead to inaccuracy. The following are examples of computer aide surgery
1. Neurosurgery
2. Oral and maxi facial surgery
3. Orthopaedic surgery
4. Visceral surgery
5. Radio surgery
This report focuses on the following sub topics
Benefits of computer
 Application on surgery
Due to computer involvement in robot assisted micro surgeon high dexterity operations with the help of robotic hands can be performed perfectly and this means that the surgeon can be able to carry out a more precise and a highly controlled surgery.
In sarafs article role of robot assisted microsurgery in plastic surgery Indian journal of

Plastic surgery, 39 57-61.following the study and research carried out at the field the

High degree of accuracy is achieved since the surgeon needs not to use his own hands which are prone to tremors or irregular frequency and hand jerk which can cause a defect on a tissue. This problem of tremors is totally eliminated by the help of tremor filters and motion scalpers leading to superior dexterity. Through computer aided surgery, surgeons can easily asses most of the surgical difficulties and risks and have a clear idea how to optimize the surgical approach and decrease surgical mobility. During the operation the computer guidance improves the geometrical accuracy of the surgical gestures and also reduces the redundancy of the surgeons act thus improving the ergonomic in the operating theatre is improved. Computer aided surgery also helps to decrease the risks of surgical errors sand reduces the operating time thus saving more time for taking other operations. The limiting factors basically arise due to undesired involuntary and inadvertent movement of the hand which creates an error component in hand motion (s.saraf 19, 2006)

This technology has also saved surgeons a lot since it reduces the risks involved when handling deadly diseases like Aids which are not curable. as a result of computer application in surgery patients have benefited from it since there is less discomfort  quicker recovery  and return to normal life shortly after surgery as quoted by Haaf Wendy in medical application ,heart surgery report. In spite of the above benefits computer aide surgery has its risks that are involved during the whole process. It also has a potentially invaluable use during microsurgery involving high risk patients patients with HIV, to protect the surgeon from virus transmission (s.saraf 2006)


Risks Involved In
 Computer Aided Surgery
In the article journal of plastic by saraf 39(1), 57-61 New and developing technologies in

the medical or surgical field and furthermore experimental devices might raise new and

unforeseen risks for the patient or even the surgical team involved in the exercise. Ethical

committee of the medic institution have to analyze ethical issues involved for each and

every new developed device or technology and in this manner a lot of time is really

wasted waiting for their decision. High cost of initial development of such technologies

that can be covered mostly by major hospital may raise questions about providing equal

access to medical care for the patients. Most major hospitals have acquired CAT scanners even though the price is around  I million (medicines and computer pg184). Another risks involved this is that when patients

are exposed to the x-ray  the ultra violet rays kills the white blood cells thus destabilizing

 the body and later it can lead to death.

Techniques of robotic
 Surgery

 In the book social impacts of computers medicine and computers, robotic surgery pg188     Performed high quality, tremor free, precise microsurgery without any technological problem and intra operative complications. The robotic systems interacting the patient includes usually three robotic arms to manipulate surgical instrument and a third to position the endoscopic camera at the optimal position. A robotically assisted telescopic camera, controlled by voice commands, gives the surgeon a video picture 10 to 15 times normal magnification camera positions can be saved for rapid return haaf Wendy 2000 July article  heart surgery with a robotic hand

The surgeon controls the position of the robot arms and in turn surgical instruments via the handles at the console and third endoscopic camera arm by a voice command providing the surgeon precise and stable view of the actual surgical field.
The microsurgery technique requires many yeas of training to be proficient the instrument involved virtually became specialized extensions of the surgeons hand .as the outcome in  microsurgery procedure is often dependent on technical quality the enhanced precision provide by robotic systems is likely to have profound effect on the outcome.
As per Bale Melzers in the radiological  society of Europe newsletter (2006)Robotic surgery can be divide  into three depending on the degree of surgeons interaction during the procedure supervisory controlled , telesurgery and shared  controlled surgery. In supervisory controlled systems the procedure is executed solely by the robot which performs the pre-programmed actions .while in a telesurgical system which is also known as remote surgery requires the surgeon to manipulate the robotic arms during the procedure rather than allowing the robotic arms to work from a pre determined program. With shared system the surgeon carries out the procedure with the use of robots that offers steady hand-manipulation of the instrument .in most the working mode can be chosen for each separate intervention depending on surgical complexity and the particularity of the case. The 3-D graphic display gave me an amazing view of the operative field and the hands controls provided precise control over the instruments. In fact I was able to suture with more precision than with conventional surgery (Dr.Galen page 188).

Diagnostic, Pre-operative Planning,
Surgical Simulation
Using specialized software such as osinix the gathered dataset can be rendered as a virtual three dimensional model and can be easily manipulated by the surgeon to provide views from any angle and any depth within the volume thus the surgeon can better asses the case and establish a more accurate diagnostic. The surgical intervention will be planned and stimulated virtually before actual surgery takes place. Using a dedicated softwarethe surgical robot will be programmed to carry out the pre-planned actions during actual surgical intervention.

Lasers technology in
Surgery
Laser and optical technologies have also helped a lot in surgery the most involvement in

removal or targeting of unwanted particle from the tissues by effecting chemical,

mechanical or thermal changes .the technology also can help to reduce excessive fats

from the body and in treating vascular lesions such as port-wine stains among other many

Complications the laser and optical technologies are heading to safer ways day by

day. This is according to Wu, E,  Wong B article 2008 laser and optical technologies in

facial plastic surgery, 10(6)38. Isotope emission of radioactive particles are used to produce nuclear-medicine images which results from the different concentration of radioactive tagged molecule in various tissues( computer applications in health care and biomedicine pg 486)


Surgical robotic technology has really played a great role in peoples lives day by day and any efforts to support it strongly will be highly appreciated so as to help doctors in developing this section which handles delicate parts of the human body.eventhough it continues to entirely depend on programmers to design software as per PJ Connolly. (2000 November) robotic surgery techniques equal safety article InfoWorld, 22(47), 74.