chapter 5 computer software and systems

Upload: jeorj

Post on 08-Apr-2018

224 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/7/2019 CHAPTER 5 COMPUTER SOFTWARE AND SYSTEMS

    1/40

    COMPUTERCOMPUTER

    SOFTWARE ANDSOFTWARE AND

    SYSTEMSSYSTEMS

  • 8/7/2019 CHAPTER 5 COMPUTER SOFTWARE AND SYSTEMS

    2/40

    A. Computer SoftwareA. Computer Software

    Software is the general term applied to theSoftware is the general term applied to the

    instructions that direct the computersinstructions that direct the computers

    hardware to perform workhardware to perform work

    Software consists of instruction communicatedSoftware consists of instruction communicated

    electronically to the hardwareelectronically to the hardware

    2 Purposes of the Software2 Purposes of the Software

    1. It is needed to translate instructions created1. It is needed to translate instructions createdin human language to machine languagein human language to machine language

    2. Packaged or stored software is needed to2. Packaged or stored software is needed to

    make the computer an economical work toolmake the computer an economical work tool

  • 8/7/2019 CHAPTER 5 COMPUTER SOFTWARE AND SYSTEMS

    3/40

    ProgramsPrograms -organized instruction sets supplied to-organized instruction sets supplied to

    the softwarethe software

    PackagePackage a set of related programs a set of related programs

  • 8/7/2019 CHAPTER 5 COMPUTER SOFTWARE AND SYSTEMS

    4/40

    B. Brief History ofComputer Programming

    & Software1800s1800s idea of having computer programs stored on a idea of having computer programs stored on a

    hard drive and brought into memory at the usershard drive and brought into memory at the users

    commandcommand

    Augusta Ada ByronAugusta Ada Byron first described the concept of a stored first described the concept of a stored

    computer programcomputer program

    Charles BabbageCharles Babbage invented the analytical machine invented the analytical machine

    Countess LovelaceCountess Lovelace she theorized the loop concept, it is she theorized the loop concept, it is

    the use of automatic repetitious arithmetic steps to solve athe use of automatic repetitious arithmetic steps to solve a

    problem; she is also the first programmerproblem; she is also the first programmer

  • 8/7/2019 CHAPTER 5 COMPUTER SOFTWARE AND SYSTEMS

    5/40

    Robert Von NewmannRobert Von Newmann proposed that both data and proposed that both data andinstructions could be automatically carried oninstructions could be automatically carried on

    Joseph JacquardJoseph Jacquard invented the Jacquard Loom used to blocks invented the Jacquard Loom used to blocksof wood with holes drilled in such a way that the threads to beof wood with holes drilled in such a way that the threads to bewoven into cloth could form a programwoven into cloth could form a program

    Herman Hollerith (1884)Herman Hollerith (1884) developed a machine that could developed a machine that couldread punch cards and tabulate the resultsread punch cards and tabulate the results

    Punch Card MethodPunch Card Method existed until the late 19600s while inexisted until the late 19600s while inmany computer centers use the method until around 1980many computer centers use the method until around 1980

  • 8/7/2019 CHAPTER 5 COMPUTER SOFTWARE AND SYSTEMS

    6/40

    Rear Admiral Grace Murray HopperRear Admiral Grace Murray Hopper the mother of the mother ofcomputing because she developed many of the conceptscomputing because she developed many of the conceptsand mathematical foundations of computer programmingand mathematical foundations of computer programmingscience; worked with Mark I, the first digital Computer;science; worked with Mark I, the first digital Computer;also coined the term debuggingalso coined the term debugging

    1950s1950s foundation of common business-oriented language foundation of common business-oriented language

    (COBOL) which is the first universal programming(COBOL) which is the first universal programming

    language and first truly English-like languagelanguage and first truly English-like language

  • 8/7/2019 CHAPTER 5 COMPUTER SOFTWARE AND SYSTEMS

    7/40

    BASIC INPUT OUTPUT SYSTEM (BIOS)BASIC INPUT OUTPUT SYSTEM (BIOS) the software on the software on

    the BIOS chip is the first part of the computer to function whenthe BIOS chip is the first part of the computer to function when

    the computer is turned onthe computer is turned on

    OPERATING SYSTEMS (OS)OPERATING SYSTEMS (OS) are the actual software loaded are the actual software loaded

    from the hard rive into RAM as soon as the computer is turnedfrom the hard rive into RAM as soon as the computer is turned

    onon

    C. Types ofSoftware

    1.System Software boots up the computer system(starts up and initializes); controls input, output andstorage; and controls the operations of the application

    software

  • 8/7/2019 CHAPTER 5 COMPUTER SOFTWARE AND SYSTEMS

    8/40

    USER INTERFACESUSER INTERFACES

    a. Disk Operating System (DOS OS)a. Disk Operating System (DOS OS) designed for designed formainframe computers and replicated the proceduresmainframe computers and replicated the procedures

    programmers used under manual OSsprogrammers used under manual OSs

    b. Graphical User Interface (GUI)b. Graphical User Interface (GUI) the computer for the computer for

    everybody, Macintosheverybody, Macintosh

    2. Applications Software2. Applications Software support the actual wok of support the actual wok of

    the user; includes the various programs people use tothe user; includes the various programs people use to

    do work process data, play games, communicate withdo work process data, play games, communicate with

    others, or watch multimedia programsothers, or watch multimedia programs

  • 8/7/2019 CHAPTER 5 COMPUTER SOFTWARE AND SYSTEMS

    9/40

    3. Utility Programs3. Utility Programs used to help maintain the system, used to help maintain the system,

    clean up unwanted programs, protect the system againstclean up unwanted programs, protect the system against

    various attacks, access the World Wide Web (WWW), andvarious attacks, access the World Wide Web (WWW), and

    the likethe like

    - designed to enhance the functions of the OS or perhaps to- designed to enhance the functions of the OS or perhaps to

    add facilities that the basic OS does not offeradd facilities that the basic OS does not offer

    Language Translation UtilitiesLanguage Translation Utilities translation programs translation programs

    are needed to convert instructions written in an English-are needed to convert instructions written in an English-like language into binary. These types of translationlike language into binary. These types of translation

    programs are calledprograms are called assemblers, compilers, orassemblers, compilers, or

    interpretersinterpreters

    The World Wide Web and Web BrowsersThe World Wide Web and Web Browsers WWWWWWprovides a protocol for document transfer across theprovides a protocol for document transfer across the

    internet; ainternet; a Web BrowserWeb Browser is a utility program thatis a utility program that

    allows the user to access the web and the materialsallows the user to access the web and the materials

    available through the webavailable through the web

  • 8/7/2019 CHAPTER 5 COMPUTER SOFTWARE AND SYSTEMS

    10/40

    Programming LanguagesProgramming Languages means of communicating with means of communicating withthe computerthe computer

    Generations and Levels of Programming LanguagesGenerations and Levels of Programming Languages

    Divided into 5 generations, or in sometimes at 3 levelsDivided into 5 generations, or in sometimes at 3 levels

    Level refers to how close the language is to the actualLevel refers to how close the language is to the actualmachinemachine

    1. First Level (includes the first 2 generations of1. First Level (includes the first 2 generations ofprogramming: machine language and assembly language)programming: machine language and assembly language)

    2. Second Level (includes high-level procedural and2. Second Level (includes high-level procedural and

    nonprocedural languages)nonprocedural languages)

    3. Third Level (includes natural language; also the 5th3. Third Level (includes natural language; also the 5thgeneration)generation)

  • 8/7/2019 CHAPTER 5 COMPUTER SOFTWARE AND SYSTEMS

    11/40

    Machine LanguageMachine Language true language of the true language of thecomputercomputer

    Assembler LanguageAssembler Language far more English-like, but far more English-like, but

    still very close to machine languagestill very close to machine language

    Third Generation LanguagesThird Generation Languages include the include theprocedural and nonprocedural languages and wereprocedural and nonprocedural languages and werethe beginning of the second level in programmingthe beginning of the second level in programminglanguageslanguages;; the style and sequence of a languagethe style and sequence of a languageare called syntaxare called syntax

    Fourth Generation Languages specialized applicationprograms that require more involvement of the user in directingthe program to do necessary work

    Fifth Generation Languages or third level languages arealso called natural language; user tells the machine what to doin the users own natural language or through the use of a set of a

    very English-like commands

    Visual Programming LanguagesVisual Programming Languages facilitate program facilitate program

    development in graphics-based environmentsdevelopment in graphics-based environments

  • 8/7/2019 CHAPTER 5 COMPUTER SOFTWARE AND SYSTEMS

    12/40

    D. Common Software

    Packages forMicrocomputers

    Standard Office PackageStandard Office Package - most common package sold- most common package soldwith computers; includes a word-processing program, awith computers; includes a word-processing program, a

    spreadsheet, a presentation graphics program, and somespreadsheet, a presentation graphics program, and some

    form of data-base management systemform of data-base management system

    2 Most Commonly Used Programs2 Most Commonly Used Programs

    1. E-mail Systems1. E-mail Systems

    2. Word Processor2. Word Processor

  • 8/7/2019 CHAPTER 5 COMPUTER SOFTWARE AND SYSTEMS

    13/40

    E. Software PackageE. Software Package

    Ownership RightsOwnership Rights The software industry has followed an ownership model moreThe software industry has followed an ownership model more

    similar to that of the book publishing industry, in order to avertsimilar to that of the book publishing industry, in order to avertusers not to distribute the programsusers not to distribute the programs

    When a commercial product is sold, the buyer can not use theWhen a commercial product is sold, the buyer can not use theproduct or resell it or loan it to a friend if so desiredproduct or resell it or loan it to a friend if so desired

    Copying the product is not feasibleCopying the product is not feasible

    Any other installations, apart from the original purchasers, wereAny other installations, apart from the original purchasers, wereconsidered illegalconsidered illegal

    An exception can be made if the purchaser has both a desktop andAn exception can be made if the purchaser has both a desktop anda laptop, fair use allow him to install programs on all the machinesa laptop, fair use allow him to install programs on all the machineshe owns, so long as the computers are for his personal use onlyhe owns, so long as the computers are for his personal use only

  • 8/7/2019 CHAPTER 5 COMPUTER SOFTWARE AND SYSTEMS

    14/40

    Companies that have multiple computers that are used byCompanies that have multiple computers that are used bymany employees must purchase a separate copy for eachmany employees must purchase a separate copy for eachmachine, or purchase a site license (a way of buying inmachine, or purchase a site license (a way of buying inbulk or so to speak)bulk or so to speak)

    What is not permitted, in fact a from of theft, is to installWhat is not permitted, in fact a from of theft, is to installmore copies of the software than were paid formore copies of the software than were paid for

  • 8/7/2019 CHAPTER 5 COMPUTER SOFTWARE AND SYSTEMS

    15/40

    F. Common SoftwareF. Common Software

    Useful to NursesUseful to NursesSoftware used by nurses includesSoftware used by nurses includes admission, discharge,admission, discharge,and transfer (ADTand transfer (ADT) systems that help with patient) systems that help with patienttracking, andtracking, and medication administration record (MARmedication administration record (MAR))softwaresoftware

    Computer Physician Order Entry (CPOE)Computer Physician Order Entry (CPOE) is alsois alsoconsidered, a system to be so important that they list it asconsidered, a system to be so important that they list it asa separate item on their quality checklista separate item on their quality checklist

    Chat RoomsChat Rooms are like electronic conference calls are like electronic conference calls

    Electronic Bulletin BoardsElectronic Bulletin Boards creates space where users creates space where userscan post a messagecan post a message

    List ServersList Servers the least powerful version of an electronic the least powerful version of an electronicbulletin boardbulletin board

  • 8/7/2019 CHAPTER 5 COMPUTER SOFTWARE AND SYSTEMS

    16/40

    G. ComputerG. Computer

    ProgrammingProgramming Refers to the process of writing a computer program,Refers to the process of writing a computer program,

    which is a series of instructions written in properwhich is a series of instructions written in proper

    sequence to solve a problemsequence to solve a problem

    5 Major Steps

    Problem Definition (functional specifications Program Design

    Writing the Code and Program Documentation

    Alpha Testing

    Beta Testing and Program Documentation

    Problem or Functions Specification requires that theproblem or task be very precisely defined and theprocedures to be performed by the program be perfectlymisunderstood into the programming language to be used

  • 8/7/2019 CHAPTER 5 COMPUTER SOFTWARE AND SYSTEMS

    17/40

    Program Design SpecificationsProgram Design Specifications

    2 Types of specifications2 Types of specifications

    1. Set of functional specifications that identifies all the1. Set of functional specifications that identifies all the

    functions thefunctions the

    program is to performprogram is to perform

    2. (SPECS) Design specs instructions given to the2. (SPECS) Design specs instructions given to theprogrammerprogrammer

    Program PreparationProgram Preparation - the actual writing (coding) of the program,- the actual writing (coding) of the program,entails translating the design specifications into the programmingentails translating the design specifications into the programminglanguage to be usedlanguage to be used

    DocumentationDocumentation

    2 Types of Documentation that Must be Produced2 Types of Documentation that Must be Produced

    1. The program itself should be designed in a highly structured,1. The program itself should be designed in a highly structured,top-down manner, and the lines of the code should be liberallytop-down manner, and the lines of the code should be liberallysprinkled with explanatory statementssprinkled with explanatory statements

  • 8/7/2019 CHAPTER 5 COMPUTER SOFTWARE AND SYSTEMS

    18/40

    2. Users Manual provides clear directions and examples of2. Users Manual provides clear directions and examples ofhow to makehow to make

    the program work as intendedthe program work as intended

    Program TestingProgram Testing

    Alpha TestingAlpha Testing also called desk checking, its purpose is also called desk checking, its purpose isto see if all the processes appear to be functioning asto see if all the processes appear to be functioning as

    specified in the flow charts, functional specifications, andspecified in the flow charts, functional specifications, anddesign specsdesign specs Beta TestingBeta Testing the program is installed in the actual user the program is installed in the actual user

    environment, and further programming of screen formatsenvironment, and further programming of screen formatsand other user interface functions is performedand other user interface functions is performed

    Program ImplementationProgram Implementation the final step in programming; the final step in programming;the program is implemented throughout the beta sitethe program is implemented throughout the beta site

  • 8/7/2019 CHAPTER 5 COMPUTER SOFTWARE AND SYSTEMS

    19/40

    H. Computer SystemsH. Computer Systems

    It is a complex entity, consisting of an organizedIt is a complex entity, consisting of an organizedset of interconnected components or factors thatset of interconnected components or factors that

    function together as a unit to accomplish resultsfunction together as a unit to accomplish resultsthat one part alone could notthat one part alone could not

  • 8/7/2019 CHAPTER 5 COMPUTER SOFTWARE AND SYSTEMS

    20/40

    I. Systems TheoryI. Systems Theory

    Provides the conceptual basis for understanding complexProvides the conceptual basis for understanding complexentities that consist of multiple interrelated parts workingentities that consist of multiple interrelated parts workingtogether to achieve a desired result. Such entities aretogether to achieve a desired result. Such entities arecalled called systemssystems

    Primary Propositions of the TheoryPrimary Propositions of the Theory

    1. A system takes in input on which to perform processes1. A system takes in input on which to perform processes

    2. The processes performed by a system on input result in2. The processes performed by a system on input result insystem outputsystem output

    3. The processes in a system are subject to control forces3. The processes in a system are subject to control forces

    4. Feedback is the key mechanism of control in a system4. Feedback is the key mechanism of control in a system

  • 8/7/2019 CHAPTER 5 COMPUTER SOFTWARE AND SYSTEMS

    21/40

    5. A systems parts interact in such a way that the parts are5. A systems parts interact in such a way that the parts areinterdependent with the respect to the systems processesinterdependent with the respect to the systems processes

    6. Impingement on one part in a system will produce effects on the6. Impingement on one part in a system will produce effects on thesystems processes and may produce distortions on the other partssystems processes and may produce distortions on the other partsof the system. A corollary to this proposition is the followingof the system. A corollary to this proposition is the following

    7. Distortion in one part of a system may be a symptom of a problem7. Distortion in one part of a system may be a symptom of a problemin another component (Secondary Malfunction)in another component (Secondary Malfunction)

    8. Thus, correction of a malfunctioning part will correct the system8. Thus, correction of a malfunctioning part will correct the systemfunctioning only if the malfunction was a primary malfunction andfunctioning only if the malfunction was a primary malfunction andnot a secondary malfunctionnot a secondary malfunction

    9. Effects on the systems processing function will affect the systems9. Effects on the systems processing function will affect the systemsoutputoutput

  • 8/7/2019 CHAPTER 5 COMPUTER SOFTWARE AND SYSTEMS

    22/40

    10. A system is more than the sum of its parts. Thus, while a10. A system is more than the sum of its parts. Thus, while asystem can be broken down into its component parts, if thissystem can be broken down into its component parts, if thisis done, the system no longer exists. Corollaries to thisis done, the system no longer exists. Corollaries to thisproposition are the following:proposition are the following:

    (a) The functioning of a system is different than the(a) The functioning of a system is different than thefunctioning of its partsfunctioning of its parts

    (b) The output of each separate part, even if combined, does(b) The output of each separate part, even if combined, doesnot equal the output of the systemnot equal the output of the system

    (c) When combined into a system, the component parts form(c) When combined into a system, the component parts forman entirely new entityan entirely new entity

  • 8/7/2019 CHAPTER 5 COMPUTER SOFTWARE AND SYSTEMS

    23/40

    J. System ElementsJ. System Elements

    1. Interdependent Parts 1. Interdependent Parts the most defining attribute of athe most defining attribute of asystem is that its parts interact to conduct some processsystem is that its parts interact to conduct some process

    2. Input 2. Input is any factor from the external environment that isis any factor from the external environment that istaken into the systemtaken into the system

    3. Process 3. Process the activity of the systemthe activity of the system

    4. Output 4. Output any product or waste produced as a result ofany product or waste produced as a result ofsystem processsystem process

    5. Control 5. Control refers to any component or activity that serves torefers to any component or activity that serves toprevent or correct problems or errors in the systems input,prevent or correct problems or errors in the systems input,process, outputprocess, output

    6. Feedback 6. Feedback is output from one part of a system process thatis output from one part of a system process thatserves as input to another part of a system processserves as input to another part of a system process

  • 8/7/2019 CHAPTER 5 COMPUTER SOFTWARE AND SYSTEMS

    24/40

    K. Classification ofK. Classification of

    SystemsSystems

    Closed Systems Closed Systems a system with the followinga system with the followingcharacteristics: differentiation, isolation, independence,characteristics: differentiation, isolation, independence,and self-sufficiency (self-containment or self-regulation)and self-sufficiency (self-containment or self-regulation)

    Open Systems Open Systems systems that exhibit integration, fluidsystems that exhibit integration, fluidor fuzzy boundaries, and interaction with theiror fuzzy boundaries, and interaction with theirenvironments (Markas, 2002)environments (Markas, 2002)

  • 8/7/2019 CHAPTER 5 COMPUTER SOFTWARE AND SYSTEMS

    25/40

    Figure 5.8

    Open System Interactions

    CDCinfectious

    disease

    database

    State healthoutcomes

    database &

    benchmark file

    Post-surgical

    infections in

    hospital

    database

    CDC co-funded

    university study of

    incidence of infections in5-state region

    Hospital

    consortium

    database

  • 8/7/2019 CHAPTER 5 COMPUTER SOFTWARE AND SYSTEMS

    26/40

    IV CPU

    Measure blood

    pressure every 30

    minutes

    Administer ordered

    dose of

    antihypertensive

    BP too

    high

    No

    Yes

    Figure 5.7Closed system with feedback loop

  • 8/7/2019 CHAPTER 5 COMPUTER SOFTWARE AND SYSTEMS

    27/40

    L. Computer SystemsL. Computer Systems

    Used to describe the set ofUsed to describe the set of

    peripherals, computer box,peripherals, computer box,and software that togetherand software that together

    perform computing functionsperform computing functions

    for one or more usersfor one or more users

  • 8/7/2019 CHAPTER 5 COMPUTER SOFTWARE AND SYSTEMS

    28/40

    M. Information SystemsM. Information Systems

    The collection and integration of various pieces of hardwareThe collection and integration of various pieces of hardwareand software and the human resources that meet the dataand software and the human resources that meet the datacollection, storage, processing, and report generation needs ofcollection, storage, processing, and report generation needs ofan organizationan organization

    Information System TypesInformation System Types1. Management Information Systems 1. Management Information Systems an organizedan organizedsystem for managing the flow of information in an organizationsystem for managing the flow of information in an organizationin a timely mannerin a timely manner

    2. Bibliographic Retrieval Systems2. Bibliographic Retrieval Systems a retrieval system that a retrieval system that

    generally refers to bibliographic data, document information, orgenerally refers to bibliographic data, document information, orliteratureliterature

    3. Stand-Alone, dedicated, or Turnkey Systems 3. Stand-Alone, dedicated, or Turnkey Systems developed for a single application or set of functionsdeveloped for a single application or set of functions

  • 8/7/2019 CHAPTER 5 COMPUTER SOFTWARE AND SYSTEMS

    29/40

    4. Transaction Systems4. Transaction Systems used to process predefined transactions used to process predefined transactionsand produce predefined reportsand produce predefined reports

    55.. Physiologic Monitoring Systems Physiologic Monitoring Systems are being used moreare being used more

    frequently to measure and monitor continuous automaticfrequently to measure and monitor continuous automaticphysiologic findings; provide alarms to detect significantphysiologic findings; provide alarms to detect significantabnormal findings when personnel are needed to provide patientabnormal findings when personnel are needed to provide patientcare and save livescare and save lives

    66.. Decision Support Systems Decision Support Systems support some aspect of thesupport some aspect of thehuman decision-making processhuman decision-making process

    77.. Expert Systems Expert Systems contain the information and decision-makingcontain the information and decision-makingstrategies of an expert to assist non-experts in decision-makingstrategies of an expert to assist non-experts in decision-making(Marakas, 2003); designed for users to stimulate the cause and(Marakas, 2003); designed for users to stimulate the cause andeffect reasoning that an expert would use if fronted with theeffect reasoning that an expert would use if fronted with thesame situation in a real live environmentsame situation in a real live environment

  • 8/7/2019 CHAPTER 5 COMPUTER SOFTWARE AND SYSTEMS

    30/40

    88.. Artificial Intelligence Systems Artificial Intelligence Systems (AI System) attempts(AI System) attempts

    to model human reasoning processesto model human reasoning processes

    99.. Natural Language Systems Natural Language Systems can understand andcan understand and

    process commands given in the users own natural, spokenprocess commands given in the users own natural, spoken

    languagelanguage

  • 8/7/2019 CHAPTER 5 COMPUTER SOFTWARE AND SYSTEMS

    31/40

    N. Hospital InformationN. Hospital Information

    Systems (HIS)Systems (HIS)

    Sometimes called aSometimes called a medicalmedical

    information system (MIS)information system (MIS) oror

    patient care system (PCSpatient care system (PCS),),

    provides support for a wideprovides support for a widerange of both administrativerange of both administrative

    and clinical functions; theand clinical functions; the

    purpose of anpurpose of an HISHIS is tois to

    manage information needed tomanage information needed to

    facilitate daily hospitalfacilitate daily hospitaloperations by all health careoperations by all health care

    personnelpersonnel

  • 8/7/2019 CHAPTER 5 COMPUTER SOFTWARE AND SYSTEMS

    32/40

    HIS Configurations HIS Configurations the most common configuration uses athe most common configuration uses amainframe computer with hardwired terminals or workstationsmainframe computer with hardwired terminals or workstations

    Program Modules Available in HIS Program Modules Available in HIS include a wide variety ofinclude a wide variety of

    administrative applications (modules) such as admission andadministrative applications (modules) such as admission anddischarge, patient tracking, finance, payroll, billing, budgetingdischarge, patient tracking, finance, payroll, billing, budgetingsupport, inventory, and management reporting programssupport, inventory, and management reporting programs

    Semiclinical ModulesSemiclinical Modules

    2 Modules2 Modules

    1. ADT1. ADT -module monitors and sometimes controls the flow of-module monitors and sometimes controls the flow ofpatients in a hospital from admission to dischargepatients in a hospital from admission to discharge

    2. OE2. OE the order-entry-results-reporting module; order entry the order-entry-results-reporting module; order entrymeans that staff can enter laboratory, pharmacy, and radiologymeans that staff can enter laboratory, pharmacy, and radiologyorders online; means that the lab, pharmacy, and radiology canorders online; means that the lab, pharmacy, and radiology canenter the results in a computer system and have those availableenter the results in a computer system and have those availableto the nursing unitto the nursing unit

  • 8/7/2019 CHAPTER 5 COMPUTER SOFTWARE AND SYSTEMS

    33/40

    Clinical Support ModulesClinical Support Modules Charting SystemsCharting Systems includes medical administration includes medical administration

    reports, admission assessments, special assessments, atreports, admission assessments, special assessments, at

    least some elements of nursing care plan, vital signs records,least some elements of nursing care plan, vital signs records,wound care, and hygienic care recordswound care, and hygienic care records

    Point-of-Service Systems (POS)Point-of-Service Systems (POS) uses a hand-held or uses a hand-held orbedside PC to ensure that data are entered at the point atbedside PC to ensure that data are entered at the point atwhich they are collectedwhich they are collected

    Laboratory, Pharmacy, and Radiology ModulesLaboratory, Pharmacy, and Radiology Modules tracks tracksthe specimen through various laboratory stages, generatesthe specimen through various laboratory stages, generatesthe results, and communicates the findings to patientsthe results, and communicates the findings to patientsmedical record; tracks medication orders and changes inmedical record; tracks medication orders and changes inorders; separate products developed by companies thatorders; separate products developed by companies thatspecialize in diagnostic computer imaging systemsspecialize in diagnostic computer imaging systems

  • 8/7/2019 CHAPTER 5 COMPUTER SOFTWARE AND SYSTEMS

    34/40

    O. Network SystemsO. Network Systems

    A network is a set ofA network is a set of

    interconnected computers that,interconnected computers that,

    through hardware and softwarethrough hardware and software

    technology, work cooperativelytechnology, work cooperatively

    for the purpose of informationfor the purpose of information

    and application programand application program

    interchangeinterchange

  • 8/7/2019 CHAPTER 5 COMPUTER SOFTWARE AND SYSTEMS

    35/40

    2 Essential Factors for Any Network2 Essential Factors for Any Network

    HardwareHardware

    Network Communication SoftwareNetwork Communication Software

    Advantages to CompaniesAdvantages to Companies

    1. Efficiencies Related to Storage and Data Integrity1. Efficiencies Related to Storage and Data Integrity

    2. Software Savings2. Software Savings

    3. Savings in Human Time and Efficiency3. Savings in Human Time and Efficiency

  • 8/7/2019 CHAPTER 5 COMPUTER SOFTWARE AND SYSTEMS

    36/40

    Network FunctionsNetwork Functions

    1. File transfer1. File transfer

    2. Information availability2. Information availability

    3. Resource sharing3. Resource sharing

    4. Online transaction4. Online transaction5. Provision of a powerful communication medium5. Provision of a powerful communication medium

    6. Interactive environment6. Interactive environment

    7. Education and Entertainment7. Education and Entertainment

    8. E-mail8. E-mail

    Network Security

    Vacuum Tubes were vulnerable to heat and dirt. Therefore,mainframe computer systems required a closed, air-

    conditioned environment

    Electronic security is even more important

  • 8/7/2019 CHAPTER 5 COMPUTER SOFTWARE AND SYSTEMS

    37/40

    Password protectionPassword protection can be enough security for mostcan be enough security for mostsystems, provided that people give their passwords thesystems, provided that people give their passwords theproper handling and respectproper handling and respect

    FirewallsFirewalls are specialized routers that carefully inspectare specialized routers that carefully inspecteach incoming packets of informationeach incoming packets of information

    EncryptionEncryption, another layer of protection,, another layer of protection,means that themeans that thedata are converted into a cipher, or a code of some kinddata are converted into a cipher, or a code of some kind

    Types of NetworksTypes of Networks

    1. Local Area Network (LAN)1. Local Area Network (LAN) a data network a data networkintended to serve a single building or a group of buildingsintended to serve a single building or a group of buildingsin close proximity to each otherin close proximity to each other

    2. Wide Area Network (WAN)2. Wide Area Network (WAN) system of connected system of connectedcomputers spanning a large geographical area, often acomputers spanning a large geographical area, often acontinent or countrycontinent or country

  • 8/7/2019 CHAPTER 5 COMPUTER SOFTWARE AND SYSTEMS

    38/40

    Popular Search EnginesPopular Search Engines 1. Altavista1. Altavista

    2. Yahoo!2. Yahoo!

    3. Google3. Google

    4. 37.com4. 37.com

    5. Go2net5. Go2net

    Navigating the Internet:Navigating the Internet: In order to enterIn order to enterthe Internet, the user must have an Internetthe Internet, the user must have an Internet

    Service Provider (ISP) and a Web BrowserService Provider (ISP) and a Web Browser

    3. The Internet3. The Internet is a network of networks is a network of networks

  • 8/7/2019 CHAPTER 5 COMPUTER SOFTWARE AND SYSTEMS

    39/40

    Web BrowserWeb Browser is a program that is used to visit Web is a program that is used to visit Webpages; it works by using a special protocol calledpages; it works by using a special protocol called HTTPHTTP

    World Wide WebWorld Wide Web is a hypertext-based, subset of the is a hypertext-based, subset of theInternet that uses a combination of text, graphics, audio,Internet that uses a combination of text, graphics, audio,and video to provide information on almost every subjectand video to provide information on almost every subject

    imaginableimaginable

    Hypertext Markup LanguageHypertext Markup Language the language used to the language used tocreate hypertext documentscreate hypertext documents

    Hypertext and HyperlinksHypertext and Hyperlinks hypertext is a document, hypertext is a document,written inwritten in HTMLHTML, which contains automated links, which contains automated links(hyperlinks) to other documents, which may or may not also(hyperlinks) to other documents, which may or may not alsobe hypertext documentsbe hypertext documents

  • 8/7/2019 CHAPTER 5 COMPUTER SOFTWARE AND SYSTEMS

    40/40

    THE ENDTHE ENDPRESENTED BY:PRESENTED BY:RALPH P. LLANES JR., S.NRALPH P. LLANES JR., S.NBSN II-1BSN II-1

    SUMMER 2009-2010SUMMER 2009-2010