Chapter 1

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 59

Chapter 1

Fatima Ashraf
What is Hardware?
• Hardware are the physical components which make up the computer system.
• Each item of hardware have their specific roles in a computer system.
• Hardware components can either be internal or external.
1.1 Hardware and Software
Internal hardware devices

Central Processing Unit (CPU)

The CPU is the 'brain' of the computer. It is the device that carries
out calculations to complete software instructions.

Motherboard

The motherboard is circuit board which is connects to main


components of the computer system.

Memory

Any data or instructions that are to be processed by the CPU must


be placed into main memory.
Graphic Video Cards
A graphics card is a device that attaches to the motherboard to
enable the computer to process and display graphics.

Sound Card
A sound card is a device that attaches to the motherboard to enable
the computer to input, process, and deliver sound

Internal Hard Disk


A hard disk drive is a hardware device that's used to store
information like software and files. The capacity of hard drive
ranges from GB to Tera Bytes.
Network Card
A network card provides the computer with a network (internet
connection) either through wireless signals or a physical cable
connection.
Optical Disk Drive
The optical disk drive (CD/DVD/Blu-Ray) allows for optical disks to
run on the computer. Also some optical disk drives are able to write
“burn” data onto discs.

Power Supply
The power supply is connected to main power sources to give
power to the computer system. The power supply connects to all
the main components of the computer system including the
motherboard, hard drive, optical drives etc.
External hardware devices

Input Hardware Devices – Input data into a Computer


Examples
• Mouse
• Keyboard
• Microphone

Output Hardware Devices – Outputs data from a computer


Examples
• Monitor
• Speakers
• Printers

External Storage Devices – Provides external storage or backup solutions


Examples
• External Hard
drive
Computer Software
What is Software?

Software is a collection of instructions that can be ‘run’ on a computer. These


instructions tell the computer what to do.

Software is not a physical thing (but it can of course be stored on a physical


medium such as a CD-ROM), it is just a bunch of codes.

For a computer system to be useful it has to consist of both hardware and


software.
Applications Software and System Software

Application Software
Examples Application software are designed to allow users to
• Word Processor complete specific tasks. This may be to:
• Spreadsheet • Write a letter/Present information
• Databases
• Browse the internet
• Manipulate data in a spreadsheet or database
• Manipulate graphics, sound or video.
System Software
Examples System software are normally involved in the running
• Operating of the computer:
Systems • Operating systems to provide a user interface
• Device Drivers
• Utilities • Device drivers which allow hardware components to
(antivirus) work.
• Utility software which maintain the computer
performance.
Application Software Examples

Word Processing Spreadsheet Database


Used to prepare reports, Use to create to organise and Database is used to insert
school essays etc. manipulate numeric data. and organise data using
fields and records.

• Create New or edit • Use of various formulas to • Create a table so that


existing text documents. carry out set tasks: records can be inserted.
• Formatting tools • Sum, Max, Min, Average • Run queries using search
• Create font styles • Count, CountA criteria to find specific
• Importing tables/images • CountIf & SumIF data.
• Spell Check • Lookups • Create reports including
• Copy/Paste • IF and Nested Ifs labels from the search
• Find/Replace • Apply various formatting to criteria.
• Page layout cells/
• Create graphs (Ba/Pie charts)
Application Software Examples

Photo Editing Graphics Manipulation Video Editing


Used to edit digital images to Used to create and edit Used to edit and format video
either touch up or to apply bitmap and vector graphics. using various tools and
various formatting techniques.
techniques.

• Contrast/Brightness • Pixels in bitmap images • Split and Trim videos


• Use of layers can be changed to • Create split screens
• Filter tools produce a different image. • Rearranging order of clips.
• Lighting effects • Vector images use: • Transitions between clips
• Liquify (change features of • Lines (Fade)
a face) • Curves • Inserting Audio
• Brush tools • Text • Applying filters and using
• Clone/Stamp tool video enhancement
techniques
Application Software Examples

Apps (Phone Applications) Measuring and Control Software


Apps are the software which runs on mobile Measuring and control software which are
phones. They usually come with the phone or responsible for changing physical conditions in
can be downloaded and updated. an environment.

• Games (Angry Birds) Measuring


• Video/Music Streaming (YouTube) • Sensors take readings which are processed
• Social Media (Facebook, Twitter, by the computer or microprocessor.
Instagram)
• Communication (WhatsApp, Viber) Control Software
• Camera (Editing images) • By comparing sensor readings to a pre-set
• GPS (Satellite navigation) level the control software will decide on an
• Health/ Fitness output (For example to increase or decrease
the heat in a green house.
System Software Examples

Operating Systems Device Drivers

Manages computers functions Allows hardware devices to


including hardware devices run on the computer
(input/output). Also provides including printers, sound,
users with a GUI interface graphics and network cards.

System
Software

Utilities
Compiler
Help to manage and
Linkers Translates a program written
maintain computer
resources and In a specific language which
performance by running Combines object files Can be understood by the
specific tasks. produced by a complier into a computer.
A single program.
Describe the central processing unit including its role

• The CPU is the 'brain' of the computer.

• It is where all the searching, sorting, calculating


and decision making takes place.

• The speed of the CPU is measured in Gigahertz


(GHz).

• A 1 GHz CPU can carry out 1 billion instructions


per second!

• Intel and AMD are the most popular CPU brands.


Main Memory

Applications are installed in the Secondary Storage (Hard drive).

Temporary data from Applications in use are held in the Main Memory.

The CPU will first check the Cache for the required piece of the data so that it can
be processed.

If the data is not in the cache then the CPU will check the RAM and transfer data to
the CPU.

The Cache will then transfer the next piece of data from the RAM into Cache.

The CPU will again check the Cache for the next piece of data. This time the CPU will
be able to get the data from the Cache Memory.
Main Memory
Cache

• Cache is the fastest type of Memory.

• It is located between the processor and the RAM.

• Cache collects data from the RAM.

• Holds onto commonly used data.

• The Cache will automatically transfer the next set


of data from the RAM in to the Cache so that it
can be processed by the CPU.
RAM (Random Access Memory)

• RAM stands for Random Access Memory

• RAM is the part of the computer that temporarily


stores the instructions that the computer is
running whilst the data is being processed by the
CPU.

• RAM is volatile which means that when the


computer is turned off all data is lost
ROM (Read Only Memory)

• ROM stands for Read Only Memory

• ROM is a built in memory that can not be changed


(Read Only).

• ROM normally holds the ‘boot up’ instructions to


start the computer – without it the computer
wouldn’t know what to do when on button is
switched on (e.g. the operating system will not
start).

• ROM is non-volatile memory which means that


memory is not lost when computer is turned off.
Input and Output devices

Devices need to be connected to a computer to allow data to be inputted and


outputted.

The general name for these extra devices is ‘peripheral devices’. They are usually
categorised into input devices, output devices and storage devices.

Input Output Storage

An input device is a device that can pass date into the computer
Devices that take data from the computer are known as output devices.
Define secondary/backing storage

Backing storage is also known as secondary storage

Backing storage is non-volatile which means that


data is not lost when computer is turned off.

Backing storage is used to store data for a long time


(data can be read from and written to)

Users tend to make copies of original files on


backing storage.
Exam Question
• Describe the main functions of the operating system? Key Words: User Interface,
Security, Files, memory, applications, input/output/storages devices

• The operating system provides the user interface which allows the user to
interact with the system. In addition the operating system provides security and
prevents unauthorized access to a system. Files and folders can be created and
organized. Furthermore the operating system allows users to load, run and store
applications also decides what should be loaded into the computer memory
(RAM). The operating system also manages the input/output/storages devices.
WIMP
Command Line Interface (CLI)
• A command line interface is an older style operating system where
users type in commands using keyboard.
• Command Line Interface's do not make use of images, icons or
graphics. All the user is sees is a plain black screen like the one to the
right.
• Because they use no graphics they require very little computer power.

• There are over 270 different commands that can be entered at the
command prompt. Commands have to be entered precisely without
spelling mistakes or else the operating system will return an error.
• Remembering commands and the exact way to enter them can be difficult
and so Command Line Interface Operating Systems are considered hard
to use.
Graphical User Interface (GUI)
• GUI's are visual (graphical) interfaces and they are more popular
than CLI's because they are very easy to use. The graphics do
need more computer power however.
• Instead of typing in commands, the user can use a mouse to point
and click objects on the screen.
• The main features of a GUI
are Windows, Icons, Menus and Pointers. Its called WIMP.
WIMP
• Windows
• The user can divide the screen into separate areas known as 'windows'. These windows can be anything from
folders to software applications.
• Windows allow you to work on several tasks at the same time.

• Icons
• Icons are 'symbols' or small images / graphics that are used to represent files and commands. Icons can be
clicked to carry out a function or open a file etc. The user operates a mouse to move a pointer over the icon and
then clicks it to activate the function.
• Icons are also used to represent folders.

• Menus
• These allow users to select functions from a list. Each item in the list will perform a different function.
• Menus usually either 'pop-up' or 'drop-down'. The navigation used at the top of this web site are examples of
drop-down menus.

• Pointers
• Pointers are little arrows that you move across the screen by directing your mouse. Pointers can be used to:
• Select and use icons
• Select options found in menus
• Reposition folders and icons on the screen.
Touchscreen Interfaces
• Portable devices such as mobile phones, PDA's and tablets (e.g.
iPad) use interfaces similar to a GUI (WIMP) where icons and
menus are used to input commands.
• However, because these devices don't have room for a mouse,
the way in which the icons and menus are used is different.
• Touchscreen technology allows people to use their fingers to
select icons and options straight from the device's screen.
Exam Question
• Discuss the difference between a CLI and GUI interface? Key Words: Windows,
Icons, Menus, Pointers, visuals aids, learn, command prompts, pre-determined
options, expert user

• The GUI (Graphical user interface) allows the users to interact with the interface by
using a pointer to select windows, icons and menu options. The GUI will have visual
aids which it make it easier for users to learn how to use the interface. On the other
hand users are required to enter command prompts to interact with the CLI
(Command Line Interface). The command prompts have to be learned by the user
and entered correctly. This would make the CLI interface more challenging to for
the user to learn. However the advantage of using the CLI for expert users is that
you are not restricted to pre-determined options which would be the case in the
GUI. This would allow for greater freedom when using the CLI.
Post-WIMP
• Pinching
• This is where you pinch your fingers together across a touchscreen
to zoom into an image, application or document on your device.
• You can also move your fingers apart to zoom out.

• Rotating
• This is where you use two fingers - one finger moves up while the
other finger moves down the touch screen to rotate an object.

• Swiping
• Swiping is where you swipe your finger across the touchscreen
to scroll through a document or turn the page.
Types of Computers
Describe the characteristics of a personal/desktop computer and its uses, both as
a standalone and networked computer

Desktop/Personal Computer

• Computers used to be huge and would sometime take


up the whole space of a room.
• In the 1980s (desktop/personal) computers were
created and were small enough to fit on desks.
• These computers were cheap and affordable for the
public.
• Desktop Computer normally have a separate monitor,
keyboard, mouse, speakers etc.
Standalone Networked
• Can be used as a standalone • Share resources
computer in your home for • Share files
personal or work use. • Shared Drives
• Tends to be connected to • Central Storage
own printer and internet • Online Gaming
connection.
Describe the characteristics of a laptop computer and what it is used for, both as a
standalone and networked computer

Laptop Computer

• Laptops refers to a computer where all the components


(monitor, keyboard etc.) are together on a single device.
• The main advantage of a laptop computer is that it is
portable and can connect wirelessly to network
connections.

Standalone Networked
Can be used for either personal • Connect to Internet
or work use. • Share resources
• Completing work • Share files
• Communication • Shared Drives
• Gaming • Central Storage
• Online Gaming
Describe the characteristics of a tablet computer and what it is used for, including
its ability to use wireless technology or 3G/4G technology

Tablet Computer

• Tablets are very similar to smart phones.


• They have an internet connection via a wireless
connection including 3G/4G.
• Tablets make use of touch screen technology to select
options on a menu or to select particular icons.
• Applications can be downloaded and installed.
• Sensors including speech recognition.

Wireless 3G/4G
Tablets are able to connect to 4G is a mobile communications
any wireless networks. standard intended to replace 3G,
allowing wireless Internet access
Users are able to use the at a much higher speeds.
internet as long as they are in
range. Would allow for internet
connection on the move.
Describe the computer characteristics of a smartphone and what it is used for in
computing terms

Smart Phone
• Smart phones can use traditional methods to make
phones calls and send messages using mobile network.
• Smart phones have operating systems which allows
them to run multiple applications.
• Like the Tablets Computers Smart Phones have many
features including:
• Touch Technology
• Internet connection (Wireless/3G/4G)
• Sensors
• Cameras

Use
• Send and receive emails
• Browse the internet
• Voice over Internet Protocol (Voip) – voice/video calls.
• Streaming music/video content
• Communication via social networking applications
• Global Positioning System – to help navigate
Describe the advantages and disadvantages of each type of computer

Type Advantages Disadvantages


Desktop/Personal • Always connected to the mains. • Not portable
Computer • Monitors can come in any sizes • Takes up more desk space.
• Can be upgraded and parts easily replaced. • Separate components like keyboard, mouse,
• Tend to have a higher specifications than laptop monitor, speakers etc.
computers. • Loose cables which could be trip hazards.

Laptop • Its portable due to small size and weight. • Limited battery life.
Computer • Battery can be recharged. • Laptops are difficult to repair and upgrade.
• Can connect wireless to internet. • Can be stolen or lost.
• No loose cables. All components connected • Some users find it difficult to use pointing
together. device.

Tablet • High definition anti glare display. • Limited memory compared to laptops.
Computer • Wireless , 3G/4G & Bluetooth connection. • Expensive to use 3G/4G internet
• Data can backed up or synchronised with other • Typing can be more difficult compared to a
devices. normal keyboard.
• Touch screen technology • Not all files are compatible with tablets.
• Battery life longer than a mobile phone.
Smart Phone • Small in size and easier to carry around. • Small screens make it difficult to read.
• Can be used whilst on the move using wireless • Battery life is short
or 3G/4G Connectivity. • Could be misplaced or stolen
• Touch screen technology • Limited storage/memory compared to other
types of computers.
• Slow data transfer rates
Artificial Intelligence (AI)
• This is a computer science that is focused on creating computer
systems that simulate human intelligence.
• The term was first used in 1956 by a computer scientist at the
Massachusetts Institute of Technology (MIT) who was focused on
trying to make computers behave like humans.
Artificial Intelligence (AI)
• AI is being developed in the following areas:
• Game Playing
• Computers developed to play games against human players.
• For example: In 1997 a computer named 'Deep-Blue' defeated a world champion in the game of
chess.

• Expert Systems
• These are computers that have been programmed to make decisions based on information they
are given.
• For example: Medical expert systems can diagnose patient's illnesses based on symptoms
entered.

• Languages
• This type of AI involves computers that can understand different human languages as they are
spoken to them.

• Robotics
• Robotic artificial intelligence is where machines are programmed to imitate a human.
Impacts of AI on everyday life:
• Accurate prediction of weather:
• AI software will soon be used to sift through weather data more accurately that humans can and will be used
to predict approaching storms and automatically issue warnings.

• Increased leisure time


• Robotic vacuum cleaners are becoming more and more popular. These can detect walls and other objects in order
to vacuum around them.
• People can leave them running whilst they enjoy extra spare time.

• Safer transport
• Cars that can self-park already exist and it is predicted that cars that drive themselves will be available soon.
These could drastically reduce road accidents.
• Driverless trains already exist in some countries!

• Increased Personal safety


• Modern home alarm systems use artificial intelligence software that can tell the difference between the home owners
and intruders.
• The software automatically alerts the police when intruders are detected.

• Improved medical care


• Robotic surgery assistants are being used to quickly and accurately pass the correct surgical tools to doctors.
• The few seconds saved in getting the correct tool to the doctor can save patient's lives.
Biometrics
• Biometrics is where parts of a person's body are used for identification purposes.
Examples are shown in the table below:
• Fingerprints
• These are impressions embedded at the end of human fingers and thumbs. Fingerprints kept
in a database can be matched to those left at crime-scenes to help identify the culprit.

• Eye recognition:
• Eye scans analyse the iris which is the coloured ring that surrounds the pupil.

• Face recognition:
• This is where the shapes of individual's faces are analysed.

• Voice recognition:
• Pitch, tone and frequency of voices are unique and can be analysed to identify people.

• All of these parts of the human body are unique from person to person and can be used
to authenticate identity.
• Even identical twins have slightly different fingerprints and voices etc.
Biometrics
• Before biometric methods can be useful, people have to perform a
process known as 'biometric enrolment’.
• This is where body-part data such as fingerprints or voice patterns
are captured and stored within the system so that they can be
used to identify the person later on.
• Biometrics are beginning to be used in place of passwords and
physical locks as a means of security.
• Biometrics have advantages over these older methods as body
parts cannot be lost, forgotten or stolen as can be the case with
passwords and keys.
• Biometrics is still a very new technology and is not yet 100%
accurate.
Impacts of Biometrics on everyday
life
• Better airport security
• Iris recognition is already in use in some airports.
• Travelers have their eyes and iris scanned into a system and this data is later matched up when
the person is performing airport checks.

• Increased building security


• Fingerprint access to buildings have been replacing the older methods of locks and keys.
• This methods ensures that only authorised people can enter restricted buildings or rooms.

• Reduced car theft


• Cars already exist that use fingerprints to only unlock their doors or start the engine for
the fingerprint that is registered.

• More secure mobile phones


• Mobile phones contain our lives. We used our phones for everything from social media to shopping
online. They need to be as secure as possible in order to protect the valuable data that they
contain.
• Apple recently released an iPhone model that uses a fingerprint reader to identify the true
owner of the phone. It will not unlock for a fingerprint that it does not recognize.
Robotics
• Robots are used to perform a wide range of physical tasks.
• They are either automated (controlled by a computer chip)
or manually controlled by a human.
• There are 4 different types of robots:
• Manufacturing robots (used to perform repetitive tasks such as
welding)
• Carrier robots (used by the military to carry heavy loads over
dangerous terrain)
• Domestic robots (used in homes to perform cleaning tasks such as
vacuuming)
• Exploration robots (used to visit and send images from places such as
Mars)
Robotics
• Some more typical tasks that robots can be used for are described below:
• Dangerous jobs:
• E.g. disposing of bombs, spray painting or cleaning up nuclear waste.
• Note: these are all jobs that could harm or kill a human.

• Exploring extreme environments


• E.g. inside volcanoes, planets or the depths of the ocean.

Note: humans cannot visit these environments due to lack of oxygen and high pressure / heat levels.

• Repetitive manufacturing
jobs
• E.g. production lines, packing and welding etc.

Note: these jobs can also be performed by humans but robots can do them much faster and more
efficiently.

• Moving heavy objects


• E.g. installing large engines, moving pallets of items etc.
Impacts of Robotics on everyday life
• Increased personal time
• If robots can carry out domestic chores, this frees up more time for us to spend as we wish.

This could mean more time spent at work or for more enjoyable activities such as socialising.

• More efficient manufacturing


• Robots can manufacturer products such as cars much faster and cheaper than humans can.

This means that companies can make more products at less cost and this means greater business
profits.

• Loss of jobs
• Due to higher and cheaper productivity, robots are taking over the manufacturing jobs that used to be
carried out by humans.

This means that humans are missing out on employment on assembly lines and factory work.

• Safer working environments


• Robots can safely carry out tasks that are too dangerous for humans.

For example: spraying cars with toxic paint, defusing bombs on battlefields and search and rescue
operations in buildings destroyed by earthquakes.
Quantum Cryptography
• Quantum cryptography (encryption) is an emerging technology that
allows messages and data to be sent with complete privacy.
• Encryption is where digital data and files are scrambled so that
only authorised people are allowed to read it.

Unauthorised people attempting to read the data would see illegible


nonsense instead of the real information.
• Older methods of encryption were based
around mathematics but quantum cryptography uses
physics instead.

This makes the encryption impossible to break.


• In quantum cryptography, messages are encrypted using photons.
These are tiny packets of light.
Impacts of Quantum Encryption on
everyday life
• Completely secure voting
• Citizens of countries have the right to vote-in new governments but history is littered with examples of
where these votes have been tampered with in order to influence election outcomes.
• Securing votes with quantum encryption methods ensures that they cannot be tampered with
or changed.

• Completely secure communication


• Messages sent by the military often include the locations of squadrons or special op's teams. If enemy
forces intercepted these messages it could have severe consequences.
• Using quantum cryptography to secure the messages would eliminate the risk of them being read or
heard by unauthorised ears.

• Completely secure bank transfers


• Any electronic transfer of money, such as at ATM's or buying goods online, will be completely secure.

Some banks are already using quantum cryptography for the purposes of securing money transfers.

• Completely secure personal information


• Health records, bank details and other types of personal information will be absolutely secure
from hackers and other people wishing to commit identity theft crimes.
Computer Assisted Translation (CAT)
• CAT is where a human translator uses computer
software to help in the translation process.
• CAT software can reduce the amount of time that the translation
takes.
• Current CAT tools are not always 100% accurate. They need a
human to check for errors.
Computer Assisted Translation (CAT)
• Examples of different types of CAT tools are shown in the table below:
• Spell checkers
• These are usually built-into word processing software and can automatically flag-up spelling
errors and suggest translations of
miss-spelt words.

NOTE: Most word-processors allow the user to select the language in which to spell-check.

• Translation memory software


• Translation memory software are databases which store translated text as the human translator works through
it in order to be reused in the future.

Translated text is built-up in the database's memory and can be accessed by other translators in order to speed
up their translation jobs.

• Language search-engine software


• These are Internet based systems which allow translators to enter any text that they want translating and also
to select which language they want the text translating into.

The software will then search through a large collection of translation memory databases to try and find a
match with the text entered into the search engine.

If a match is found, translated text will be shown on-screen.


Impacts of Computer Aided
Translation on everyday life
• More accurate documents
• Spell checkers can quickly scan your word processed documents and automatically find spelling
errors.

Miss-spelt words can be quickly corrected to produce an error-free document.

• A more multilingual society


• Anyone with an Internet connection can access tools such as Google Translate and the vast collection
of language databases that the tools can search through.

This makes accessing other languages much easier than in the past and makes it easier for people
to learn these new languages.

NOTE: Google's new 'Voice Search' facility allows users to actually speak into a tablet or mobile phone
and Google will automatically translate (and speak) the words or phrase in almost any language.

• Quicker and more efficient translations


• Foreign visitors to countries can be communicated with much easier through these CAT tools.

They are especially useful in places like embassies where a wide-range of foreign visitors may need to
communicate with local officials about problems or ask for advice etc.
3D and Holographic Imaging (aka
holograms)
• This is a technique where images are made to appear three-
dimensional and to actually have depth.
• Holograms work by taking two regular two-dimensional images of
the same object and laying one on top of the other.

• The two-dimentional images need to have been shot at different angles.


• Two different types of laser beams are used to record the two-dimensional
images onto a single photographic plate.
• This creates one single image that incorporates the angles of the original
two-dimensional images. This produces a 3D effect.
• When viewing the image, human eyes see it from slightly different angles.
The brain combines them into a three-dimensional image.
Impacts of 3D Imaging on everyday
life
• Improved security
• Credit cards, ID cards, software and some bank notes include holograms as a way of trying to prevent
forged duplicates being created.

NOTE: Forgeries don't usually include a hologram as they are difficult and expensive to reproduce.

• Better movie experiences


• Hollywood have been using 3D imaging within the production of movies for many years.

These provide the viewer with a much more immersive experience.

NOTE: 3D movies require the viewer to wear special glasses for the effect to take place. The glasses
project two images shot at different angles (one in each eye) and your brain puts them together as one 3D
image.

• Greater data storage


• It is thought that the technology behind holograms will eventually be used to provide the means to store
large amounts of data.

Companies have already produced discs that use holographic layers that each have the potential to hold a
massive 3.9 terabytes.

NOTE: This is the equivalent of over 150 standard Blu-ray discs.


Virtual Reality
• Virtual reality is where computers are used to create an artificial
environment that users can interact with as if it were real.
• Virtual reality is not really meant for gaming purposes. It is used for more serious
purposes such as:
• Allowing architects to walk around a virtual version of their design (this gives a
better idea of what the finished building will look like)
• Training soldiers in combat (flight simulation, battlefield simulation)
• Training surgeons (virtual patients can be operated on to provide experience to trainee
surgeons).

• As they walk around the virtual environment users will experience things in a similar
way to the real world. For example:
• Objects get smaller as you walk away from them (and bigger as you move closer)
• The direction of sounds change as you move around
• Objects in the virtual world appear the same dimensions as they would in the
real world (for example dogs are smaller than us but elephants are bigger).
Virtual Reality
• Equipment needed to create the virtual reality experience includes the following:
• Eye Goggles
• These produce the 3D images that make up the artificial world.

The goggles project slightly different views into each eye and this fools your brain into thinking that the scene is 3D. Virtual chairs
look solid and so on.

• Special Gloves
• The gloves detect your hand and finger movements which are input into a computer and processed. As users touch or use
items in the virtual world, the computer can carry out these commands and make them happen.

This allows the user to interact with the virtual world and perform tasks such as moving objects or switching on lights etc.

• Headphones
• These control what users hear in the virtual world.

For example: Distant sounds will be quieter than sounds that are close by.

• Powerful Computer
• A very powerful computer is needed to create the virtual environment and to process/output data sent into the system by the
user's actions.

For example: The computer produces graphics that appear as walls, outdoor scenes and objects such as trees.

• Virtual reality is still a developing technology and graphics produced are not very realistic yet.
However, experiences in the virtual environment can seem very real.
Impacts of Virtual Reality on
everyday life
• Improved medical surgeons
• Surgeons can be trained using virtual patients. This allows them to practice over and over until they have perfected a
particular surgery without risk to a real patient.

For example: Imagine a new surgeon performing surgery on you and accidentally cutting off your leg!!.

• Larger and stronger buildings


• Virtual buildings allow architects to walk around to experience what the building would look like when completed and check
for potential errors before the actual building is constructed.

Virtual buildings will also be able to be tested against factors such as earthquakes to see what effects they would have on
the current design.

This allows architects to modify designs quickly and cheaply and will, potentially, allow for the development of
much larger and safer buildings than we currently have.

• More effective treatment of phobias


• VR is being used to help patients overcome phobias and anxieties.

People can experience a tame, controlled version of what they are afraid of. Slowly the person becomes used to the
situation and can relax.

For example: Someone might be terrified of spiders and so they could be gradually introduced to larger and larger
virtual spiders (the virtual spiders would be controlled by the therapy team as well).
• Training in dangerous situations
• VR can be used for training in dangerous situations where it is impossible to practice the real thing.

For example: A large fire in an office building could never be set up in reality, but it could in a virtual environment. This
will allow workers to practice emergency evacuation in a safe environment.

• More realistic education


• VR can give students the opportunity to learn in a much more interactive way.

For example: Astronomy students can learn about the solar system by engaging with the objects in the virtual
environment. They could look around stars, move planets and track the orbits of comets.

This approach is likely to allow students to retain knowledge much better than reading text out of a book.

You might also like