Monday, 25 April 2011

Computer in Education

History, the History of Computers, and the History of Computers in Education

1780 - Early public schools adopt the teacher/manager model with the teacher as the primary manger of instruction and assessment in a single classroom.

1946 - First vacuum tube-based computers developed; universities help in computer development effort; technology used in war effort.

1951 - Little technology used in schools, primarily TV; baby boom begins with resulting increases in class size; first-generation Univac computer delivered to the US census bureau.

1954 - General Electric is the first business to order a computer. Early rock and roll music, based on the rhythm and blues tradition, gains a little in popularity.

1955 - IBM's first commercial computer is sold; the cold war results in use of technology in aircraft design and in weapons control. Russia developing the technology for the first spacecraft.

1956 - Eisenhower elected president; Elvis Presley records "Hound Dog"; school overcrowding growing; school dropout rate rapidly declining toward zero; schools still based on the teacher/manager model in individual teacher-controlled classrooms; the cold war continues with technology playing an important role and is intensified when Russia sends up their Sputnik space vehicle to demonstrate their lead in technology.

1958 - As cold war continues, National Defense Education Act brings some new money and some new technology into schools, but primarily in vocational education. Mainframe host computers are not widely accepted in schools that are still using the si ngle classroom, teacher/manager method of delivering information to students.

1959 - Transistor-based computers in use; the cold war continues with public support for the development of technology needed for space exploration.

1960 - COBOL business-oriented, high-level programming language created; Kennedy elected president with campaign promises to put more money into education; crime rate doubles in one decade; Gary Powers shot down in hi-tech spy airplane; 70,000 invo lved in civil-rights sit-ins.

1962 - Airlines begin to use a computerized reservation system. President Kennedy diverts more money into education. The cold war continues and results in a confrontation with Russia as hi-tech spy planes discover missiles in Cuba; George Wallace campaigns for governor of Georgia pledging segregation forever.

1963 - Vocational Education Act passes with new money supporting the use of technology in schools; however, the mainframe and minicomputers in use at this time are using batch processing methods that do not fit well with the single teacher-as-manag er-of-learning methods in use in most schools; BASIC, a simple high-level programming language is developed, mostly for use in universities to train programmers; IBM 360 family of computers is developed; most computers still using host methods with punche d cards as the primary input device; line printers are still the primary output device; the cold war and the competitive space exploration effort continues with President Kennedy's call for the science to be developed that could put a man on the moon.

1964 - Johnson elected president; the Beatles rapidly rise to stardom; Bob Dylan writes songs that give voice to the protest movement; the Gulf of Tonkin incident results in the first confrontation between the US and the government of North Vietnam ; the civil rights movement grows including a one-day civil-right protest absence of 464,000 students in New York; China explodes a test Atomic bomb.

1965 - Elementary and Secondary Education Act brings new money into schools for technology. mainframes and minicomputers are put into place in some schools, but most are used for administration or for school counseling (databases for information a bout and for students); the cold war continues as President Johnson expands the war, with 125,000 American troops in Vietnam; ; hi-tech weapons are used in bombings of North Vietnam; 50,000 Americans killed in traffic accidents.

1967 - High-level programming languages such as Fortran are being taught are in universities. School vocational training programs begin to include computer maintenance; Stokely Carmichael declares a need for SNCC to move from civil rights to black power; Mohammed Ali refuses army induction for religious reasons bringing national attention to both the black power movement and the anti-Vietnam movement; student strikes on many campuses related to protest over both civil rights and the policy in Viet nam; acid rock and protest rock grow in popularity; centers of dissidence like Haight-Ashbury in San Francisco develop; anti-war protests grow, especially on college campuses; 380,000 US troops in Vietnam.

1968 - Nixon elected president; riots in many cities break out over civil rights issues; the cold war continues with a rapid expansion of the war in Vietnam 9,419 dead in Vietnam; some programs designed to bring money for technology into schools ar e canceled; host computers are not widely adopted in schools because they are seen as appropriate for use with the teacher/manager model of learning (they don't fit into the single classroom, but instead are accessed remotely by sending batches of data).< BR>
1969 - Neil Armstrong arrives on the moon; the Woodstock rock concert in upstate New York draws hundreds of thousands; the cold war and the war in Vietnam continues; many students, religious leaders, civil rights leaders, and ordinary citizens begi n to speak out against the war in Vietnam.

1970 - Pascal created; the US bombs Cambodia; Kent State antiwar students killed by Army reserve troops; mainframes and minicomputers in use in some schools, but very little use in the delivery of instruction.

1971 - Intel's first microprocessor developed; the first microcomputers (PCs) are developed; mainframes and minicomputers are in wide use in business; a few software companies begin to develop mainframe and minicomputer- based instructional program s; 18-year old given the vote.

1972 - Five men working for President Nixon's re-election caught in the Democratic party's headquarters in the Watergate hotel complex; Nixon re-elected president and orders the bombing of North Vietnam.

1974 - President Nixon resigns and is given a full pardon by his successor, President Ford; a gasoline embargo creates lines at gas stations; Patty Hurst kidnapped; Hank Aaron breaks Babe Ruth's lifetime home run record; Apple I computer is sold in kit form.

1975 - Some Apple 1 PCs are donated to schools; some schools have adopted mainframes and minicomputers and refuse to consider PCs; four Nixon administration official convicted in Watergate cover up; The war in Vietnam ends and the government of Nor th Vietnam invades and takes over South Vietnam.

1976 - Carter elected president; the cold war continues; Iraq holds hostages, rampant inflation; the Apple I computer gains popularity in small business.

1979 - 15 Million PCs estimated to be in use worldwide; PC-based spreadsheets developed, mainframes and minicomputers still in wide use.

1980 - Reagon elected President, the cold war continues with Reagon declaring Russia to be the "evil empire"; the TI 99 which uses a television screen as the monitor is the world's most popular PC.

1981 - IBM is the first mainframe manufacturer to develop a PC; drill and practice CAI gains acceptance in schools; the cold war continues. The first educational drill and practice programs are developed for personal computers.

1983 - IBM PC clones proliferate; Sperry Corporation is the second mainframe manufacturer to develop a PC (actually developed by Mitsubishi in Japan); the Apple II computer finds widespread acceptance in education because PCs better fit the teacher /manager model of instructional delivery (PCs can be used to "support" the ongoing teaching in the single classroom). Simple simulation programs are developed for personal computers.

1984 - Reagon re-elected; 31 states use 13,000 PCs for career guidance, but there are still relatively few computers in classrooms; the Apple Macintosh computer is developed; computer-based tutorials and learning games are developed by commercial software manufacturers.

1986 - 25 % of high schools use PCs for college and career guidance, K-8 schools buying mostly Apple II and Macintosh computers, high schools buying mostly DOS-based clones.

1988 - Bush elected President; 60 % of all workers in the US use computers, laptops are developed; Gorbachoff proposes an end to the cold war;.

1990 - Multimedia PCs are developed; schools are using videodiscs; object-oriented multimedia authoring tools are in wide use; Simulations, educational databases and other types of CAI programs are being delivered on CD-ROM disks, many with animati on and sound; the US crime increases dramatically; the cold war ends.

1992 - Clinton elected President; for the first time, police and prison budgets begin to surpass education budgets; schools are using Gopher servers to provide students with on-line information.

1994 - Digital video, virtual reality, and 3-D systems capture the attention of many, but fewer multimedia PCs than basic business PCs are sold; object-oriented authoring systems such as HyperCard, Hyperstudio, and Authorware grow in popularity in schools; most US classrooms now have at least one PC available for instructional delivery, but not all teachers have access to a computer for instructional preparation.

1995 - The Internet and the world wide web began to catch on as businesses, schools, and individuals create web pages; most CAI is delivered on CD-ROM disks and is growing in popularity.

1996 - The Internet is widely discussed as businesses begin to provide services and advertising using web pages. New graphics and multimedia tools are developed for the delivery of information and instruction using the Internet; many schools are rewiring for Internet access; a few schools install web servers and provide faculty with a way to create instructional web pages.

1997-2007 - The growth of the internet expands far faster than most predicted. It soon becomes the world's largest database of information, graphics, and streaming video making it an invaluable resource for educators; but marketing-oriented web pages, computer viruses hidden within downloadable programs and/or graphics, and spam (widely disseminated email-based sales pitches) threaten it's usefullness. Search engines such as Google and Yahoo constantly develop new ways to find information within the ever-growing number of web pages. Web sites that offer individuals a place to put personal information become popular, as does internet-based publishing and discussion forums. Voice recognition slowly enters the computing mainstream, but it's development is slowed by an unacceptable frequency of errors. Some computers incorporate TV input, but it is not as common as many predicted. Educational software becomes more useful and interesting to students as graphics and video are incorporated. Larger computer storage capacity and the growing prevalence of CD-ROM and DVD drives in personal computers make it easier for educators to store large graphic and video and sound files for educational applications.


Multiple Mice for Computers in Education
in Developing Countries





Banking and Shopping

Online banking (or Internet banking) allows customers to conduct financial transactions on a secure website operated by their retail or virtual bank, credit union or building society.

Features
Online banking solutions have many features and capabilities in common, but traditionally also have some that are application specific.
The common features fall broadly into several categories
  • Transactional (e.g., performing a financial transaction such as an account to account transfer, paying a bill, wire transfer, apply for a loan, new account, etc.)
  • Non-transactional (e.g., online statements, cheque links, cobrowsing, chat)
  • Financial Institution Administration
  • Management of multiple users having varying levels of authority
  • Transaction approval process
Features commonly unique to Internet banking include
  • Personal financial management support, such as importing data into personal accounting software. Some online banking platforms support account aggregation to allow the customers to monitor all of their accounts in one place whether they are with their main bank or with other institutions.
Security
Protection through single password authentication, as is the case in most secure Internet shopping sites, is not considered secure enough for personal online banking applications in some countries. Basically there exist two different security methods for online banking.
  • The PIN/TAN system where the PIN represents a password, used for the login and TANs representing one-time passwords to authenticate transactions. TANs can be distributed in different ways, the most popular one is to send a list of TANs to the online banking user by postal letter. The most secure way of using TANs is to generate them by need using a security token. These token generated TANs depend on the time and a unique secret, stored in the security token (this is called two-factor authentication or 2FA). Usually online banking with PIN/TAN is done via a web browser using SSL secured connections, so that there is no additional encryption needed.
Another way to provide TANs to an online banking user, is to send the TAN of the current bank transaction to the user's (GSM) mobile phone via SMS. The SMS text usually quotes the transaction amount and details, the TAN is only valid for a short period of time. Especially in Germany and Austria, many banks have adapted this "SMS TAN" service as it is considered as very secure.
  • Signature based online banking where all transactions are signed and encrypted digitally. The Keys for the signature generation and encryption can be stored on smartcards or any memory medium, depending on the concrete implementation.
Attacks
Most of the attacks on online banking used today are based on deceiving the user to steal login data and valid TANs. Two well known examples for those attacks are phishing and pharming. Cross-site scripting and keylogger/Trojan horses can also be used to steal login information.
A method to attack signature based online banking methods is to manipulate the used software in a way, that correct transactions are shown on the screen and faked transactions are signed in the background.
A recent FDIC Technology Incident Report, compiled from suspicious activity reports banks file quarterly, lists 536 cases of computer intrusion, with an average loss per incident of $30,000. That adds up to a nearly $16-million loss in the second quarter of 2007. Computer intrusions increased by 150 percent between the first quarter of 2007 and the second. In 80 percent of the cases, the source of the intrusion is unknown but it occurred during online banking, the report states.
The most recent kind of attack is the so-called Man in the Browser attack, where a Trojan horses permits a remote attacker to modify the destination account number and also the amount.
Countermeasures
There exist several countermeasures which try to avoid attacks. Digital certificates are used against phishing and pharming, the use of class-3 card readers is a measure to avoid manipulation of transactions by the software in signature based online banking variants. To protect their systems against Trojan horses, users should use virus scanners and be careful with downloaded software or e-mail attachments.
In 2001 the FFIEC issued guidance for multifactor authentication (MFA) and then required to be in place by the end of 2006.
Mobile banking (also known as M-Banking, mbanking, SMS Banking) is a term used for performing balance checks, account transactions, payments, credit applications and other banking transactions through a mobile device such as a mobile phone or Personal Digital Assistant (PDA). The earliest mobile banking services were offered over SMS. With the introduction of the first primitive smart phones with WAP support enabling the use of the mobile web in 1999, the first European banks started to offer mobile banking on this platform to their customers.
Mobile banking has until recently (2010) most often been performed via SMS or the Mobile Web. Apple's initial success with iPhone and the rapid growth of phones based on Google's Android (operating system) have led to increasing use of special client programs, called apps, downloaded to the mobile device.

 A mobile banking conceptual model

In one academic model, mobile banking is defined as:
Mobile Banking refers to provision and availment of banking- and financial services with the help of mobile telecommunication devices.The scope of offered services may include facilities to conduct bank and stock market transactions, to administer accounts and to access customised information."
According to this model Mobile Banking can be said to consist of three inter-related concepts:
  • Mobile Accounting
  • Mobile Brokerage
  • Mobile Financial Information Services
Most services in the categories designated Accounting and Brokerage are transaction-based. The non-transaction-based services of an informational nature are however essential for conducting transactions - for instance, balance inquiries might be needed before committing a money remittance. The accounting and brokerage services are therefore offered invariably in combination with information services. Information services, on the other hand, may be offered as an independent module.
Mobile phone banking may also be used to help in business situations

 Trends in mobile banking

The advent of the Internet has enabled new ways to conduct banking business, resulting in the creation of new institutions, such as online banks, online brokers and wealth managers. Such institutions still account for a tiny percentage of the industry.[citation needed]
Over the last few years, the mobile and wireless market has been one of the fastest growing markets in the world and it is still growing at a rapid pace. According to the GSM Association and Ovum, the number of mobile subscribers exceeded 2 billion in September 2005, and now exceeds 2.5 billion (of which more than 2 billion are GSM).With mobile technology, banks can offer services to their customers such as doing funds transfer while travelling, receiving online updates of stock price or even performing stock trading while being stuck in traffic. Smartphones and 3G connectivity provide some capabilities that older text message-only phones do not.
Mobile Banking Services
Mobile banking can offer services such as the following:

 Account Information

  1. Mini-statements and checking of account history
  2. Alerts on account activity or passing of set thresholds
  3. Monitoring of term deposits
  4. Access to loan statements
  5. Access to card statements
  6. Mutual funds / equity statements
  7. Insurance policy management
  8. Pension plan management
  9. Status on cheque, stop payment on cheque
  10. Ordering cheque books
  11. Balance checking in the account
  12. Recent transactions
  13. Due date of payment (functionality for stop, change and deleting of payments)
  14. PIN provision, Change of PIN and reminder over the Internet
  15. Blocking of (lost, stolen) cards

 Payments, Deposits, Withdrawals, and Transfers

  1. Domestic and international fund transfers
  2. Micro-payment handling
  3. Mobile recharging
  4. Commercial payment processing
  5. Bill payment processing
  6. Peer to Peer payments
  7. Withdrawal at banking agent
  8. Deposit at banking agent
A specific sequence of SMS messages will enable the system to verify if the client has sufficient funds in his or her wallet and authorize a deposit or withdrawal transaction at the agent. When depositing money, the merchant receives cash and the system credits the client's bank account or mobile wallet. In the same way the client can also withdraw money at the merchant: through exchanging sms to provide authorization, the merchant hands the client cash and debits the merchant's account.

 Investments

  1. Portfolio management services
  2. Real-time stock quotes
  3. Personalized alerts and notifications on security prices
  4. mobile banking

 Support

  1. Status of requests for credit, including mortgage approval, and insurance coverage
  2. Check (cheque) book and card requests
  3. Exchange of data messages and email, including complaint submission and tracking
  4. ATM Location

 Content Services

  1. General information such as weather updates, news
  2. Loyalty-related offers
Based on a survey conducted by Forrester, mobile banking will be attractive mainly to the younger, more "tech-savvy" customer segment. A third of mobile phone users say that they may consider performing some kind of financial transaction through their mobile phone. But most of the users are interested in performing basic transactions such as querying for account balance and making bill payment.

SMS BANKING

SMS banking is a technology-enabled service offering from banks to its customers, permitting them to operate selected banking services over their mobile phones using SMS messaging.

Push and pull messages

SMS banking services are operated using both push and pull messages. Push messages are those that the bank chooses to send out to a customer's mobile phone, without the customer initiating a request for the information. Typically push messages could be either Mobile marketing messages or messages alerting an event which happens in the customer's bank account, such as a large withdrawal of funds from the ATM or a large payment using the customer's credit card, etc. (see section below on Typical Push and Pull messages).
Another type of push message is One-time password (OTPs). OTPs are the latest tool used by financial and banking service providers in the fight against cyber fraud. Instead of relying on traditional memorized passwords, OTPs are requested by consumers each time they want to perform transactions using the online or mobile banking interface. When the request is received the password is sent to the consumer’s phone via SMS. The password is expired once it has been used or once its scheduled life-cycle has expired.
Pull messages are those that are initiated by the customer, using a mobile phone, for obtaining information or performing a transaction in the bank account. Examples of pull messages for information include an account balance enquiry, or requests for current information like currency exchange rates and deposit interest rates, as published and updated by the bank.
The bank’s customer is empowered with the capability to select the list of activities (or alerts) that he/she needs to be informed. This functionality to choose activities can be done either by integrating to the internet banking channel or through the bank’s customer service call centre.

BANKING AND SHOPPING



Home banking

Here are some banks (including mine, PCF) with their on-line banking links. The cost saving to banks of on-line banking is huge.

Home shopping

Listed below are e-commerce sites that I have either used or find interesting.
(Short cut to my favourite stores in the Ottawa area)
We all shop from time to time, and occasionally have an exceptional experience of products and/or service.
Here are some traditional (not necessarily e-commerce) stores and businesses in the Ottawa area that I can highly recommend.

Computers for personal use

Computer2A small, relatively inexpensive computer designed for an individual user. In price, personal computers range anywhere from a few hundred dollars to thousands of dollars. All are based on the microprocessor technology that enables manufacturers to put an entire CPU on one chip. Businesses use personal computers for word processing, accounting, desktop publishing, and for running spreadsheet and database management applications. At home, the most popular use for personal computers is for playing games.
Personal computers first appeared in the late 1970s. One of the first and most popular personal computers was the Apple II, introduced in 1977 by Apple Computer. During the late 1970s and early 1980s, new models and competing operating systems seemed to appear daily. Then, in 1981, IBM entered the fray with its first personal computer, known as the IBM PC. The IBM PC quickly became the personal computer of choice, and most other personal computer manufacturers fell by the wayside. One of the few companies to survive IBM's onslaught was Apple Computer, which remains a major player in the personal computer marketplace.
Other companies adjusted to IBM's dominance by building IBM clones, computers that were internally almost the same as the IBM PC, but that cost less. Because IBM clones used the same microprocessors as IBM PCs, they were capable of running the same software. Over the years, IBM has lost much of its influence in directing the evolution of PCs. Many of its innovations, such as the MCA expansion bus and the OS/2 operating system, have not been accepted by the industry or the marketplace.
Today, the world of personal computers is basically divided between Apple Macintoshes and PCs. The principal characteristics of personal computers are that they are single-user systems and are based on microprocessors. However, although personal computers are designed as single-user systems, it is common to link them together to form a network. In terms of power, there is great variety. At the high end, the distinction between personal computers and workstations has faded. High-end models of the Macintosh and PC offer the same computing power and graphics capability as low-end workstations by Sun Microsystems, Hewlett-Packard, and DEC.
The personal Internet communicator (PIC) is an affordable consumer device designed to provide managed Internet access for people in global, high-growth markets to enhance communications, entertainment, and education opportunities. The PIC is not a computer, although it is driven by AMD processor technology. The PIC is a connecting device; a simple and accessible platform designed to work with existing service provider dial-up or broadband infrastructure that can deliver basic Internet functions such as e-mail, downloads, Web browsing, and more.


A personal computer (PC) is any general-purpose computer whose size, capabilities, and original sales price make it useful for individuals, and which is intended to be operated directly by an end-user with no intervening computer operator. PCs include any type of computer that is used in a "personal" manner. This is in contrast to the batch processing or time-sharing models which allowed large expensive mainframe systems to be used by many people, usually at the same time, or large data processing systems which required a full-time staff to operate efficiently.Computer-aj aj ashton 01.svg
A personal computer may be a desktop computer, a laptop, a tablet PC, or a handheld PC (also called a palmtop). The most common microprocessors in personal computers are x86-compatible CPUs. Software applications for personal computers include word processing, spreadsheets, databases, Web browsers and e-mail clients, games, and myriad personal productivity and special-purpose software applications. Modern personal computers often have connections to the Internet, allowing access to the World Wide Web and a wide range of other resources.
A PC may be used at home or in an office. Personal computers may be connected to a local area network (LAN), either by a cable or a wireless connection.
While early PC owners usually had to write their own programs to do anything useful with the machines, today's users have access to a wide range of commercial and non-commercial software, which is provided in ready-to-run or ready-to-compile form. Since the 1980s, Microsoft and Intel have dominated much of the personal computer market, first with MS-DOS and then with the Wintel platform. Alternatives include Apple's Mac OS X and the open-source Linux OS. Applications and games for PCs are typically developed and distributed independently from the hardware or OS manufacturers, whereas software for many mobile phones and other portable systems is approved and distributed through a centralized online store.

HOME

Home computers were a class of personal computers entering the market in 1977, and becoming increasingly common during the 1980s. They were marketed to consumers as affordable, accessible personal computers and more capable than video game consoles. These computers typically cost much less than business, scientific or engineering-oriented desktop personal computers of the time, and were generally less powerful in terms of memory and expandability. However, a home computer often had better graphics and sound than contemporary business personal computers. Usually they were bought for education, game play, and personal productivity use such as word processing.
Advertisements for early home computers were rife with possibilities for their use in the home, from cataloging recipes to personal finance to home automation, but these were seldom realized in practice. For example, using a typical 1980s home computer as a home automation appliance would require the computer to be kept powered on at all times and dedicated to this task. Personal finance and database use required tedious data entry. If no packaged software was available for a particular application, the home computer user was required to learn computer programming; a significant time commitment many weren't willing to make. Still, for many the home computer offered the first opportunity to learn to program.

Today the line between 'business' and 'home' computer market segments has blurred or vanished completely, since both categories of computers now typically use the same processor architectures, peripherals, operating systems, and applications. Often the only difference may be the sales outlet through which they are purchased. Another change from the home computer era is that the once-common endeavour of writing one's own software programs has almost vanished from home computer use.


Impact of Computers on Society


Computers and computer technology have totally changed the face of the world as we start the twenty-first century. It would be hard to find one corner of our society that has not been changed dramatically by them. Used properly, computers and computer technologies are more efficient, they save our time, and they allow us to do things that we never could have imagined.
Just as computers are integrated throughout society, computers should also be integrated throughout the curriculum. This places a special burden on the educator. Fortunately, the burden of integrating computers across the curriculum is far outweighed by the rewards to both the students and the teachers.
Over the years, teachers, administrators, school boards, and parents have all grappled with the place of computers in the classroom and the curriculum.An understanding of the computer as a tool requires an awareness of its component parts and an appreciation of what each part may contribute as we attempt to use the computer as a tool to solve the problems we may encounter. A user must be able to put data into a system, manipulate those data, and retrieve information in an appropriate manner.



The History of the Personal Computer and other Computers which have had an impact upon Society