Introduction To Information Communication Technology: Osun State School of Midwifery, Asubiaro, Osogbo, Osun State
Introduction To Information Communication Technology: Osun State School of Midwifery, Asubiaro, Osogbo, Osun State
COMMUNICATION TECHNOLOGY
Osun State School of Midwifery,
Asubiaro, Osogbo, Osun State.
Prepared by
Unit 1
INTRODUCTION............................................................................................................... 4
Unit 2
Unit 3
Unit 4
Unit 5
Unit 6
3
Rightway Mega Network (234 706 450 3055)
Unit 1
INTRODUCTION
The increasing need for application of information communication technology (ICT) to all
spheres of human endeavour makes it important that the nurse keeps abreast of ICT and its
application to health care. This course is designed to introduce the student to ICT and its
importance to health care delivery.
The Evolutions of computers and its increasing effects on the way we do things nowadays is
important to discuss at this stage. This is to have insight into how far and how well humanity
had gone in applying technology to our day-to-day living.
DEFINITION OF COMPUTER
Computer is an electronic machine that can accept data as input, process and store it to give
out the result as output information.
What Is Data?
Here are some commonly used terms that you’ll encounter in ICT:
Hardware Terminology
1. CPU: Central Processing Unit. This is the “brain” of the computer, responsible for
carrying out instructions and performing calculations.
2. RAM: Random Access Memory. This is the short-term memory of the computer,
where data is stored temporarily while the computer is running.
4
Rightway Mega Network (234 706 450 3055)
3. Hard Drive: The main storage device of the computer, where all your files and
programs are stored long-term.
4. Motherboard: The main circuit board of the computer, which connects all the other
components.
Software Terminology
1. Operating System (OS): This is the software that manages the computer’s resources
and provides a user interface for interaction with the hardware. Examples include
Windows, macOS, and Linux.
3. Browser: A software application used to access and view websites on the internet.
Examples include Google Chrome, Mozilla Firefox, and Microsoft Edge.
4. Firewall: A security system that monitors and controls incoming and outgoing
network traffic based on predetermined security rules.
Networking Terminology
1. LAN: Local Area Network. This is a network of computers and devices that are
connected within a limited area, such as an office or a home.
2. WAN: Wide Area Network. This is a network that spans a large geographical area,
such as a city or even multiple cities.
4. VPN: Virtual Private Network. A network that allows remote users to securely access
a private network over the internet.
• Directory: Also known as a folder, a directory is a container for files and other
directories.
5
Rightway Mega Network (234 706 450 3055)
• Partition: A partition is a section of a storage device that is treated as a separate
entity. It can be formatted with a file system and used to store files.
Here are some commonly used terms related to file system types:
1. FAT: File Allocation Table. A file system used by older versions of Windows and some
removable storage devices.
2. NTFS: New Technology File System. A file system used by modern versions of
Windows.
The following are the most commonly used file size options:
KB and MB Conversion
Converting between KB and MB is a common task when dealing with file sizes. Here’s a
simple method for converting KB to MB and vice versa:
1. URL: Uniform Resource Locator. This is the address of a website, which you enter
into a web browser to access the site.
6
Rightway Mega Network (234 706 450 3055)
3. DNS: Domain Name System. This is a system that translates domain names (such as
google.com) into IP addresses, which are used to identify devices on a network.
4. HTML: Hypertext Markup Language. This is the standard language used to create
web pages
• 3G – Third Generation
• 4G – Fourth Generation
• 5G – Fifth Generation
• AD – Active Directory
• AI – Artificial Intelligence
• AV – Audio/Visual
7
Rightway Mega Network (234 706 450 3055)
• BIOS – Basic Input/Output System
• BMP – Bitmap
• CAPTCHA – Completely Automated Public Turing test to tell Computers and Humans
Apart
• CAT – Category
• CC – Carbon Copy
• CD – Compact Disc
• DC – Direct Current
8
Rightway Mega Network (234 706 450 3055)
• EULA – End User License Agreement
• GB – Gigabyte
• GHz – Gigahertz
• HD – High Definition
• I/O – Input/Output
• IP – Internet Protocol
• IT – Information Technology
• MB – Megabyte
• MOBO – Motherboard
• OS – Operating System
9
Rightway Mega Network (234 706 450 3055)
• PNG – Portable Network Graphics
• PPC – Pay-per-click
• QA – Quality Assurance
• UX – User Experience
10
Rightway Mega Network (234 706 450 3055)
CLASSIFICATION OF COMPUTER
There are so many types of computer now. So, it is very difficult to say precisely the types of
computer we have without classifying them. The topic has to be made clear when you ask
question like, name 3 types of computer. Some people will say: Analog, while some will say
special purpose computer. We must be specifying by taking some factors into consideration.
1. On the Basis of Function, Hardware Design and Type (Analog, Digital, and Hybrid
Computer).
2. On the Basis of Size and Capacity, (Supercomputer, Mainframe, Mini, and Micro
Computer).
4. Generation of Computer
ANALOG
These are the types of computers that operate on continuous variables like signs and symbols
for them to accept and process information. A very close example of this is the car
speedometer, thermometer, petrol dispensers and analog watch etc.
Analog computers are fundamentally used to gauge actual units which solved voltage,
pressure, electric flow, temperature, and convert them into digits.
These computers are very fast in their operations to be carried and a powerful tool to solve
differential equations. The productivity of this computer increases, when we get the
consequence of the information as diagrams.
• Operational Amplifiers.
• Mechanical integrators
• Slide rules.
• Tide Predictors
• Electric Integrators
11
Rightway Mega Network (234 706 450 3055)
• Thermometer
• Speedometer
• Seismometer
• Voltmeter
• Flight Simulators
DIGITAL
A Digital computer represents physical quantities with the help of digits and numbers. These
numbers are used to perform Mathematics calculations and made logical decision to reach a
conclusion, depending on, the data they receive from the user.
The digital computer is also known as the Digital Data processing system. It’s performs such
as addition, occurrence, multiplication, or calculations as well as logical operations. It can also
perform organize and analyze data, control industrial and other processes such as global
weather patterns. These types of computer that stores and processes data in the digital form,
usually in the binary 0 or 1 system.
It is more common type of computer we have because they can be used to do most work.
Hence called General Purpose Computer.
• Digital Clock.
• Calculator.
• Weighing Machine.
• Laptop.
• ATM Machines
• Smart Phones.
• Automobiles.
HYBRID:
Hybrid computer combines the function of digital computer and that of analog computer. It
can be used to operate in different variables as well as continuous variables.
12
Rightway Mega Network (234 706 450 3055)
It is built for using both data by a single control system. It encompasses the best features of
both Analog and Digital computers. This computer is capable of inputting those signals and
converts them to digital form.
The purpose of designing this computer is to provide functions and features that could found
on both devices. It made to solve extremely complex calculations or problems. These
computer system setup offers a cost-effective method of performing complex simulations.
These computers are mostly used in very large industries, organizations, and business firms.
• Gasoline Station
• Electrocardiogram Machine
• Monitoring Machine
• Ultrasound Machine
Classification By Size:
When or if computer is to be classified by size, then there are three types of computer based
on size. They are:
Mainframe computers are earliest form of computers, which were available in the early 50’s.
They are mainly multi-user and multitasking. They are the largest, fastest and most expensive
type of computer. Mainframe support full range of programming languages such as scientific
languages (Basic, Pascal, Fortran etc) and commercial (COBOL, PRG, Dbase) type. Example of
such computers is IBM 370 series.
Characteristics
• They are multi-user (many people can use it at the same time)
• Large in size
• Multi-processing
Mainframe computers are mostly found in government departments, big organizations and
companies which have large information processing needs, e.g., they are used;
13
Rightway Mega Network (234 706 450 3055)
In Banks & Hospitals for preparing bills, Payrolls, etc.
Examples of Mainframes:
• IBM 360,4381.
• ICL 39 Series.
• BINAC
• UNIVAC
2. MINI COMPUTER
Multi user: Many people can make use of it at the same time.
It has the same characteristics as that of mainframe above; it is only smaller than mainframe
computer.
Characteristics
• They handle small amounts of data, are less powerful, & have less memory than the
mainframes.
Applications
3. Engineering plants
4. Automatic processing
14
Rightway Mega Network (234 706 450 3055)
Also they are well adapted for functions such as
• Accounting
• Word processing
• Database administration
3. MICRO COMPUTER
Microcomputer is simple user type of computer and support wide range of applications.
Microcomputer has no limit in terms of usage and application. It is far smaller in size
compared to mini computer. The first commercially available microcomputer was introduced
by Intel Around 1974. You can have the whole set of it on your computer unlike the mainframe
minicomputer. Examples of some manufacturers of microcomputers are:
(1) IBM (2) Dell (3) Hewelt Packard, Samsung, Compaq, Microbos and compatibles
Shape: The shape of microcomputer can be in form of a Desktop (flat), minitower, Notebook
and Laptop.
Micro computer does not generate heat as that of mainframe and mini computer but then
still requires A, C or fan in its working environment. It is easy to repair or maintain and also
cheaper to purchase compared to others.
Characteristics
The following are the various types of microcomputers in operation today arranged in
descending order according to size.
15
Rightway Mega Network (234 706 450 3055)
• Notebook or laptop; portable convenient for mobile users.
• Other examples of the microcomputer are smartphone, Tablet, server, palmtop, and
workstation.
Classification By Purpose/Usage
When computer is to be classified based on usage, then we have just two types of computers.
They are:
1. SPECIAL PURPOSE COMPUTERS: These are the types of computers designed to perform a
specific function. No matter what you do to it, it will only do what it has been designed to do.
It is mostly used in some environments like scientific laboratory, medical research laboratory,
petrol stations, weather forecasting environment etc.
Examples:
Feature Phones
The so-called feature or dumb phones (many of which are still in use even nowadays) are
specialized computing devices. Their processing functions are limited to activities such as
making or receiving calls, sending and receiving text messages, and storing contact
information.
While present day gaming consoles are becoming more of general purpose computing devices
because of their increasing amount of functionality, their predecessors from only a few years
ago were specialized for playing video games and could not do much else. Many hand held
gaming devices are still special purpose computers.
E-book Readers
Ebook readers are another example of special purpose computers. Devices which are made
for the sole purpose of reading electronic books such as the Amazon Kindle are special
purpose computers.
16
Rightway Mega Network (234 706 450 3055)
Cars manufactured nowadays come with at least one computer. This computer is responsible
for, among other things, monitoring engine emissions and adjusting said engine. This
computer receives information from a number of sensors and then uses this information to
control the operation of the car engine. Most can also detect faults and notify their owners
of these through mechanisms such as the “Check engine” light.
Digital Cameras
Many digital cameras are sophisticated, computing devices which give the photographer the
ability to delete, move or otherwise manage the captured digital image files. In addition many
of these cameras also use digital image processing techniques to enhance, filter or otherwise
modify the captured images.
Automatic Transmission
This is a type of transmission that automatically changes a car’s gear ratio as it moves thus
doing away with the need for the driver to shift gears manually. In modern cars a computer
controls each and every one of these operations.
ATMs were created to reduce the banking public’s reliance on banking staff and to also
improve the convenience of their services by allowing people to access some of these even
outside the institutions’ working hours. ATMs allow bank customers to conduct tasks like cash
withdrawals and balance enquiries. These devices require computing power in order to
facilitate their automatic operation and communication with the bank’s computers. The
computers also oversee the authentication of the customer. So an ATM is another example
of a special purpose computer.
MRI Machines
In fact advances in computing technology were crucial to the development of practical MRI
which requires a lot of computational power.
CT scanners
A Computed Tomography (CT) scan is another medical imaging technology which makes
heavy use of computing. The desired images are generated by computer-processing a
17
Rightway Mega Network (234 706 450 3055)
combination of several x-ray measurements which are all taken from different angles. These
machines produce cross-sectional images of specific areas of the scanned object without the
need for any cutting. This is another example of a special purpose computer in the medical
field.
These are industrial digital computers which are specially designed for the control of
manufacturing processes and machinery such as assembly lines or robotic devices. PLCs are
rugged and are adapted to be highly reliable, fault tolerant and easy to program in industrial
environments.
Aircraft Autopilot
This is a system designed to automatically control the trajectory of an aircraft. It reduces the
need for constant manual control of the vehicle by a human operator. Modern autopilot
systems use computer software to control the craft. This software reads the aircraft’s current
position and then controls the flight control system in order to guide the aircraft. Both the
software and the hardware that make up these systems are designed to be highly reliable.
2. GENERAL PURPOSE COMPUTER: General Purpose Computers are simply the type of
computers that can be programmed to do so many things. There usages are not limited. So
many programs and applications can be run on it. It can be useful in Medical line, Accounting
line, Personnel line, Business center sector etc.
Examples:
Over the years, there has been great improvement in the development of computers since
it’s discovery.
18
Rightway Mega Network (234 706 450 3055)
Based on these immeasurable changes, there are generally considered to be five generations
of computers:
FIRST GENERATION:
The first generation was manufactured between the years 1940 – 1960. They were quite very
large, very slow and bulky due to the use of their vacuum tubes for relay and not so reliable
as the computers of this present age. They were very costly to maintain due to their large
electrical power. Air conditioning and space requirement.
First generation computers have magnetic tape for input and output devices.
Other well known examples of first generation computers are: EDSAC, EDVAC, UNIVAC II AND
IBM 650.
SECOND GENERATION:
The second generation was introduced between 1956 and 1965. They were faster and more
reliable than first generation computers. The smaller size brought about low heat generation
and less power requirements. They were able to replace vacuum tubes with transistors. Also,
they were able to introduced removable magnetic disk packs. Magnetic tapes became
popular and punch cards were widely used.
THIRD GENERATION:
These were introduced at about the year 1964. They made use of integrated circuit (IV) in
which all the elements of electronic circuits were contained in a small silicon chip. Those micro
electronic circuits were smaller and more reliable than the transistor circuits and greatly
increased the speed memory capacity and reduced the size of computers.
They made use of magnetic disks as their storage media. Usage and programming language
like Cobol, Fortran, basic were made possible. DEC as an example came as stream in 1965
(DEC = Digital Equipment Corporation).
They were manufactured at about the year 1970 and were very powerful, reliable and equally
more efficient than the earlier made computer. They made use of (LSI) Large-scale integrated
semi conductive circuits for both the logical and memory circuits. LSI actually led to the
development of micro computer in 1971 by M. E. HOFF of Intel cooperation for the processing
unit was placed in a single chip called” Micro processor”.
19
Rightway Mega Network (234 706 450 3055)
FIFTH GENERATION COMPUTER: The fifth generation computer was manufactured around
1980’s. The fifth generation computers are more powerful, reliable, fast, smaller and cost less.
The technology behind the fifth generation of computers is AI. It allows computers to behave
like humans. It is often seen in programs like voice recognition, area of medicine, and
entertainment.
Some of the popular advanced technologies of the fifth generation include Artificial
intelligence, Quantum computation, Nanotechnology, Parallel processing, etc.
20
Rightway Mega Network (234 706 450 3055)
Unit 2
COMPONENT OF COMPUTER SYSTEM
By component we mean the elements of computer. They are those things that comes up
together to make a computer system.
(1). HARDWARE
Hardware is the tangible part of computer system. It is simply the parts that can be seen and
touched. All things connected to the central processing unit box are parts of the hardware.
For example, all the output and input devices.
HARDWARE COMPONENTS
This is the physical components/parts of the computer that can be seen and touched. It can
be divided into two (2) parts namely:
ii. Air-conditionals
Provides cool atmosphere that is dust free to the computer system, this will prolong
the life span of the system.
C.P.U.
INPUT DEVICE:
These are the equipment for feeding or sending data and information program to be executed
into the computer’s main memory.
Examples are:
(a) Light pen: used to draw on the Visual Display Unit
(b) Mouse: used to input data for execution in the windows environment
(c) Keyboard: used to key in data into the computer’s main processor
(d) Joystick: used to play games in the computer environment
(e) Monitor (VDU): is also used for viewing document after which it can be sent to
the printer (Hard copy) or transfer to the backing storage media for later use.
OUTPUT DEVICE:
They are the devices that allow us to get back information or the result after the computer
has carried out processing activities on the input data/information.
Examples are:
a. Computer speakers
b. Headphones
c. Optical mark reader
d. Monitor
e. Printer
(2). SOFTWARE:
Apart from those tangible and visible parts that make up the computer system, there are
other essential components of computer which cannot be seen nor whether can be touched
22
Rightway Mega Network (234 706 450 3055)
and without which your computer would not be able to work at all. The components simply
called software.
Software is a set of instructions, data or programs used to operate computers and execute
specific tasks.
Software is a generic term used to refer to applications, scripts and programs that run on a
device. It can be thought of as the variable part of a computer, while hardware is the
invariable part.
Software Types
1. System Program:
a. Operating System: Operating systems are the most important type of system software.
An operating system is a software that controls how your hardware works, which means it
manages the computer's memory, processor, and all of its software and hardware.
b. Device Drivers: Device drivers are tiny programs that enable a computer to communicate
with its hardware devices, such as printers, scanners, and keyboards. Without device
drivers, the hardware you connect to your computer will not be working properly. For
example, without device drivers, your printer will not work properly. Device manufacturers
provide most device drivers, but Microsoft also provides some generic ones.
d. BIOS and UEFI: BIOS (basic input/output system) is a firmware code that is executed
when a computer is powered on. It performs a power-on self-test (POST) and initializes the
computer before loading the operating system. The BIOS is stored in a ROM (read-only
memory) chip on the motherboard.
UEFI (unified extensible firmware interface) is a newer type of firmware that offers more
features than BIOS. UEFI is designed to be platform-independent and can be used with a
23
Rightway Mega Network (234 706 450 3055)
variety of operating systems. UEFI also supports a larger boot volume than BIOS and can boot
from devices with a 2TB or more capacity.
Programming language translators are programs that convert code written in one
programming language into another programming language. This translator can be helpful
when you want to take code written in one language and run it on a machine that only
understands another language. It converts code from an older language into a newer one,
making it easier to keep your code up-to-date.
2. Application Program:
An application program is a comprehensive, self-contained program that performs a
particular function directly for the user. It provides users with tools to accomplish a specific
task.
3. Utility Program:
The Utility Program is system software that helps to maintain the proper and smooth functioning
of a Computer System. It assists the Operating System to manage, organize, maintain, and
optimize the functioning of the computer system.
Utility Software performs certain tasks like virus detection, installation, and uninstallation, data
backup, deletion of unwanted files, etc. Some examples are antivirus software, file management
tools, compression tools, disk management tools, etc.
1. Antivirus: A virus is a malicious software that enters the system along with a host
program. Moreover, it multiplies with time and makes several copies which in turn slows
down and corrupts the system. An antivirus is a utility software that helps to keep the
24
Rightway Mega Network (234 706 450 3055)
computer virus-free. It notifies when any malicious file is detected and removes such files. In
addition, it scans any new device attached to the computer and discards any virus if there. It
also scans the system from time to time for any threats and disposes of them. Examples of
antivirus are McAfee Antivirus, Quickheal Antivirus, Windows Defender, etc.
2. File Management System: These utility software are used to manage files of the computer
system. Since files are an important part of the system as all the data is stored in the files.
Therefore, this utility software help to browse, search, arrange, find information, and quickly
preview the files of the system.
Windows Explorer is a default file management tool present in the system. Some other
examples of file management tools are Google Desktop, Double Commander, Directory
Opus, etc.
4. Disk Management Tools: These utility software are used to manage data on disks.
Moreover, they perform functions like partitioning devices, manage drives, etc. Examples of
disk management tools are MiniTool Partition Wizard, Paragon Partition Manager, etc.
5. Disk Cleanup Tool: This utility software helps to free up the disk space. In addition, the
files which are no longer in use are removed from the disk. Examples are Razer Cortex,
Piriform CCleaner, etc.
6. Disk Defragmenter: This utility software helps to reduce the fragmentation and hence,
reduces the access speed. Defragmenting refers to rearranging files and storing them in
contiguous memory locations. Moreover, saves time in reading from files and writing files to
disk. Examples of disk defragmenters are Perfect disk, Deflaggler, etc.
7. Backup Utility: This utility software helps to back up the files, folders, databases, or
complete disks. Moreover, backup refers to duplicating the disk information so that the data
can be restored if any data loss happens.
25
Rightway Mega Network (234 706 450 3055)
(c) Control: this part of CPU extracts instructions, performs execution, maintains and
directs operations of entire system. It sees to the normal working of the other
processing units of the control processor, i.e the memory and A.L.U.
26
Rightway Mega Network (234 706 450 3055)
Unit 3
COMPUTER FILES
A computer system consists of devices, memory, processors, etc. Along with this, there is
one of the important or core fundamental aspects which is computer files. These computer
files are used to store the data in digital format. Data that is to be stored can be images,
videos, audio, or text files.
A computer file is defined as a medium used for saving and managing data in the computer
system. The data stored in the computer system is completely in digital format, although
there can be various types of files that help us to store the data.
Data can be in the form of text, image, video, multimedia files of some other documents, or
some other types.
Computer file allows us to store all these types of data without any problem or without
failure. There is a unique identifier associated with each file which helps users easily locate
the stored file, helps the user to access the stored data from the computer system.
A computer has three types of files: application files, data files, and system files.
A file is created using a computer program. For example, to create a text file, you would use
a text editor; to create an image file, you would use an image editor; and to create
a document, you would use a word processor.
Computer files are stored on a drive (e.g., the hard drive), disc (e.g., DVD (digital versatile
disc)), and a diskette (e.g., floppy disk), and may be in a folder (directory) on that medium.
• When saving a file to your computer, you are saving the file to the hard drive.
File Management/Arrangement
Microsoft Windows computer users can view, manage, and organize their files with Windows
Explorer, and Apple users can use the Finder. See our file system definition for further
information about file management.
27
Rightway Mega Network (234 706 450 3055)
• How to list files in a directory or folder on the computer.
Show the files in a Windows folder
Microsoft Windows users who want to list files on the computer can open My
Computer or Windows Explorer and open the C: drive. Once in the C: drive,
all files and folders in the root directory of your primary hard drive are listed.
• In Windows, most of your programs are stored in the Program Files folder, and your
documents are frequently saved in the My Documents folder.
• How to copy files.
To copy computer documents, pictures, or other files from one place to another, follow these
instructions.
• When copying files, you are going to get more than one copy of the file on your
computer. If you want only one copy of the files, move them instead.
• A file name must be unique. If it's not, a number is appended to the end of a file name.
It may also have "- Copy" appended to the end of the file name, instead of a number.
Appending a number to the end of the copied file's name assures the copied file is
unique. For example, if the original file name is abc123.pdf and a copy is created in
the same directory or folder, the copied file name could be abc123(1).pdf or abc123 -
Copy.pdf.
1. Go to the files or folders you want to copy. If you need help locating the files, use
the Windows find feature.
2. Highlight the file or files you want to copy by clicking them once with the mouse. If you
need to highlight more than one file, hold down the Ctrl or Shift keys on your keyboard,
or drag a box around the files you want to copy.
3. Once highlighted, right-click one of the highlighted files and select Copy. Users may also
press the Ctrl+C keyboard shortcut, or in Windows Explorer, click Edit at the top of the
window and select Copy.
4. Open the destination folder, right-click an empty space in the folder, and select Paste. Or,
in the menu bar at the top, click File, choose Edit, then select Paste.
28
Rightway Mega Network (234 706 450 3055)
Cut and Paste
To cut and paste a file, select the file you want to move, right-click the highlighted file, and
then select Cut. Browse to the folder you want to move the file to, right-click in the folder,
and select Paste.
Alternatively, click Edit from the file menu, select Cut to cut the files, browse to where you
want to move the files, then select Edit and Paste in the file menu.
Finally, you can also use keyboard shortcuts to cut and paste files. Select the files you want to
cut, then press the keyboard shortcut Ctrl+X to cut the files. "Cutting" the files is like cutting
text in a document: it moves the files to a temporary "clipboard" until you "paste" them
somewhere. Navigate to the destination folder and press the keyboard shortcut Ctrl+V to
paste the files. The files are now in your destination folder.
Drag-and-drop
Highlight the files you want to move, press and hold your right mouse button, and drag-and-
drop the files to where you want to move them. When you release the mouse button, a menu
appears, similar to the example shown in the picture. Select the Move here option to move
the files.
• For drag-and-drop to work, you'll need to be able to see the window of where you are
moving the files.
To use the "Move to Folder" command, select the file by clicking the file name. Click
the Edit menu near the top-left of the window and select the Move to Folder option. In the
new window browse to the folder you want to move the file, then click the Move button to
move the file to that folder.
If you are using Windows 8, once the files are selected the Move to option is shown under the
Home tab.
Windows users can rename their files and directories using one of the following methods.
We've listed the following recommendations in what we believe to be the easiest methods of
renaming a file. These methods work for most types of files, including text, photos,
documents, and others.
• Renaming a folder containing files may cause problems if that folder contains files that
are required by a program. For example, if the program is looking for a folder named
29
Rightway Mega Network (234 706 450 3055)
"data" and you rename it to "other" the program would no longer know where data
files are located.
Method one
• In Windows 11, select Show more options in the right-click menu to see
the Rename option.
Method two
Method three
• File Explorer in Windows 11 does not have a file menu like previous versions of
Windows. Instead, click the Rename icon in the menu bar at the top.
Method four
• If you don't wait long enough and click the file or folder too fast, it can open it rather
than allowing you to rename it.
1. Open Explorer.
2. In Explorer, select all the files you want to rename.
3. Once the files are selected, press F2 to edit the file name and type the new name for
the files. For example, typing "test" renames the files to test, test(1), test(2), test(3),
etc. If you have file extensions displayed, make sure to also type the name of the file
extension.
30
Rightway Mega Network (234 706 450 3055)
• How to delete a file, directory, or folder.
Microsoft Windows users can delete an unwanted file or folder (directory) from a hard drive
or external disk drive using many different methods. Below are the more common methods
for deleting a file or folder in Microsoft Windows.
• To delete a hidden file in Windows, you first need to set hidden files to be visible.
• Users not familiar with Windows should realize that if you delete a folder or directory,
all files and folders in that folder or directory are deleted.
• The steps below are for deleting a single file or folder. However, the user can use the
same steps to delete multiple files or folders.
Delete key
Locate the item you want to delete, highlight it by left-clicking the file or folder with your
mouse once, and press Delete. You can browse the location of the file or folder using My
Computer or Windows Explorer.
• You can delete multiple files or folders by pressing Ctrl and clicking each file or folder
before pressing Delete.
• You can hold down Shift while pressing Delete to prevent files from going to the
Recycle Bin when deleted.
Open My Computer or Windows Explorer. We recommend you make sure the directory or
folder is empty before proceeding, unless you intend to delete everything in it. Locate the file
or folder you want to delete and right-click it. Choose the Delete option from the pop-up
menu.
• The local disk contains files and folders that are imperative for your computer to run
correctly. Unless you know what you are deleting, please do not delete any files from
this section.
Open My Computer or Windows Explorer. On the left side of the screen, click This PC. On the
right side of the screen, locate and double-click the local disk (usually C: or D:). Double-click
the folder containing the file you want to delete. Select the file or folder you want to delete,
click File in the top menu bar, and select Delete.
To delete from a USB (universal serial bus) flash drive, floppy drive, memory card, or external
hard drive, open My Computer or Windows Explorer. On the left side of the screen, click This
PC. On the right side of the screen, locate and double-click the drive, which is labeled as USB,
31
Rightway Mega Network (234 706 450 3055)
flash drive, external hard drive, or the manufacturer's name. Select the file or folder you want
to delete, click File in the top menu bar, and select Delete.
Open My Computer or Windows Explorer. Locate and select the file or folder you want to
delete, click File in the top menu bar, and select Delete.
If the File menu is not visible in My Computer or Windows Explorer, press Alt to make the
menu bar visible, including the file menu.
Some documents and folders may be protected from deletion through encryption or
password protection. In this case, you may be asked for a password to decrypt or remove the
password protection.
A file may be set as read-only, meaning the user can only open it for viewing and not modify
or delete it. When trying to delete a read-only file, you get a message stating the file is write-
protected and cannot be deleted. You need to modify or write permissions to delete the file.
Some files may only be deleted with administrator permissions. To delete these files, you
would need to have administrator rights on the computer. If you are using a work computer,
the technical support staff often are the only users with administrator rights on the computer.
Another possible cause of problems with deleting a file or folder is
a virus or malware infection. Viruses and malware can prevent files or folders from being
modified or deleted. If this is the case, you need to remove the virus or malware infection to
delete the affected file or folder.
Windows 11
1. Press the Windows key on your keyboard, then type part or all the file name (A) you
want to find.
2. In the search results, click the Apps, Documents, or Web section header (B) to view a
list of files that meet the search criteria. For more choices of search results, click
the More section header (C) and select an option from the drop-down menu.
32
Rightway Mega Network (234 706 450 3055)
3. Click the file name you want to open.
• You can use the arrow keys to arrow up or down to the app, file, document, or setting
you want to view and press Enter to open it.
Windows 10
Microsoft Windows provides an easy-to-use search feature that helps you find any file on your
computer, even if you don't know its full name. Whether you need to find a document,
spreadsheet, picture, or video, the Windows search feature helps you find it. Choose your
computer's Windows version from the list below and follow the steps to search for a file.
Search examples and tips are also available by clicking the search tips link below.
1. Press the Windows key on your keyboard, then type part or all the file name you want
to find.
2. In the search results, click the Documents, Music, Photos, or Videos section header
to view a list of files that meet the search criteria.
33
Rightway Mega Network (234 706 450 3055)
3. Click the file name you want to open.
• You can use the arrow keys to arrow up or down to the app, file, document, or setting
you want to view and press Enter to open it.
Windows 8
Windows XP
34
Rightway Mega Network (234 706 450 3055)
Unit 4
DATA COLLECTION AND CONTROL
In the field of Information and Communication Technology (ICT), data collection and control
are essential aspects of managing information efficiently and securely.
1. Source Variety: ICT systems collect data from diverse sources, including online
platforms, user interactions, sensors, databases, and connected devices. This wide
array of sources contributes to a comprehensive understanding of the digital
landscape.
2. Automated Data Collection: Many ICT systems automate data collection processes,
using technologies like sensors, log files, and analytics tools to gather information
continuously. Automation ensures real-time data updates and reduces manual efforts.
3. User Interactions: Data is collected from user interactions with websites, applications,
and communication channels. This information is valuable for user experience
optimization, personalization, and understanding user behavior.
4. Big Data Processing: ICT deals with large volumes of data, often referred to as "big
data." Technologies such as Hadoop and Spark enable the processing and analysis of
massive datasets to extract meaningful insights.
5. Data Mining and Analytics: ICT employs data mining and analytics tools to extract
patterns, trends, and valuable information from large datasets. This helps in making
informed decisions and predictions.
6. Quality Assurance: Focuses on ensuring the accuracy, completeness, and reliability of
collected data. Quality assurance measures may involve validation checks, cross-
referencing, and verification processes.
1. Access Control: ICT systems implement robust access control mechanisms to manage
user permissions and restrict unauthorized access to sensitive data. This involves user
authentication, authorization, and encryption.
2. Cybersecurity Measures: In ICT, data control includes comprehensive cybersecurity
measures to protect against cyber threats, including firewalls, intrusion detection
systems, antivirus software, and regular security audits.
3. Data Encryption: Encrypting sensitive data ensures that even if unauthorized access
occurs, the information remains secure and unreadable without the proper decryption
keys.
4. Data Integrity Checks: ICT systems implement data integrity checks to ensure that
data remains accurate and unaltered. Hash functions and checksums are commonly
used for verifying data integrity.
35
Rightway Mega Network (234 706 450 3055)
5. Compliance with Regulations: ICT professionals ensure that data management
practices adhere to legal and regulatory requirements, such as data protection laws,
privacy regulations, and industry-specific standards.
6. Disaster Recovery Planning: In ICT, data control includes planning for disaster
recovery, including regular backups, redundant systems, and procedures to restore
data in case of system failures or unexpected events.
7. Version Control: Especially relevant in software development within ICT, version
control systems are used to manage different versions of software code, ensuring
collaboration and tracking changes over time.
Data collection and control in ICT are critical for harnessing the potential of information while
safeguarding its integrity, confidentiality, and availability. These processes contribute to
effective decision-making, system reliability, and the overall security of digital ecosystems.
In nursing and health systems, data collection and control are critical components that
contribute to the delivery of effective and efficient healthcare services.
These processes involve systematically gathering, managing, and ensuring the quality of
health-related data to support decision-making, improve patient outcomes, and enhance
overall healthcare delivery.
Here's an overview of data collection and control in nursing and health systems:
1. Patient Information:
o Collecting and recording patient demographics, medical history, medications,
allergies, and other relevant information is essential for providing personalized
and safe healthcare.
2. Clinical Assessments:
o Nurses conduct various clinical assessments, such as vital sign measurements,
pain assessments, and nursing diagnoses, to monitor and evaluate patients'
health status.
3. Electronic Health Records (EHRs):
o Transitioning from paper records to electronic health records facilitates
efficient data collection, storage, and retrieval. EHRs integrate patient
information, support clinical decision-making, and improve communication
among healthcare providers.
4. Diagnostic Test Results:
o Gathering and documenting results from diagnostic tests, laboratory work, and
imaging studies contribute to comprehensive patient profiles and aid in
diagnosis and treatment planning.
5. Surveys and Patient Feedback:
36
Rightway Mega Network (234 706 450 3055)
o Collecting patient feedback through surveys helps assess patient satisfaction,
identify areas for improvement, and enhance the overall quality of healthcare
services.
6. Public Health Data:
o Collecting epidemiological data on disease prevalence, community health
indicators, and healthcare utilization supports public health planning and
intervention strategies.
1. Quality Assurance:
o Implementing quality control measures ensures the accuracy, completeness,
and reliability of healthcare data. Regular audits and reviews help identify and
correct errors or discrepancies.
2. Compliance with Regulations:
o Health systems must adhere to regulatory standards and compliance
requirements, such as HIPAA (Health Insurance Portability and Accountability
Act) in the United States, to protect patient privacy and data security.
3. Data Security:
o Implementing robust data security measures safeguards patient information
against unauthorized access, ensuring confidentiality and integrity.
4. Standardization of Data:
o Standardizing data elements and coding systems enhances interoperability
and facilitates the exchange of information across different healthcare
settings, reducing errors and improving continuity of care.
5. Training and Education:
o Ensuring that healthcare professionals are adequately trained on data
collection protocols, privacy policies, and security measures promotes
consistent and accurate data management practices.
6. Data Governance:
o Establishing effective data governance frameworks helps define roles,
responsibilities, and processes related to data management. This includes
policies for data stewardship, data ownership, and data quality.
7. Continuous Improvement:
o Engaging in continuous quality improvement initiatives based on data analysis
helps identify opportunities for enhancing healthcare delivery, reducing
errors, and improving patient outcomes.
Data collection and control in nursing and health systems are integral for evidence-based
practice, promoting patient safety, and supporting healthcare providers in delivering high-
quality care. Effective management of health data contributes to better-informed decision-
making, improved patient outcomes, and the overall advancement of healthcare services.
37
Rightway Mega Network (234 706 450 3055)
STAGES OF DATA COLLECTION AND CONTROL
The stages of data collection and control involve data creation, transmission, and processing.
PowerPoint and Excel are versatile tools that can be utilized at different stages, especially in
data creation and presentation.
1. Data Creation:
• Definition: This stage involves generating and recording data based on the research
objectives. It includes designing instruments, such as surveys or questionnaires, and
collecting data through various methods.
• Tools: PowerPoint and Excel can be used for designing survey forms or questionnaires,
especially when the data collection involves visual elements or structured forms.
2. Data Transmission:
• Definition: After data creation, it may need to be transmitted from one location to
another, especially in cases where data is collected remotely or in the field.
• Tools: Data transmission can occur through various means, such as emails, cloud
storage, or specialized data transmission tools. PowerPoint and Excel files can be
attached to emails or shared through cloud platforms for collaborative work.
3. Data Processing:
• Definition: This stage involves transforming and analyzing the collected data to derive
meaningful insights. It includes cleaning, organizing, and manipulating data for
statistical or qualitative analysis.
• Tools: Excel is a powerful tool for data processing, offering features for sorting,
filtering, and performing various calculations. PowerPoint may be used to present
summarized or visualized data.
4. PowerPoint:
5. Excel:
• Application: Excel is a spreadsheet program that is widely used for data manipulation,
analysis, and visualization.
• Role: Excel plays a significant role in the data processing stage. It allows users to
perform calculations, create charts, and organize data in a tabular format, making it a
valuable tool for researchers and analysts.
38
Rightway Mega Network (234 706 450 3055)
DATA SECURITY
Data security refers to the protection of digital information, systems, and networks from
unauthorized access, disclosure, alteration, or destruction. It is a crucial aspect in maintaining
the confidentiality, integrity, and availability of sensitive data.
In the context of viruses and antivirus measures, data security is particularly vital to prevent
malicious attacks and unauthorized access to computer systems.
• Viruses:
o A computer virus is a type of malicious software designed to infect and spread
across computer systems. Viruses can damage data, disrupt system
functionality, and compromise the security of a computer or network.
• Antivirus:
o Antivirus software is a set of programs designed to detect, prevent, and
remove malicious software, including viruses, malware, spyware, and other
threats. Antivirus tools play a crucial role in safeguarding computers and
networks from cyber threats.
Effective prevention and control of viruses involve a combination of proactive measures and
reactive responses. Here are key strategies:
39
Rightway Mega Network (234 706 450 3055)
6. User Education and Training:
o Educate users about the risks associated with viruses and the importance of
safe computing practices. Training programs can empower users to recognize
potential threats and take appropriate precautions.
7. Regular Backups:
o Implement a regular data backup strategy to ensure that critical information is
not lost in the event of a virus attack. Store backups in a secure location and
test restoration procedures periodically.
8. Network Security:
o Secure network infrastructure with strong passwords, encryption, and access
controls. Monitor network traffic for unusual activities and implement
intrusion detection and prevention systems.
9. Incident Response Plan:
o Develop and implement an incident response plan to address virus outbreaks
promptly. This plan should outline steps to identify, contain, eradicate, and
recover from a virus incident.
o An Incident Response Plan (IRP) is a comprehensive strategy designed to guide
an organization's response to security incidents, including virus outbreaks and
other cybersecurity threats. It outlines the steps and procedures to be
followed when a security incident occurs, with the goal of minimizing damage,
reducing recovery time, and maintaining the integrity of systems and data.
10. Security Audits and Assessments:
o Conduct regular security audits and assessments to identify vulnerabilities and
weaknesses in the IT infrastructure. Address any findings to enhance overall
system security.
40
Rightway Mega Network (234 706 450 3055)
WHAT ARE THE ADVANTAGES OF ELECTRONIC DATA PROCESSING OVER MANUAL
PROCESSING?
Electronic Data Processing (EDP) offers several advantages over manual processing, making it
a preferred method for handling and managing data in various fields. Here are some key
advantages of electronic data processing compared to manual processing:
41
Rightway Mega Network (234 706 450 3055)
7. Automation and Integration:
o EDP: Electronic systems can automate repetitive tasks and integrate
seamlessly with other systems. This automation reduces the need for manual
intervention and promotes a more streamlined workflow.
o Manual: Manual processes often lack the ability to integrate with other
systems, leading to isolated data silos and inefficiencies in overall operations.
8. Real-Time Processing:
o EDP: Electronic systems can process and update data in real-time, providing
up-to-the-minute information. This real-time capability is crucial in dynamic
environments where timely decision-making is essential.
o Manual: Manual processing may involve delays in updating information,
leading to outdated or inaccurate data in certain situations.
Electronic data processing offers significant advantages in terms of speed, accuracy, volume
handling, cost-effectiveness, security, automation, and real-time processing when compared
to manual processing. These advantages contribute to the widespread adoption of electronic
systems in various industries and applications.
42
Rightway Mega Network (234 706 450 3055)
Unit 5
COMPUTER NETWORKING
Computer networking is the practice of connecting computers and other devices to share
resources and communicate with each other.
This can be anything from sharing files and printers to accessing the internet.
1. Communication Protocols: These are the rules and conventions that govern how
devices communicate with each other over the network. Protocols define things like
how data is formatted, transmitted, received, and interpreted. Examples include
TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer
Protocol), and FTP (File Transfer Protocol).
2. Networking Devices: Various hardware devices facilitate network communication.
These include routers, switches, hubs, modems, and access points. Each device serves
a specific purpose in managing, directing, or facilitating data transfer across the
network.
3. Networking Models: Networking models provide a conceptual framework for
understanding and standardizing network communication. The OSI (Open Systems
Interconnection) model and the TCP/IP model are two widely used models. They break
down network communication into layers, each handling specific functions like data
encapsulation, routing, and error detection.
4. IP Addressing: Every device connected to a network is identified by an IP (Internet
Protocol) address. IP addressing allows devices to locate and communicate with each
other across the network. IPv4 (Internet Protocol version 4) and IPv6 (Internet
Protocol version 6) are the two main versions of the IP protocol.
5. Network Security: Protecting data and ensuring the integrity of network
communication is crucial. Network security measures include encryption, firewalls,
intrusion detection systems (IDS), virtual private networks (VPNs), and access control
mechanisms.
6. Wireless Networking: Wireless networks enable devices to connect and communicate
without physical cables. Wi-Fi, Bluetooth, and cellular networks are examples of
wireless technologies. They provide flexibility and mobility but require additional
security measures to protect against unauthorized access.
7. Internet: The Internet is a global network of interconnected devices and networks. It
allows users to access a vast array of resources and services, including websites, email,
file sharing, and streaming media. The Internet operates based on standardized
protocols and relies on a decentralized architecture.
8. Network Types: Networks can be categorized in various ways based on their size,
reach, and purpose. Common network types include local area networks (LANs) that
connect devices in a small area like a home or office, and wide area networks (WANs)
that span larger geographical distances, like connecting offices across different cities.
43
Rightway Mega Network (234 706 450 3055)
Overall, computer networking enables the exchange of data and resources between devices,
facilitating communication, collaboration, and the sharing of information across local and
global scales.
A Local Access Network (LAN) is a type of computer network that connects devices within a
limited geographical area such as a home, office building, school, or campus. LANs are
designed to facilitate communication and resource sharing among devices that are in close
proximity to each other.
A LAN includes various network components, such as cables, switches, routers, firewalls, load
balancers and wireless access points (WAPs). It can be connected to a wide range of network
devices, such as game consoles, servers, desktop and laptop computers, printers and internet
of things (IoT) devices.
Wired LAN
A wired LAN uses switches and Ethernet cabling to connect endpoints, servers and IoT devices
to the corporate network. For small businesses with only a handful of devices, a wired LAN
can consist of a single unmanaged LAN switch with enough Ethernet ports to interconnect all
devices.
Wireless LAN
A wireless LAN (WLAN) enables devices to connect to the network without the need for
physical cables. Wireless LANs send data over radio waves using wireless network technology.
This type of LAN is frequently seen in homes, workplaces, shops and restaurants where
mobility is crucial. WLANs enable networked devices, such as computers, cellphones and
tablets, to connect to the internet or other shared resources.
In many situations, a WLAN is preferable to a wired LAN connection because of its flexibility
and cost savings, as it isn't necessary to run cabling throughout a building.
1. Limited Geographic Area: LANs typically cover a small area, such as a single building
or a group of buildings. They are not intended to span large distances like wide area
networks (WANs).
44
Rightway Mega Network (234 706 450 3055)
2. High Data Transfer Rates: LANs often provide high-speed data transfer rates, allowing
devices to communicate with each other quickly and efficiently. This is important for
applications that require real-time communication or large file transfers.
3. Shared Resources: Devices connected to a LAN can share resources such as printers,
files, and internet connections. This sharing promotes collaboration and increases
efficiency within the local network environment.
4. Common Technologies: LANs can be implemented using various technologies,
including Ethernet, Wi-Fi (Wireless LAN), and Token Ring. Ethernet, with its wired
connections, is one of the most commonly used technologies for LANs, while Wi-Fi
enables wireless connectivity within the LAN.
5. Private Ownership and Control: LANs are typically owned, operated, and controlled
by a single organization or individual. This allows the network administrator to
implement security measures and configure the network according to the
organization's requirements.
6. Scalability: LANs can be easily expanded or modified to accommodate changes in the
network environment, such as adding new devices or upgrading existing
infrastructure. This scalability makes LANs suitable for both small and large
organizations.
Overall, LANs play a crucial role in facilitating local communication, resource sharing, and
collaboration among devices within a confined geographic area. They form the foundation of
many modern networked environments, enabling businesses, educational institutions, and
individuals to connect and interact effectively.
WHAT IS INTERNET
The Internet is a global network of interconnected computer networks that allows billions of
devices worldwide to communicate with each other. It's essentially a massive network of
networks, comprising millions of private, public, academic, business, and government
networks.
1. Global Reach: The Internet spans the entire globe, connecting devices and networks
across countries, continents, and oceans. This global reach enables communication
and data exchange between users worldwide.
2. Decentralized Architecture: The Internet operates on a decentralized architecture,
meaning there is no central authority or single point of control. Instead, it relies on a
distributed system of interconnected routers, servers, and other devices to transmit
data between users.
3. Standardized Protocols: Internet communication is governed by a set of standardized
protocols, most notably the TCP/IP (Transmission Control Protocol/Internet Protocol)
suite. These protocols define rules and conventions for data transmission, addressing,
routing, and other aspects of network communication.
4. Services and Applications: The Internet provides a wide range of services and
applications, including email, web browsing, social media, online gaming, video
45
Rightway Mega Network (234 706 450 3055)
streaming, file sharing, and more. These services are accessible through various
devices such as computers, smartphones, tablets, and IoT (Internet of Things) devices.
5. World Wide Web (WWW): The World Wide Web is a system of interconnected
webpages and websites accessible via the Internet. It allows users to access and
navigate multimedia content, hyperlinked documents, and other resources using web
browsers such as Chrome, Firefox, Safari, and Edge.
6. Search Engines: Search engines like Google, Bing, and Yahoo enable users to find
information on the Internet by indexing and organizing web content. Users can enter
keywords or phrases to retrieve relevant web pages, documents, images, videos, and
other resources.
7. E-commerce and Online Transactions: The Internet facilitates e-commerce by
enabling businesses and consumers to buy and sell goods and services online.
Payment gateways, digital wallets, and secure protocols ensure the security and
integrity of online transactions.
8. Security and Privacy: Internet security is a major concern due to the potential risks of
cyber attacks, data breaches, malware, and other threats. Various security measures
such as encryption, firewalls, antivirus software, and secure authentication
mechanisms help protect users' data and privacy online.
The Internet plays a pivotal role in modern society, offering numerous benefits and
contributing to various aspects of daily life.
46
Rightway Mega Network (234 706 450 3055)
5. Entertainment and Media: The Internet offers a wealth of entertainment options,
including streaming services for movies, TV shows, music, podcasts, and online
gaming. Users can access a diverse range of content on-demand, tailored to their
preferences and interests.
6. Remote Work and Telecommuting: The Internet facilitates remote work
arrangements by enabling employees to collaborate and communicate with
colleagues from anywhere in the world. Video conferencing, cloud-based productivity
tools, and virtual office platforms support seamless remote collaboration.
7. Social Connection: Social media platforms like Facebook, Twitter, Instagram, and
LinkedIn allow users to connect, share, and interact with friends, family, colleagues,
and communities. These platforms foster social connections, facilitate information
sharing, and provide a platform for self-expression.
8. Research and Innovation: The Internet serves as a hub for research and innovation,
enabling collaboration among scientists, researchers, engineers, and innovators
worldwide. Online repositories, forums, and collaborative platforms support
knowledge exchange and interdisciplinary collaboration.
9. Global Connectivity: The Internet breaks down geographical barriers, connecting
people from diverse cultures, backgrounds, and locations. It promotes cultural
exchange, global awareness, and cross-cultural understanding by facilitating
communication and interaction across borders.
10. Empowerment and Empowerment: The Internet empowers individuals and
communities by providing access to information, resources, opportunities, and
platforms for expression. It democratizes access to knowledge, amplifies voices, and
enables grassroots activism and social change.
Email, short for electronic mail, is a digital communication method that allows individuals and
organizations to exchange messages over the Internet. It has become one of the most widely
used forms of communication, offering several benefits including:
1. Speed: Emails are delivered almost instantly, allowing for quick communication
between parties regardless of their location.
2. Convenience: Email can be accessed from various devices, including computers,
smartphones, and tablets, making it convenient for users to stay connected wherever
they are.
3. Cost-effectiveness: Sending emails is typically much cheaper than traditional mail, as
it doesn't require paper, envelopes, or postage fees.
4. Global Reach: Email enables communication with people around the world, breaking
down geographical barriers and facilitating international collaboration.
5. Documentation: Emails provide a record of communication, making it easy to track
conversations, reference previous messages, and maintain a history of interactions.
6. Attachments: Emails allow users to attach files such as documents, images, videos,
and presentations, making it easy to share information and collaborate on projects.
47
Rightway Mega Network (234 706 450 3055)
7. Personalization: Users can customize their email messages with formatting options,
signatures, and personalized greetings, adding a personal touch to their
communication.
8. Automation: Email software often includes features for automating tasks such as
sending automated replies, scheduling emails to be sent at a later time, and organizing
incoming messages into folders.
9. Security: While email security is a concern, especially with the risk of phishing attacks
and spam, encryption technologies and authentication mechanisms help protect
sensitive information transmitted via email.
Email remains a fundamental tool for communication in both personal and professional
settings, offering speed, convenience, and versatility for exchanging messages and
collaborating with others.
48
Rightway Mega Network (234 706 450 3055)
Unit 6
ICT IN HEALTH CARE
Information and Communication Technology (ICT) plays a crucial role in transforming
healthcare delivery, improving patient outcomes, and enhancing efficiency in the healthcare
industry. Here are some key ways ICT is utilized in healthcare:
1. Electronic Health Records (EHR): EHR systems digitize patient health records,
including medical history, test results, medications, and treatment plans. EHRs
improve access to patient information, enable better coordination of care among
healthcare providers, and reduce the risk of medical errors.
2. Telemedicine and Telehealth: Telemedicine utilizes ICT to deliver healthcare services
remotely, allowing patients to consult with healthcare providers via video
conferencing, phone calls, or secure messaging platforms. Telehealth encompasses a
broader range of remote healthcare services, including remote monitoring,
teleconsultation, and telepsychiatry.
3. Mobile Health (mHealth): Mobile health applications and devices leverage
smartphones, tablets, and wearable technology to empower patients to monitor their
health, track medical data, and manage chronic conditions. mHealth solutions support
remote patient monitoring, medication adherence, and lifestyle management.
4. Health Information Exchange (HIE): HIE systems facilitate the secure exchange of
patient health information between different healthcare organizations, such as
hospitals, clinics, laboratories, and pharmacies. HIE promotes interoperability,
continuity of care, and collaboration among healthcare providers.
5. Clinical Decision Support Systems (CDSS): CDSS utilize ICT to provide clinicians with
evidence-based guidelines, alerts, and recommendations at the point of care. CDSS
help healthcare providers make informed decisions, improve diagnostic accuracy, and
enhance patient safety.
6. Healthcare Analytics: Healthcare analytics platforms analyze large volumes of
healthcare data to extract actionable insights, identify trends, and support evidence-
based decision-making. Analytics tools enable healthcare organizations to improve
operational efficiency, optimize resource allocation, and enhance quality of care.
7. Remote Monitoring and Wearable Devices: Remote monitoring technologies and
wearable devices allow healthcare providers to monitor patients' vital signs, activity
levels, and other health metrics remotely. These devices enable early detection of
health issues, proactive intervention, and personalized care management.
8. Health Information Systems: Comprehensive health information systems integrate
various ICT components to manage clinical, administrative, and financial aspects of
healthcare delivery. These systems support functions such as scheduling, billing,
inventory management, and reporting.
9. Health Education and Patient Engagement: ICT tools facilitate health education and
patient engagement by providing access to online resources, interactive educational
materials, and virtual support communities. Patient engagement platforms empower
individuals to take an active role in managing their health and making informed
healthcare decisions.
49
Rightway Mega Network (234 706 450 3055)
ICT plays a transformative role in modern healthcare delivery, enabling greater accessibility,
efficiency, and quality of care while promoting patient-centered approaches and empowering
individuals to participate in their own health management.
1. Electronic/Digital Devices:
o Diagnostic Devices: ICT has facilitated the development of advanced
diagnostic imaging technologies such as ultrasound, CT scan, MRI, fluoroscopy,
and mammography. These devices enable healthcare professionals to visualize
internal structures, detect abnormalities, and diagnose medical conditions
accurately.
o Monitoring Devices: ICT-based monitoring devices such as oximeters, cardiac
monitors, glucose monitors, and wearable sensors allow continuous
monitoring of patients' vital signs, physiological parameters, and health
metrics. These devices support remote patient monitoring, early detection of
health issues, and timely intervention.
o Treatment Devices: ICT plays a crucial role in treatment modalities across
various medical disciplines. For example, in radiotherapy, ICT is used to plan
and deliver precise radiation doses to target cancer cells while minimizing
damage to surrounding tissues. Similarly, in physiotherapy, surgery,
chemotherapy, and other treatment modalities, ICT-based devices enhance
precision, efficiency, and patient safety.
2. Telemedicine:
o Telemedicine leverages ICT to provide remote healthcare services, enabling
patients to consult with healthcare providers, receive medical advice, and
access healthcare resources without the need for in-person visits.
Telemedicine encompasses teleconsultation, telemonitoring, telepsychiatry,
and other remote healthcare modalities, improving access to care, especially
in underserved or remote areas.
3. Information Search:
o ICT facilitates information search and retrieval, empowering healthcare
professionals to access a wealth of medical literature, research studies,
evidence-based guidelines, and clinical decision support tools. Online
databases, medical journals, electronic textbooks, and healthcare information
systems enable healthcare providers to stay updated on the latest medical
advancements, best practices, and treatment guidelines.
4. Effect of ICT on Quality Nursing Care:
The integration of Information and Communication Technology (ICT) has had
a profound impact on nursing care quality, revolutionizing how nurses deliver
care, communicate with patients and colleagues, manage information, and
make clinical decisions.
50
Rightway Mega Network (234 706 450 3055)
Ways In Which ICT Influences The Quality Of Nursing Care:
ICT plays a critical role in modern healthcare, enhancing diagnosis, treatment, monitoring,
research, and nursing care quality. By leveraging electronic/digital devices, telemedicine,
information search tools, and nursing informatics, healthcare providers can deliver high-
quality, accessible, and patient-centered care, ultimately improving patient outcomes and
healthcare delivery efficiency.
51
Rightway Mega Network (234 706 450 3055)