StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Levels of computer control - Essay Example

Cite this document
Summary
There are various levels at which a computer system can exercise control,each of which will be discussed herein and compared to the specifics in the case at hand.The purpose of this paper is to agree or disagree that the level of computer control implemented in the Therac system was appropriate to the maximum efficient operation of the device.
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.6% of users find it useful
Levels of computer control
Read Text Preview

Extract of sample "Levels of computer control"

Introduction There are various levels at which a computer system can exercise control, each of which will be discussed herein and compared to the specifics in the case at hand. The purpose of this paper is to either agree or disagree that the level of computer control implemented in the Therac-25 system was appropriate to the maximum efficient operation of the device. Levels of Computer Control Leveson shares nine levels of computer control. They are as follows: 1. The operator does everything; 2.

The computer tells the operator the options available; 3. The computer tells the operator the options available and suggests one; 4. The computer suggests an action and implements it if asked; 5. The computer suggests an action, informs the operator, and implements the action if not stopped in time; 6. The computer selects and implements an action if not stopped in time and then informs the operator; 7. The computer selects and implements an action and tells the operator if asked; 8. The computer selects and implements an action and tells the operator if the designer decides the operator should be notified; or 9.

The computer selects and implements an action without any human involvement (Leveson, 1995). The Therac-25 System The Therac-25 system was set at a certain level in order to allow the operator to maintain control over the machine at all times. It is given in the assignment that Although the computer is under operator control, yet clearly has sensors and information available to it to allow it to give error messages back to the operator, thus establishing it as in some sense a sort of independent actor exercising its own control.

Our concern here is the level in this control hierarchy at which those error messages are developed and resolved. (ComputingCases, 2008) Extensive computer control was boasted as one of the main innovations of the machine, especially since it allowed AECL to check for hazardous conditions using the software the complemented the machine. "The control console and printer etc. are all located outside the heavily shielded treatment room. Thus, when pressing the key to begin the treatment, the operator does not have any direct access to the machine or the patient.

All the occurrences in the treatment room must be observed through the TV monitor and the intercom" (ComputingCases, 2008). The intercom is two-way, while the monitor is only one-way (the operator can see the patient, but not the other way around). (ComputingCases, 2008) The first step of the process is for the operator to set up the patient and target the beam. This requires treatment parameters to be entered into the machine in the treatment room. After the operator leaves the room, the computer console is used to confirm each treatment parameter.

Then, the computer adjusts to the parameters that have been entered. Any mistakes in the parameters can be edited at this point without the operator having to start over (ComputingCases, 2008). "When the computer indicates that the setup has been done correctly, the operator presses the actuation switch. The computer turns the beam on and the treatment begins. There are three possible outcomes at this point, and they all depend on sensors on the machine. If the sensors indicate no trouble, the treatment concludes successfully.

If the sensors indicate a minor problem, like the beam being slightly out of tune, the computer turns the beam off immediately. The operator can then press a "proceed" key to retry the treatment up to 5 times. If the sensors indicate a more serious malfunction, like the beam being significantly stronger or weaker, the computer turns the beam off immediately and requires the machine to be completely setup from the beginning" (ComputingCases, 2008). Conclusion Reaching a conclusion at this point in the case is rather difficult.

That is, of course, because of knowing the ultimate outcome of the Therac-25 system. However, one must say that, at this particular point in the study, it appears that the level of computer control implemented in the Therac-25 system was appropriate to the maximum efficient operation of the device (ComputingCases, 2008). As discussed in this paper, there are various levels at which a computer system can exercise control. The Therac-25 system operated at a level of control that fell around Level 6 in Leveson's list of the various levels of control at which a computer can operate.

It is suspected, however, that this viewpoint will change when the next section of material is read. It was not, however, read before this paper at the request of the instructor (ComputingCases, 2008). References Guide to the supporting documents. (2008). ComputingCases.org. Retrieved March 12, 2008, from http://computingcases.org/case_materials/therac/supporting_docs/Guide_to_Supporting_Docs.html Leveson, N.G. (1995). Safeware: System safety and computers. Addison-Wesley. Therac . (2008).

ComputingCases.org. Retrieved March 12, 2008, from http://computingcases.org/case_materials/therac/supporting_docs/therac_case_narr/therac_toc.html Why a socio-technical system (2008). ComputingCases.org. Retrieved March 12, 2008, from http://computingcases.org/general_tools/sia/socio_tech_system.html

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Levels of computer control Essay Example | Topics and Well Written Essays - 500 words”, n.d.)
Levels of computer control Essay Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/information-technology/1516741-levels-of-computer-control
(Levels of Computer Control Essay Example | Topics and Well Written Essays - 500 Words)
Levels of Computer Control Essay Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/information-technology/1516741-levels-of-computer-control.
“Levels of Computer Control Essay Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/information-technology/1516741-levels-of-computer-control.
  • Cited: 0 times

CHECK THESE SAMPLES OF Levels of computer control

Information Systems Audit and Control: Computer Fraud

To prevent this high-tech crime we must recognize the nature of computer frauds and understand how and why this is being done.... The definition of computer frauds may vary in ways but they all end in one common conclusion; it is an act causing loss of property to another by input, alteration, deletion, and suppression in which offenders are also classified as insiders or outsiders.... ) in the design of computer and communication system.... In the paper “Information Systems Audit and control: Computer Fraud” the author discusses computer frauds, which can inflict enormous damage to an organization and community....
8 Pages (2000 words) Essay

Evolution of Computer Technology

This paper will examine the development of computer technology – its rapid evolution – today.... As mentioned elsewhere in this paper, since the 1980s the development and design of computer systems have been technology and market driven.... Two important considerations have so far stood out in shaping the evolution of computer systems during these past twenty years – mobility and speed.... This paper makes a conclusion that the concepts of pipelining and memory management are of interest because it highlights the achievement of computer development in terms of how computer architecture processes today's media-rich data....
4 Pages (1000 words) Essay

Development of Computers in Simulating the Human Brain

Since the inception of computer technology, researchers have anticipated about the probability of constructing smart machines that could compete with human intelligence.... What we call minds are merely very complicated digital computer programs.... Mental states are only computer states and mental procedures are computational systems.... It follows that a person could not find out that the brain or anything else was inherently a digital computer....
12 Pages (3000 words) Essay

The History of Computer Programming

This discussion explores the history of computer programming over the years up to the Computer programming started in the 19th century, though scientists had started designing several devices such as calculators for various purposes before this period.... In 1945, John Von Neumann invented the concepts of ‘shared-program technique' and ‘conditional control transfer'.... The shared program technique stated that complex instructions should control simple hardware instead of the simple hardware being wired for every program....
5 Pages (1250 words) Research Paper

Computer Literacy and the World Wide Web

These products can then be used to support planning, forecasting, control, decision making, coordination and functional activities in business.... Hardware is the computer system physical components which can be classified as input devices, internal along with external memory, a central processing unit (CPU) and output devices.... The Input devices capture data into the computer.... The CPU processes by doing instructions that… The internal memory is a provisional data storage as well as instructions means while external memory stores data and programs exterior to the computer....
4 Pages (1000 words) Essay

Computer Impacts on Human Life

This has cropped even into the transport industry where locomotives have been devised to be partially under the control of computers and human beings.... The paper "computer Impacts on Human Life" discusses that computers have revolutionized every aspect of human and societal lifestyles.... computer as technology has transformed the behaviors of its users to a greater extent in this age of the computer.... When computer devices are interconnected within a network structure that is not appropriately protected, hackers are likely to get access to the networking protocol and access any data that is either stored on the computers or being transmitted via the network links....
8 Pages (2000 words) Research Proposal

Advantages of Computer Numerical Control

"Advantages of computer Numerical Control" paper focuses on CNC systems that have helped most of the organizations attain their required level of production with minimal costs.... he use of computer numerical control has led to the development of possibilities and advantages that other numerical controls could not have attained.... One of the most predominant advantages of computer numerical control is that it is easier to use compared to the older numerical control....
13 Pages (3250 words) Coursework

Airborne Fly-by-Wire Software

Since the system is controlled electronically, there is an opportunity to incorporate system control expansion and envelope protection features that would have been problematic to provide in a conventional mechanical system (Spitzer 2007, p.... The B777 Primary Flight control System has made full use of the capabilities of this architecture by including features like bank angel protection, turn compensation, stall and over-speed protection, pitch control and stability augmentation, and thrust asymmetry compensation....
9 Pages (2250 words) Report
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us