Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Majumin Hanum
Open University Malaysia
INTRODUCTION
CBCT2203 Basic Concepts of Information Technology is one of the courses offered
at Open University Malaysia (OUM). This course is worth 3 credit hours and
should be covered over 8 to 15 weeks.
COURSE AUDIENCE
This course is offered to all learners who are enrolled in the Bachelor of
Information Technology programme. It aims to impart to learners the knowledge
of information technology (IT) in general and its application in computer science
in particular.
STUDY SCHEDULE
It is a standard OUM practice that learners accumulate 40 study hours for every
credit hour. As such, for a three-credit hour course, you are expected to spend 120
study hours. Table 1 gives an estimation of how the 120 study hours could be
accumulated.
Study
Study Activities
Hours
Online participation 15
Revision 16
3. Propose solutions for general IT and Internet-related issues in daily life based
on the knowledge of existing technologies in the market.
COURSE SYNOPSIS
This course is divided into 10 topics. The synopsis for each topic is listed as follows:
Topic 3 explains the input and output (I/O) processes of computers through the
discussions of various input and output devices such as keyboard, printer,
scanning devices, mouse, visual display units and audio I/O units, among others.
Topic 7 reviews the history and the development of the Internet. In this topic, we
shall take a look at the elements that contribute to the successful proliferation of
the Internet especially the World Wide Web, the accomplishments of the
technology and the activities that we can carry out online today.
Topic 10 wraps up the module with a reflection on the impacts of IT ă how it has
revolutionalised industries, the paradigm shifts that has affected the way we work,
play and live and the new ethical problems that arises such as issues of computer
security, personal privacy, ergonomics and environmental sustainability.
Learning Outcomes: This section refers to what you should achieve after you have
completely covered a topic. As you go through each topic, you should frequently
refer to these learning outcomes. By doing this, you can continuously gauge your
understanding of the topic.
Summary: You will find this component at the end of each topic. This component
helps you to recap the whole topic. By going through the summary, you should be
able to gauge your knowledge retention level. Should you find points in the
summary that you do not fully understand, it would be a good idea for you to
revisit the details in the module.
Key Terms: This component can be found at the end of each topic. You should go
through this component to remind yourself of important terms or jargon used
throughout the module. Should you find terms here that you are not able to
explain, you should look for the terms in the module.
References: The References section is where a list of relevant and useful textbooks,
journals, articles, electronic contents or sources can be found. The list can appear
in a few locations such as in the Course Guide (at the References section), at the
end of every topic or at the back of the module. You are encouraged to read or
refer to the suggested sources to obtain the additional information needed and to
enhance your overall understanding of the course.
PRIOR KNOWLEDGE
This is an introductory course on IT. While there are no specific prerequisites,
learners are expected to have a basic knowledge in operating a computer system
and using productivity software (such as word processing, spreadsheet and
browsing the Internet) in order to carry out the activities and complete the
assignments.
ASSESSMENT METHOD
Please refer to myINSPIRE.
REFERENCES
Main Reference
Vermaat M., Sebok, S. L., Freund, S. M., Campbell, J. T., & Frydenberg, M. (2017).
Discovering computers: Technology in a world of computers, mobile devices
and the Internet (Enchanced, Shelly Cashman Series). Boston, MA: Cengage
Learning.
Additional References
Abdul Razak Hamdan, & Mohd Zakree Ahmad Nazri. (2004). Teknologi
maklumat dan komunikasi. Kuala Lumpur, Malaysia. McGraw-Hill
Education.
Capron, H. L., & Johnson, J. A. (2004). Computers: Tools for an information age
(8th ed.). Upper Saddle River, NJ: Prentice Hall.
Comer, D. E. (2007). The Internet book: Everything you need to know about
computer networking and how the Internet works (4th ed.). Upper Saddle
River, NJ: Pearson Prentice Hall.
Lehnert, W. G., & Kopec, R. (2008). Web 101 (3rd ed.). Boston, MA: Pearson
Addison-Wesley.
INTRODUCTION
Information technology (IT) which has been around for more than half a century
had its beginnings in a laboratory. Now, IT is being taught in schools and is
considered as one of the major resources for business organisations. IT is still being
used in the latest IT and information and communication technology (ICT) gadgets
such as smartphones and tablets (refer to Figure 1.1).
In this topic, you will be introduced to the IT era. You will be able to familiarise
yourself with the concept of IT and its characteristics. Other important issues
discussed include the principles, functions and benefits of IT. Towards the end of
this topic, the Multimedia Super Corridor Malaysia (MSC Malaysia) and cyber
laws will also be presented.
Era Description
Information Era Most workers are involved in the creation, distribution and use of
information.
There are six features that differentiate the information era from the agricultural
and industrial eras (Senn, 1998) as shown in the following:
ACTIVITY 1.1
2. From the three eras that you have read in Subtopic 1.1, which era
do you think Malaysia is currently in? Justify your answer.
Element Definition
Data The basic facts or raw facts which consist of texts, diagrams, graphics,
images, audio and video clips, which are devoid of context or, in
essence, „meaningless‰.
Knowledge Consists of information that has been arranged and processed to convey
understanding, experience as well as expertise which can be used to
solve problems.
According to Table 1.2, „data‰ that has been refined, formatted and summarised
are transformed into „information‰. Information that has been interpreted,
decided and acted upon is converted into „knowledge‰. With knowledge, users
can make the best decisions and take appropriate actions.
Another element is „wisdom‰, which comes after knowledge. While the previous
three elements of data, information and knowledge can be attained from computer
processing, wisdom can only be achieved by humans through accumulated
experiences. Knowledge and experience are needed to make sensible decisions or
judgements, also known as evaluated understanding.
In general, IT is the main player in the information era. The technology is used to
access, store and distribute information, especially information in digital form. IT
refers to the use and deployment of various items in the creation, storage and
distribution of information. Table 1.3 contains some definitions of IT.
Source Definition
Behan and Holmes IT is a term to explain the technology that enables us to record,
(1990) store, process, retrieve, send and receive information.
Reynolds (2010) IT includes all tools that capture, store, process, exchange and use
information.
(a) Data
A collection of raw facts and figures that are used by programs to produce
useful information. This data can be organised into databases or file systems.
(b) Software
Computer programs such as application software (word processor,
spreadsheet, graphic design package, database and so forth) and system
software (operating system, communication software and so forth).
(c) Hardware
Hardware consists of the computer and its components, input hardware
(such as keyboard and mouse), processing hardware (such as processor and
memory), output hardware (such as monitor and printer), storage hardware
(such as disk drive) and communication devices (such as modem).
(d) People
Information systems are programmed by humans. They in turn are also the
users of IT. Therefore, the success or failure of an IT system also depends on
how effectively it is developed and used.
(e) Procedures
These are policies that define how and by whom IT is used. Procedures
include actions that are used by people when processing data into
information such as operating the computer, data entry, communication,
maintenance, back up, recovery and troubleshooting.
In the early years of computer technology, computers were used only by scientists
and engineers for research and development. Later, computers were used by
businesses and governmental organisations. Computers were used to support the
running of businesses, large and small. Today, computers are being used by
professionals, students and in the homes.
In general, microchips have become more powerful, have bigger memory capacity
and other hardware components have also increased tremendously, without much
increase in their physical sizes. As a result, computers have become smaller and
cheaper but with bigger capacity and more capability.
There has never been a rigid definition of the various classes of computers. Indeed,
their functions and capabilities keep on expanding and as such, the number of
classes is even debatable. However, there is a broad spectrum of computing
hardware ranging from supercomputers to microcomputers, with no clear line that
divides the classes. In general, computers decrease in size and cost over time as
you go from the large supercomputers and mainframes to the small
microcomputers while computing speed and power increase exponentially. The
four traditional classifications are shown in Table 1.5.
Example
SELF-CHECK 1.1
ACTIVITY 1.2
Principle Description
Reliable It is impossible to say that an IT system works 100 per cent all the
time. Sometimes, it works 99 per cent of the time and 1 per cent it
does not work. However, it is important that reliability does not go
below a certain threshold.
Flexible People are able to use the IT system anywhere and anytime.
Foster innovation Creativity in developing new software and hardware for the new
era such as early warning systems for bad weather.
Easy and All the tools and facilities should be easy to learn and use.
transparent
Affordable People should be able to afford the IT systems that they intend to
use.
Retrieving Locating data and obtaining them Faxes, e-mails, voice mails, reports.
again.
Benefit Description
Speed A relative value ă computers can perform within seconds, at speeds that
are much faster than humans.
Reliability With their speed, consistency and accuracy, we can trust and rely on
computers to produce the same results again and again.
With four benefits to be gained from using IT as listed in Table 1.8, we cannot
ignore the opportunities offered by it. In general, there are two categories of
opportunities:
IT has been used in various fields with the objective of solving problems and
helping people. Hence, IT users should be aware of the following three basic
responsibilities:
Both IT professionals and IT users need to communicate with each other with
regard to the increasing use of IT, for creating new ideas and for getting the desired
benefits.
SELF-CHECK 1.2
Essentially, the MSC Malaysia areas will serve as a platform for the ICT industry
and local companies to cluster together to develop ICT solutions such as enterprise
software, data warehousing, high-end specialised applications and e-commerce
operations. For example, Cyberjaya was a greenfield project that has been
purposefully planned and developed to be an „intelligent city‰, complete with the
latest ICT infrastructure and a modern university (Multimedia University) to
support multimedia industries, research and development centres, and to be used
by multinational corporations as their operation headquarters.
Foreign and local companies operating in MSC Malaysia are awarded MSC
Malaysia Status based on the relevance of their ICT businesses to the development
objectives of the government. The MSC initiative have thus far resulted in the
establishment of over 3,000 MSC Malaysia Status companies, creating jobs for
more than 16,000 knowledge workers.
(a) Innovation
The use of ICT brought about a new and innovative way for government
services to be delivered to the people. For example, checking the status of an
application for business licenses, passports and work permits (after office
hours or during weekends when the office is closed) and instant access to
information on websites of ministries and other public institutions.
ACTIVITY 1.3
The six differences between the information era and the previous eras (Senn,
1998) are the emergence of an information-based society, the success of
businesses and management jobs depends on IT, work processes are changed
and transformed to upgrade productivity, IT provides the basis for
optimisation, the success of IT depends on the effectiveness in using it and IT
is embedded or integrated into many products and services.
In general, computers can be classified into the four classifications, which are
microcomputer, mainframe, minicomputer and supercomputer.
Martin, E. W., Brown, C. V., DeHayes, D. W., Hoffer, J. A., & Perkins, W. C. (1998).
Managing information technology: What managers need to know (3rd ed.).
Upper Saddle River, NJ: Prentice Hall.
INTRODUCTION
A computer system is the combination of hardware and software. Hardware is the
physical manifestation of the computer while software consists of the programs
that command the hardware.
In this topic, we will discuss the most important hardware component, which is
the Central Processing Unit (CPU). The CPU or processor is the centre of all
activities responsible for changing raw data into the required information in the
computer. Next, we will move to the most important computer hardware ă the
memory. This is the hardware component that works closely with the CPU. While
the CPU performs the complex processing, memory lends itself for storing data,
intermediate data and results for the CPU. Besides the processed data, the program
codes are also stored in the memory. The processor and the memory work hand-
in-hand while the computer is activated. Towards the end of this topic, the system
unit and the system clock will also be presented.
The function of a CPU is to execute the stored software instructions, turning data
into information. These instructions are executed in „machine language‰.
Figure 2.1 illustrates how other devices, which are connected to the computer,
communicate with the processor to carry out a task. When a user runs an
application, its instructions (which are coded in a program) are transferred from a
storage device to memory. Data needed by programs and applications enters the
memory from either an input device or a storage device. The control unit interprets
and executes instructions in memory, and the arithmetic logic unit performs
calculations on the data in memory. The resulting information is stored in the
memory, from which it can be sent to an output device for immediate access by
the user or a storage device for future access, as needed.
There are two sections in a CPU, which are the Control Unit (CU) and Arithmetic
Logic Unit (ALU). Let us learn about these two sections.
In other words, the control unit manages the taking of an instruction, decodes the
instruction to know its aim, instructs the arithmetic logic unit to execute the
instruction, and then directs storing of the results to the memory (primary storage),
register or cache.
SELF-CHECK 2.1
3. What are two types of operations carried out in the arithmatic logic
unit?
ACTIVITY 2.1
Processors for mobile computers also include the technology to optimise and
extend the battery life and integrate wireless capabilities. Smaller mobile devices
often use more compact processors that consume less power, yet offer high
performance.
SELF-CHECK 2.2
2.3 MEMORY
The memory is separated from the CPU but is normally integrated with it and is
accessed by it. Data and instructions need to be present inside the memory before
it is being accessed by the CPU. The memory simply holds the data and
instructions temporarily as long as the program being used is operational.
In general, the storage space for the memory can be used in five different forms for
the following:
(a) Storing the operating system and other system software programs that act as
interfaces between hardware and application programs, and controlling
computer resources;
(c) Storing data temporarily, that is, data received from input devices or
secondary storage to be processed or to be sent to output devices or
secondary storage after processing;
(d) Storing data required during processing inside an area of storage work; and
Figure 2.4 illustrates how the memory communicates with the processor.
A computer processes and stores data as a series of electronic bits. These bits
transfer internally within the circuitry of the computer along electrical channels.
Each channel, called a bus, allows the various devices, both inside and attached to
the system unit, to communicate with one another. Just as vehicles travel on a
highway to move from one destination to another, bits travel on a bus.
In the Figure 2.4 model, all the bits of data are connected to the same system bus.
When a node in the bus (like the CPU) wants to read or write something to the
memory, it puts the address of the memory block to write onto the address bus
and data to the data bus, then raises the appropriate signal on the control bus like
R (read) or W (write) to inform other devices. When one of the other nodes notices
that the address belongs to it, it will capture the address and execute the
instruction, in this case getting the data out and putting it on the data bus for the
relevant node to read back.
Figure 2.4: Methods of how the memory communicates with the processor
There are three types of memory chips, which are random access memory (RAM),
read only memory (ROM) and complementary metal oxide semiconductor
(CMOS). Figure 2.5 shows examples of these memory chips.
SELF-CHECK 2.3
There are many types of memory inside a computer. What are the main
functions of memory?
Two types of random access memory chips that are normally used are:
ACTIVITY 2.2
http://www.howstuffworks.com/computer-memory.htm
Type Function
Erasable Programmable ROM The content of which can be erased by using the ultra-
(EPROM) violet ray method.
SELF-CHECK 2.4
What do you know about flash memory? State the differences and
similarities between flash memory and ROM or RAM.
Binary 2 0, 1
Octal 8 0, 1, 2, 3, 4, 5, 6, 7
Decimal 10 0, 1, 2, 3, 4, 5, 6, 7, 8, 9
Hexadecimal 16 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, A, B, C, D, E, F
There are three binary coding schemes ă the most popular one uses eight bits to
form one byte. These codes are ASCII, EBCDIC and Unicode, as explained in
Table 2.4.
Code Definition
Extended Binary Coded An 8-bit character encoding that is usually used in the IBM
Decimal Interchange mainframe operating systems and the IBM computer.
Code (EBCDIC)
SELF-CHECK 2.5
2.5.2 Motherboard
The motherboard (also known as system board, mainboard, logic board and planar
board) is a communication network for the entire computer system. Every
component of the system unit is connected directly to the motherboard.
It functions as a data bus that enables various components to communicate with
each other. External devices like the keyboard, mouse and monitor cannot
communicate with the system unit without the motherboard.
The motherboard is a thin circuit board that is filled up with sockets and electronic
components including various types of chips. One chip contains a very small
circuit board embedded in a stamp size piece of silicon. This chip is also known as
the silicon chip, semiconductor or integrated circuit. The chips are packaged and
inserted into the sockets of the motherboard. These electronic components and
chips are fixed to the system board as illustrated in Figure 2.6.
The BIOS provides a service enabling software to communicate with the input and
output devices. The ROM BIOS contains specific instructions. When a computer is
switched on, the BIOS will perform power-on self-test (POST) such as diagnostic
tests for the CPU and memory. It will then test communications with the hardware
such as the keyboard, disk drive and others. Finally, the BIOS will boot up the
operating system and submit control to the operating system.
The expansion slot is a socket on the main board, which enables an expansion card
to be installed. An expansion card, or expansion board, or adapter, or simply called
card, is actually a circuit board that can add more memory, input/output device
control or software to a computer.
An expansion card is inserted into the slot inside the system unit. A port on the
card enables cabling to be connected from the added card to the device outside the
system unit. We will see the various functions of the boards or cards as shown in
Table 2.5.
Small Computer Most computers have limited expansion slots. The SCSI card uses
System Interface only one slot but it can connect up to seven devices to the system
(SCSI) Card unit. This card is used to connect devices like the printer, hard
disc drive and CD-ROM to the system unit.
TV Adjuster Card The TV board that contains the TV and video adjuster can change
the TV signals to a format that can be displayed on the monitor.
PC Card Due to the size and limitations of the PC, an additional board the
size of a credit card has been created. This card can easily be
slotted in and changed from the outside of portable computers.
This is called the personal computer card or the Personal
Computer Memory Card International Association.
Memory Expansion It is useful for increasing memory and associating with other
computers. It enables the addition of random access memory
chips.
Display Adapter Enables various colour video displays for single or multiple
Card monitors to be used.
Control Card Enables the CPU to work with various software devices such as
the disk control card.
2.5.5 Port
The port is a connecting socket located outside the system unit. The port enables
software devices or input/output devices to be plugged in for connection to the
computer so that they can communicate with the computer system. A cable can be
used to connect input/output devices to the system unit through the port as shown
in Figure 2.7.
There are various types of ports and their functions are as shown in Table 2.6.
Parallel Port It is used for connecting external devices, which sends or receives
data in big amounts at a short distance. This port normally sends
simultaneously 8-bit data via eight parallel wires. A parallel port
is used to connect a printer to the system unit.
Serial Port It connects the mouse, keyboard, modem and other devices to the
system unit. Serial port sends data one bit at a time and is suitable
for sending information at long distance.
Accelerated It is used for connecting to the monitor and can support high-
Graphic Port speed graphics and other video inputs.
(AGP)
Universal Serial It is forecasted to replace serial and parallel ports. It is fast and
Bus (USB) Port one USB port can connect a few devices to the system unit.
Electrical Wire The latest port that is faster than the USB port, and is used to
Port connect high-speed printers and video cameras to the system
unit.
SELF-CHECK 2.6
1. What are the functions of the graphic adapter card? Give examples.
When a microprocessor chip changes, the bus line also changes. Most of the
devices like the expansion board will work with one type of bus only.
ACTIVITY 2.3
In a group, discuss how data moves inside the computer. Post your
conclusion on the myINSPIRE online forum.
CPU is divided into two sections or units, which are the control unit (CU) and
arithmetic logic unit (ALU).
What the control unit of the processor is to the computer can be thought of as
the equivalent of the brain to the body. It informs the entire computer on how
to execute program instructions.
ALU executes two types of operations, which are arithmetic operation and
logical operation.
The CPU and memory is interdependent. However, the memory is not part of
the CPU.
The RAM stores the programs and data being processed by the CPU.
The ROM chip contains a program that is loaded in the factory. The chip does
not evaporate and cannot be changed by users.
The system unit is a hardware unit or a space where the processor, memory
chips, ports, buses, additional slots, board (hardware in which chips and
related circuits are placed) and other electrical components are located.
The system clock is a circuit chip, which generates electronic pulses at a fixed
rate to synchronise or control timing activities of processing.
The bus line is also known as data bus or simply „bus‰, which connects the
CPU components with each other.
INTRODUCTION
In the previous topic, you have been introduced to the processor and memory, two
most important components of computer hardware. To enable the processor to
process data and the memory to store them, data needs to be brought into the
computer. After processing, the resulted information needs to be taken out of the
computer. These two jobs of taking in the data and taking out the information are
done by the input/output unit of the computer system.
In this topic, you will learn about various input and output methods. The keyboard
is the most popular input device used. Besides the keyboard, there are many other
latest input and output (I/O) devices that are available in the market. They will
also be discussed here.
ACTIVITY 3.1
In general, there are three approaches to data entry, as shown in Table 3.1.
Approach Description
Offline data entry After data has been entered, it will be changed into a suitable
form and will be verified. Data will be corrected if there are
errors. All data that has been confirmed as correct will be
processed. This method is less often used now and this is also
referred to as batch method.
Online data entry Similar to offline data entry, the difference is that the data
entered is directly examined and corrected. After all the data
has been entered, processing will then be done on them.
Interactive data entry Similar to online data entry, except that the data is examined
every time it is entered and processing on the data is done
immediately. There is no need to wait for all data to be
entered first before processing.
Input devices take data and programs that can be read or understood by humans,
and convert them into a form that can be processed by the computer. This new
form consists of electronic signals of „0‰ and „1‰, which can be read by machines
as explained in the Topic 2 Subtopic 2.4 on data representation.
An example of an input device that uses both types of entries (entry via keyboard
and direct entry) is the point-of-sale (POS) terminal. It is a kind of electronic cash
register that is widely used in business.
3.2.1 Keyboard
The most popular input device is the keyboard, which comprises the keyboard for
data entry and a terminal for displaying what has been entered (see Figure 3.2).
The keyboard contains a buffer and a control key. Whatever is typed is stored
inside the buffer (which can store more than one symbol) and later, scanned by the
computer processor after receiving interrupt signals from the control key. There
are various forms, styles, sizes, arrangements, touch or feel and the number of
keys. The following describes the characteristics common to most keyboards:
Cursor Cursor is a symbol on the display screen, which shows the site of
Movement data to be entered. It is also called „arrow‰.
Numeric Also called numeric keypad, these are separate keys for numbers
(0ă9), which have been arranged like a calculator. Sometimes, there
are two objectives, depending on the Num Lock key, i.e. cursor or
numeric movements.
(c) Functions
Keys that are labelled as F and normally F1−F12 have their functions defined
by the software.
(e) Arrangement
Arrangements of alphanumeric keys, which normally follows the QWERTY
order because the first five keys at the top line for alphanumeric letters are
Q, W, E, R, T and Y. A new arrangement is the DVORAK order. This new
arrangement of keys is made following the use of keys, that is, the keys that
are always used will be placed at an easily accessible location. As such, vowel
letters A, E, I, O and U are normally placed on the left while D, H, N, S and
T on the right. The next five keys that are most often used are placed on the
top line and so on.
(f) Touch/Feel
Nowadays, the softness of pressing the keys and the sound emitted can be
controlled by the software.
3.2.2 Terminal
The terminal is a device that connects you to a mainframe or other types of
computers called a host computer or server. There are three types of terminals as
shown in Table 3.3.
Terminal Description
Dumb Terminals Used to input and to receive data, but cannot process data by
themselves. They are used only to access information from the
computer and are often found at airline companies, post offices and
road transport department offices.
Intelligent They have a processing unit, memory and secondary storage like a
Terminals magnetic disk. Basically, an intelligent terminal is a microcomputer
with the communication software and modem or other
communication connectivity. This connects the terminals to a bigger
computer or the Internet.
(a) Mouse
Move (roll) to direct a pointer/cursor/icon on the screen. As your move a
mouse, the pointer on the screen also moves, this makes the vertical and
horizontal coordinates (position) of the mouse cursor changes. By checking
the coordinate, a computer can determine the cursorÊs position and displays
the cursor on the screen. It is considered to be the most user-friendly device.
There are three types of the mouse as described in Table 3.4.
Mouse Description
Trackball Mouse It uses balls to move and also known as a mechanical mouse.
Optical Mouse It uses light and requires a mouse pad that can reflect the light.
This mouse contains a section called photo-detector. It functions
like the ball mouse and is normally used on a high-powered
computer like a server.
Handwriting Changed to Type- A system that can be trained to recognise clear and
written Text with Training good handwriting.
Handwriting Changed to Type- This system is the most difficult and complex.
written Text without Training
SELF-CHECK 3.1
ACTIVITY 3.2
Normally, data is entered into the computer via keyboard. Do you know
of other methods that are used to enter data? List and explain how the
methods work.
(i) Audio Board ă The board that changes analogue sound to digital sound
and saves it for future use; and
(i) Frame Capture ă Can digitise one frame at a time only; and
(ii) Full Movement ă Can convert at the rate of 30 frames per second.
The main problem here is storage, not the input. Nowadays, digital video
cameras are available in the market, where the output is in digital form.
Digital video recorders will facilitate multimedia presentation or a form of
new broadcasting on the Internet, that is, web television.
(d) Sensor
These are input devices that collect data in specific forms directly from the
environment and send them to the computer. Sensors can be used to track
data such as speed, weight, temperature, image, shape, light, air pollution
and so forth. Have you ever weighed yourself using an audio enabled
weighing scale at the supermarket? That is one example of using a sensing
device to measure your weight as well as your height.
SELF-CHECK 3.2
ACTIVITY 3.3
Discuss with a coursemate what is the most common type of input device
used today. In addition, discuss why there are various types of input
devices.
ACTIVITY 3.4
How do we know the data we have entered into the computer is correct?
Discuss with your coursemates.
Besides soft copies and hard copies, decisions on output largely depend on a
number of factors such as:
ACTIVITY 3.5
How do we view the processing results after the data has been processed
by the computer? Try to figure out how the results are displayed and
discuss it with your coursemates.
3.5.1 Printer
The image displayed on the monitor is often referred to as soft copy. Information
that is produced on paper, whether from printer or plotter is called a hard copy
(see Figure 3.13).
Three popular types of printers which are often used together with
microcomputers are as follows:
The measure of printer speed depends on the type of printer or the method of
printing, whether on the basis of characters, lines or pages. The speed is characters
per second, lines per minute or pages per minute. Most printer models are desktop
printers which are difficult to move around (depending on size). The use of laptop
computers leads to portable printers.
Among the criteria in choosing printers are image quality, speed, level of noise and
cost of operation such as ink cost and spare parts.
SELF-CHECK 3.3
3.5.2 Monitor
Monitors are used for output as well as for input. There are two types of monitors
ă cathode ray tube (see Figure 3.15) and flat panel display (see Figure 3.16).
Standard Definition
Super Video Graphics Minimum resolution of 800 600 pixels.
Array (SVGA)
Extended Graphics Resolution up to 1,024 768 pixels; popular standard now.
Array (XGA)
Super Extended Resolution of 1,280 1,024 pixels.
Graphics Array (SXGA)
Ultra Extended The latest and highest standard; its use is continuously
Graphics Array growing, especially for high level engineering designs and
(UXGA) for graphical fine arts.
3.5.3 Plotter
Plotters are used specifically for producing bar charts, maps, architectural
drawings and three-dimensional illustrations. A plotter can produce multi-
coloured documents of high quality and also documents bigger than that
produced by other printers. There are four types of plotters as follows:
SELF-CHECK 3.4
2. State the differences between a cathode ray tube monitor and a flat
panel display monitor.
ACTIVITY 3.6
Input is like a bridge between data and processing, which is to enable data to
be carried from users to computer.
Direct data entry consists of data that can be read by a machine (computer) and
transferred as input directly into the computer.
Indirect data entry requires various media and the processing of the data
source before the actual computer processing.
There must be input control to safeguard the integrity of data and to prevent it
from becoming garbage in garbage out.
Output can take various forms such as screen output, printed paper, signals,
voice, microfilm and others.
Output devices which are used together with microcomputers are the monitor,
printer, plotter and voice output device.
INTRODUCTION
After discussing about input and output in the previous topic, we shall now move
on to another computer component device ă secondary storage. You will be
introduced to various types of secondary storage in the market together with their
comparisons.
While primary storage holds data temporarily, secondary storage does otherwise.
Secondary storage is the physical material on which a computer stores data,
instructions and information. A storage device has been designed to store data and
instructions in a permanent form and to retrieve them back. The process of
Figure 4.1 shows some common types of secondary storage which are widely used
today. It is also a method of storing data, information and instructions outside the
computer.
Capacity of a storage medium refers to the number of bytes (characters) that can
be held by a storage medium. Table 4.1 shows the capacity of a storage medium.
Approximate
Storage Term Exact Number of Bytes
Number of Bytes
Storage requirements among users vary greatly. While enterprise users require a
very large storage capacity such as 20 to 40PB (petabytes), home users may only
need 1 to 2TB (terabytes) of storage capacity. As the capacity differs among storage
medium, the speed of transferring data to and from the storage also differs.
The speed of storage devices and memory is defined by access time. Access time
measures the amount of time it takes to locate the required data on a storage
medium.
Characteristic Advantage
ACTIVITY 4.1
As the tape is in roll form, data will be stored serially. Every tape column (seven
or nine tracks) will represent one character. For data that is stored serially,
the storage method used is serpentine where data is stored one by one along one
or two tracks at one time. Data will be written from the beginning to the end of the
track concerned, and this will continue onto the part that has not yet been used as
graphically explained in Figure 4.2.
Besides that, there is also data that is stored in parallel. For the parallel type, data
will be written block by block or record by record. Every block of data will be
separated by a space, which is called inter-block gap. For record by record, the
space is called inter-record gap. The space is required because the tape cannot stop
immediately after it has been rolled. Normally, the use of tape is only 35ă70
per cent, depending on the blocking factor.
A magnetic tape drive is measured by how much data can be stored on the
magnetic tape as well as the speed of the tape passing through the read/write
head. The combination of these two determines the rate of transfer or the number
of characters per second that can be sent to the primary storage. Tape density is
measured by character per inch or bit per inch. Data density varies from 800 to
7,000bpi. The tape length is normally 600m, 366m or 731m.
Therefore, a tape of 366m with 6,250bpi can store up to 180MB of data. The size of
data that can be stored is normally between 40MB to 5GB. The drive that can
upgrade its maximum loading is digital audio tape (DAT). A digital audio tape
drive consists of two read heads and two write heads which read/write one type
of magnetic pole only. Data on the tape will be accessed and written serially.
There are two types of magnetic tape ă magnetic tape unit for large computers and
tape cartridge unit for personal computers. Currently, most tapes are used for safe
storage and copy storage because they are portable and cheap. Storage size of a
normal magnetic tape is between 20 and 40GB.
The disadvantage of a magnetic tape is the slow rate of serial data access. Its
advantages include low cost (cheap), portable and long lasting.
SELF-CHECK 4.1
The hard disk can store and access data faster and has a higher capacity. The hard
disk is a very sensitive device. Its read/write head floats on the disk surface at a
distance of less than 0.03 micrometre. This very close gap would not even fit a
small bacteria and therefore, it is possible for dusts, atoms of smoke, human hair
and fingerprints to cause destruction to the read-write head. This damage can
cause some or all the data on the hard disk to be destroyed as well.
An external hard disk is a separate hard disk that connects with a cable to a USB
port on the system unit or communicates wirelessly. Meanwhile, a removable hard
disk is a hard disk that you insert and remove from a drive. Compared to internal
hard disk, external and removable hard disks (Figure 4.4) are better in terms of:
(d) Adding storage space to a notebook and desktop computer, without having
to open the system unit.
ACTIVITY 4.2
How does it look like in a hard disk drive? Visit the following link to
discover the components of a hard disk drive:
http://www.youtube.com/watch?v=kdmLvl1n82U
During the writing of data onto the surface of an optical device, a high-powered
laser beam is used to form microscopic holes (pits) on the disc. Each pit represents
data „0‰ while part of the disc without a pit represents data „1‰. During the
reading of the optical disc, a low-powered laser beam is directed on the disc
surface. A reflection of the laser beam depends on the holes on the surface. If there
are holes, the reflection of the beam disperses and cannot be detected by the light
detector. This portrays the „0‰ state. If there is no hole or if the surface is flat (land),
a reflection of the beam focuses and can be detected by the light detector. This
portrays the „1‰ state.
There are four optical disc technologies used by computers as shown at Table 4.3.
Compact Disc- It is similar to the music compact disc (CD) in the market. Read
Read Only only means it cannot be written or erased by users. A user can
Memory only access data that has been written by the writer. CD-ROM is
(CD-ROM) also used for distributing databases, application software
packages and large references.
Compact Disc- It is so called write once, read many (WORM). CD-R means a
Recordable compact disc that is recordable, a disc that enables us to record
(CD-R) data or information. We can only write once onto the disc. It is
appropriate for use as multimedia storage and for archival.
A special drive is required for recording data onto CD-R.
Compact Disc- It is also known as erasable optical disc, as can be seen in Figure
Rewriteable 4.5. This disc is similar to the other CD-R except that its surface is
(CD-RW) altered whenever data is recorded. Since it can be altered, CD-RW
is normally used in building and editing multimedia
presentations.
Digital Versatile An all-digital disc with a type of storage which is almost the same
Disc (DVD) as the CD-ROM. It has the ability to store 135 minutes of video
data in digital form. It can also be used as storage for computers.
The DVD drive can read a CD-ROM but the CD-ROM drive
cannot read a DVD. Each DVD can store as much as 17GB of data.
(a) Solid-state drive (SSD) is a storage device that uses flash memory to store
data, instructions and information. It is used in all types of computers and
portable devices.
Solid state drive is better than magnetic hard disk in terms of the following:
(iv) Lasts three to five years longer than a hard disk lifespan.
Copyright © Open University Malaysia (OUM)
TOPIC 4 SECONDARY STORAGE 73
(b) Memory cards allow users to easily transport the digital content of their
camera, audio or video player and other devices to a computer or vice versa.
A memory card is a removable flash memory device that you normally insert
and remove from a slot in a computer, mobile device or card reader/writer.
(c) USB flash drive is a flash memory storage device that plugs into a USB port
on a computer or mobile device. It is one of the most popular portable storage
nowadays, due to its size and weight. It is small and light, with a storage
capacity ranging from 8GB to 256GB.
(a) Access files from any device that has Internet access;
(b) Share files with other users; and
(c) Store offsite backups of data.
Some of the widely used cloud storage providers are shown in Figure 4.7.
(a) A magnetic stripe card is a card with a stripe of material that can be
magnetised to store information on the card (see Figure 4.8). Information
stored in the stripe normally includes your name, account number and the
cardÊs expiration date. A magnetic stripe card reader reads the information
stored on the stripe. Examples of magnetic stripe cards include club
membership cards, petrol loyalty cards and bank automated teller machine
(ATM) cards.
(b) A smart card stores data on a thin integrated circuit embedded in the card
(see Figure 4.8). Smart card contains a processor and has input, process,
output and storage capabilities. When a smart card is inserted into a
specialised card reader, the information on the card is read, and if necessary,
updated. Examples of smart cards include MyKad, credit card and mobile
subscriber identification module (SIM) card.
(c) Microfilm and microfiche (see Figure 4.9) store microscopic images of
documents on roll or sheet film. A computer output microfilm recorder is the
device that records the images on the film. Microfilm and microfiche are
normally used in libraries to store back issues of newspapers and magazines.
The use of microfilm and microfiche greatly reduces the number of papers.
They are inexpensive and have the longest lifespan amongst all storage
media.
(d) RFID is a technology that uses radio signals to communicate, with a tag
placed in or attached to an object or a person. The RFID tag consists of an
antenna and a memory chip that contains the information to be transmitted
via radio waves. A RFID reader reads the radio signals and transfers the
information to a computer or computing device.
ACTIVITY 4.3
http://www.zetta.net/history-of-computer-storage
Note down the main points. Compare your notes with your coursemates.
Note:
Based on average cost of typical or common size for each storage type available in
the market.
* Non-SSD type hard disk.
** Magnetic tape quoted is based on Linear Tape-Open (Ultrium) cartridge
technology.
(a) Bit
It is represented by „0‰ and „1‰ and operated with hardware.
(b) Character/Byte
A byte is formed by eight bits. A character is formed by a group of bits but is
not necessarily made up of eight bits. Rather, it depends on the type of coding
system such as ASCII and EBCDIC. Examples are the characters A, B, D, U
and L.
(c) Field
It is a unit of data that is made up of one or more characters. This is the lowest
logical level of the data unit. Examples of fields are:
(i) Name ă It is fixed at 40 characters, for example, MOHD AKIL; and
(ii) Identity Card (IC) Number ă It is fixed at eight characters (old IC) and
12 digits/characters (new IC), for example, 740820-03-1233.
(d) Record
It is a collection of several related fields. It can also explain a certain event,
that is, a number of related fields of a certain event is combined together
logically to form a record. An example of a student personal record is made
up of several fields of student personal information, for example:
(i) Registration number: 7192
(ii) Name: Mohd Najmuddin bin Kamal
(iii) Faculty: Faculty of Information Technology and Multimedia
Communications
(iv) IC number: 780402-11-1438
(v) State/Place of birth: Johor
(vi) Current address: First College, Open University Malaysia
(e) File
It is a collection of several related records. An example of this is the student
personal file, containing several studentsÊ personal records.
Figure 4.10: RAID can make disk volumes more reliable and performs faster
(i) It will save time while sending files through the network;
Data files that have been compressed need to be decompressed before they can be
used. This technique is called „data decompression‰. Normally data that has been
compressed has a special suffix such as .zip, .tgz, .Z, .gz, .lha, .arc, .zoo, and .rar.
Compression and decompression techniques are called „codec‰. Sometimes, this
process is also called „zip‰ and „unzip‰.
The two main techniques of data compression are shown in Table 4.5.
Technique Details
Lossless Data compression is done by preserving all input data. In other words,
Technique all input data will be used in the compression process. This enables
data that have been decompressed to be the same as the input data.
SELF-CHECK 4.2
Secondary storage is a storage device that has been designed to store data and
instructions in a permanent form.
Secondary storage has five advantages which are size, reliability, comfort,
economic and lifetime.
There are two types of magnetic storage, namely magnetic tape and hard disk.
Ć The hard disk uses a thick and strong metallic plate. The hard disk can store
and access data faster and has a higher capacity.
Ć An optical storage device provides an alternative for the need to store a lot of
data. This device uses the principle of light rather than the magnetic principle
of storing data.
Ć Three ways to upgrade the performance of hard disks are racking the disk,
redundant arrays of independent disks (RAID) and compressing/
decompressing the files.
Bit Lossless
Compact disc-read only memory Lossy
(CD-ROM)
Magnetic storage
Compact disc-recordable (CD-R)
Optical storage
Compact disc-rewriteable (CD-RW)
Racking the disk
Compressing/decompressing
Record
Digital versatile disc (DVD)
Redundant arrays of independent
Field disks (RAID)
File Secondary storage
Hard disk Write once, read many (WORM)
INTRODUCTION
In the earlier topics, you have been told that a computer system is made up of
hardware and software. Hardware is the physical manifestation of the computer
while software consists of the programs that command the hardware. Computer
software can be divided into system software and application software. Both
software can be divided further into several categories as illustrated in Figure 5.1.
Each of the categories will be explained in greater detail in later parts of this topic.
5.1 SOFTWARE
For most people, when they think about computers, they normally think about the
hardware such as keyboard, monitor, processor and others. They do not realise the
presence and importance of the software. Computer software is actually a set of
planned instructions and step-by-step action that is required to convert data into
information and making the computer useful.
Figure 5.2 illustrates the relationship between the computer hardware, OS and
application software.
Utility Program Perform special tasks that are related to the management of
computer resources and files. It includes programs that help
users to identify problems on the hardware, searching for lost
files and making copies of data. In other words, a utility
program functions as a virus scanner, hard disk formatter,
compression software and copy-making software.
Device Driver The program that is specially designed to allow input and
output devices to communicate with other computer systems.
SELF-CHECK 5.1
The OS also enables a computer to perform more than one task simultaneously.
It enables the computer to identify the processor (central processing unit), main
memory (RAM), keyboard, video displays, disc drive and others. The OS also
provides facilities for users to communicate with the computer and acts as enabler
in running the application software.
The OS is normally stored in the hard disk. When a computer is switched on,
it will first perform the „power-on self-test‰ or POST procedure. Then, the basic
input-output system (BIOS) program inside the read-only memory (better known
as ROM) will search for the OS to boot up the system. The BIOS will search for the
OS on the master boot record (MBR) sector in the hard disk drive. If there is no OS
on the hard disk, the BIOS will search for it on alternate boot devices connected to
the computer such as a bootable universal serial bus flash drive. Not so long ago,
perhaps even up to recent times, PCs come installed with a floppy disc drive,
which is the default location where the BIOS will search for the MBR.
The MBR sector contains information on the OS of the computer. After reading
data from MBR and finding the supervisor program, the BIOS will load the
supervisor program into the RAM. Then, the basic input-output system will pass
on the computer management job to the supervisor program. Now, the computer
is under the control of the OS and can accept commands from users.
Part of the OS will remain in the RAM for as long as the computer is on. This
portion will always be in the main memory and is said to be resident (permanent)
and is made up of the supervisor program. The supervisor program will control
the overall OS and will load other OS programs from the hard disk into the RAM
as and when they are required. The OS programs that are located in the hard disk
is non-resident.
The OS forms the core that enables the computer to function. It works behind the
scene and becomes the intermediary for requests from users and programs.
It manages and drives computer hardware, and reads and writes data from and
onto the disc drive. When a user works on an application program, the supervisor
program will load the software into the main memory before the program is
executed.
When a user uses the computer, the main memory has the supervisor program,
the application software and the data or information being processed. Thus,
a larger RAM size in a the computer will enable it to function faster and in a
comfortable manner. If a computer does not contain enough RAM to run the
software, then the computer will run slowly or it may „hang‰, which is a situation
characterised by the computer being non-responsive to any kind of user prompt
besides turning it off.
5.4 FUNCTIONS OF OS
In general, the functions of an OS are as follows:
This command-line directs the computer to copy a file from the hard disk (C:)
to the floppy disc (A:). You will need to use a clear command when using the
command-line. This command-line also shows that you need to inform the
computer where to find MYFILE and where to copy YOURFILE to. If you
forget important information or use a wrong format, an error message will
be displayed on the screen.
In general, the command-line interface is more suitable for skilled users who
have been using computers for a long time and can remember the required
commands. The UNIX and Linux OSes also use the command-line. This
interface is also called the character user interface. Normally, the OS based
on the character user interface has one other layer that acts as a translator of
the commands to the supervisor program. This layer is called shell. Examples
of shell for Linux is C shell (csh) and born again shell (bash).
Among the components inside the GUI are icons, dialogue box and menu.
Examples of software that uses GUIs are Windows, Macintosh and BeOS.
GUI users interact with the OS and other software packages by using
pointing devices like the mouse and keyboard to enter instructions.
Users do not have to type every line of command; users only need to select
from the screen displays. Users use the mouse to manipulate icons, dialogue
box and menu. In GUI, an icon is a graphic image that represents a processing
activity. For example, a user may select „Recycle Bin‰ icon to delete a file
from storage.
The GUI was first introduced in 1983 in Macintosh computers. The GUI
simplifies a lot of procedures for users. Users do not have to memorise and
enter difficult instructions (see Figure 5.5).
A GUI designed for touch input is sometimes called the touch user interface.
Some OSes for desktop and laptop as well as mobile devices such as tablet
and smartphones have a touch user interface.
The OS is responsible for ensuring that the three processes execute well and
do not cause the computer to hang. This ability in using the three programs
simultaneously is known as „multitasking‰. An important characteristic of
the OS in managing multitasking is robustness. This means that if one
program fails, it does not cause the computer or other processes to hang.
OSes that have the robust characteristic are UNIX, Linux and BeOS.
(c) Reduces the time required for executing the userÊs instructions;
(g) Examines all system activities and gives warnings to users on all matters.
SELF-CHECK 5.2
5.5 FEATURES OF OS
Every OS has its own features. Even the ability of every system is different. Among
the main features of an OS are multitasking, multi-user, multi-processing, batch
processing and virtual memory as shown in Figure 5.6.
5.5.1 Multitasking
If an OS allows only one task to be performed at one time, such a system is called
single tasking. Multitasking enables a user to perform a new task without having
to exit from the task currently being performed and can even use the result of the
second task inside the first task. For example, a user can produce a chart in a
spreadsheet software while using a word processing software and later, insert the
chart into the document being typed.
Users normally do not see the tangible differences between these two types
of multi-tasking. Tangible differences may be seen in real-time applications.
Pre-emptive multitasking is more robust and stable than cooperative multitasking.
5.5.2 Multi-user
5.5.3 Multi-processing
The use of more than one processor is suitable for scientific computers because
computers of this type perform a lot of calculations and processing. As such,
scientific computers require OSes that can manage more than one processor.
Examples of multi-processor type of OS are UNIX (Solaris), Linux, BeOS and
Windows 8. Table 5.2 illustrates four OSes and their maximum number of
processors.
BeOS 8
Solaris 64
Linux 16
IRIX 128
During the early computer era, data processing was done using the batch mode.
This means that data and programs are prepared on batch mode for processing.
Users cannot enter data during the running of the program. Data and programs
are collected and prepared first, then later, entered one by one for processing by
the computer. Batch processing is still being used now in the mainframe system
environment. Nowadays, the interactive processing type of OS is very popular,
whereby users can enter the data while the programs is being executed.
In this method, the OS loads a portion of the application software into the main
memory and another portion into the virtual memory. When this happens, the
running of computers will slow down because access to secondary storage is
slower than the main memory.
For example, users often find computers running slowly when two or three
software programs run simultaneously. This is because the OS needs to transfer
data from the main memory (RAM) to the secondary storage (hard disk) and vice
versa. This process of data transfer is slow and often involves some noise
signifying that the computer is accessing the hard disk.
Copyright © Open University Malaysia (OUM)
94 TOPIC 5 COMPUTER SOFTWARE
The process of transferring data from the virtual memory to the main memory
and from the main memory to the virtual memory is called „swap‰.
Swap space, also referred to as page, on the hard disk is the storage size that is
used as the virtual memory (see illustration in Figure 5.7).
In general, OSes can be divided into four types (see Table 5.3).
We will now take a look into the details of each category of OS in the following
subtopics.
Disk Operating It was the dominant OS during the 1980s and early 1990s.
System (DOS) Initially, disk OS only supported command-line interface and
later, newer versions of disk operating system allows menu-
driven interface. There are two forms of disk OS, namely
PC-DOS created for IBM personal computers and MS-DOS
created for IBM-compatible personal computers.
Table 5.5 describes nine popular OSes that are used for mobile and embedded
computer systems.
Operating
Description
System
Windows It was designed by Microsoft for consumer and industrial devices such
Embedded as digital photo frame, cash register, automated teller machine and
global positioning system devices.
iOS It is the OS that was developed by Apple to run on its proprietary mobile
devices, namely iPod, iPhone and iPad. iOS is derived from OS X.
Blackberry It was designed specifically for Blackberry devices. Like other OSes,
OS it also supports multitasking, e-mail communication, web browsing,
music management, video recording and calendar tools.
Palm OS It was originally designed for Palm devices. In 2009, Palm web OS was
and Palm released, which was based on Linux as well. This version was targeted
Web OS at new Palm devices and incorporated contact and calendar
synchronisation as well as web browsing.
Symbian It was widely used in Nokia phones and offered various functionalities,
namely multithreading and multitasking, web browsing, e-mail,
handwriting recognition, synchronisation and a range of other mobile
applications. Developer can customise user interfaces to meet the needs
of end-users via its flexible user interface framework.
Embedded It is an alternative OS that is used for other types of mobile devices such
Linux as global positioning system and portable digital media players. It is
available in various versions from different companies.
If the system software is considered as „behind the scene‰ programs, the application
software is considered as programs for performing beneficial work such as typing,
calculations and drawings. Basic application software is also called „general
purpose‰ application program. Its objective is to increase the productivity of users
by helping them to perform normal tasks. They can be referred to as productivity
packages. Examples include word processing, spreadsheet, database management,
batch software, groupware software, communications and desktop accessories.
Application software can exist in a variety of forms, depending on the needs and
requirements of individuals, groups or organisations. Table 5.6 describes the forms
of seven application software:
Application
Description
Software
Packaged Software is developed and sold for profit. As it is mass produced and
software or copyrighted, this means it caters for a wide variety of users. Examples
commercial include Microsoft Office, Adobe Photoshop and Norton Antivirus.
software
Custom Software that performs specific functions for any business or industry.
software This software is required when there is no available packaged software
that can meet such specific requirements. As a result, the company
needs to find or hire developers to develop a tailor-made software to
fulfil its business needs. Some examples are e-procurement system and
e-recruitment system.
Public IT is a free software and can be used, copied, modified and distributed
domain to others without any restrictions. The public owns it, therefore, the
software software is not copyrighted. Pine and Lynx are examples of public
domain software.
Web Software is hosted on a server to allow users to access and interact from
application any computer via the Internet connection.
Open source Software that has no copyright restrictions. Thus, it can be used,
software modified and redistributed freely. It can also be downloaded from the
Internet without any cost. Examples are Blender and Moodle.
SELF-CHECK 5.3
A word processing software enables you to create, edit, format, store and print
texts and graphics in one document.
Since you can save memos or documents that you have typed into the disc, you
can access them at other times to modify them, reprint or do whatever you want
with them. Parts of existing documents that do not change do not need to be
re-typed and the entire document that has been checked can be reprinted as new.
An assignment that is often done by computer users is to prepare information in
the form of documents. Word processing software is the software that is mostly
used by users. Five important activities of word processing are as illustrated in
Figure 5.9.
Activities that can be done during word processing are editing of document,
search and replace, merging of e-mails, document footing and heading, footnotes,
mathematical functions, index generator, content generator as well as document
import and export. You can search any word quickly in a document by using the
search command in a word processor. A replace command can replace one word
with another. Besides that, the correct spelling of a word can be verified by the
spell-checker program. The grammar-checker will identify the use of inaccurate
sentences, incorrect grammar or sentences that are too long. The earliest word
processing software was Wordstar. Examples of currently and widely used word
processing software are WordPerfect, Ami Pro and Microsoft Word.
With the addition of more features into word processing packages, word
processing has crossed the boundary into desktop publishing. Desktop publishing
packages are normally better than word processing packages in fulfilling the needs
of high level publishing, specifically on the choice of characters and reproduction
of colours. Many magazines and newspapers today depend on desktop publishing
software. Businesses use them to produce newspapers that look professional,
reports and leaflets that can improve communications, and to provide better
pictures to the outside world.
When a document is being edited by a user, the word processing software will
load a copy of the document from the secondary storage (hard disk) into main
memory (RAM). All editing activities will be done on this copy in the main
memory. This is because data access from the main memory is faster than data
access from the secondary memory. When the user completes the editing, he can
save the document again into the secondary storage to replace the older copy.
This can cause problems in a mixed environment where OSes like UNIX, OS/2,
BeOS, Windows and Linux exist in one place. A number of methods can be used
to produce a form of document that is portable. Among the methods are producing
document in PDF, postscript (ps) format or in markup languages like Standardised
Markup Language (SGML), Extensible Markup Language (XML) or TeX.
Users can use this format to produce portable documents between different OSes.
All forms of documents like those from spreadsheet, power point presentation,
word processing and graphics can be converted into PDF format by using Adobe
Distiller software. The PDF documents produced have the hypertext capability,
can be printed and displayed on the computer but they cannot be edited. The PDF
format was introduced by Adobe Inc. Most articles that are freely available on the
Internet are in postscript or PDF format.
Users can also produce portable documents in a markup language like Hypertext
Markup Language (HTML), Standardised Markup Language and Extensible
Markup Language. The main objective of producing documents in a markup
language is to separate the information from the document format. This concept is
the same concept as separating a program from the data in the database. This way,
the document format can be modified easily without involving the information
that is present in the document.
Users can also use TeX software to produce portable documents from documents
in the form of TeX markup language. A document based on TeX can be processed
to produce another document in the form of PDF, postscript and device
independent (DVI). TeX is mostly used in producing mathematical and scientific
documents.
SELF-CHECK 5.4
What about spreadsheet software for users at home? The ability to enter a set of
numbers in meaningful ways, for example, a set of deposit and interest rates for
buying a house, and offer financial ideas to users who cannot do it themselves
(manually). Home users can use spreadsheet to perform various tasks from budget
preparation to considering whether to accept a new job.
Among the traditional functions that are supported by spreadsheet software are:
The spreadsheet is divided into rows and columns. Each row is numbered while
each column is given name. The intersection between each row and column is
called a „cell‰. Each cell contains reference address and fixed address. In each cell,
a user can type in a number, text or mathematical formula. Solution to a problem
using spreadsheet can be divided into four steps:
Other features that are available in electronic spreadsheet are macro (short
program which can be used to repeat specific steps), mathematical functions, plot
3D, active function and integration with other applications. Figure 5.11 illustrate
the Excel electronic spreadsheet.
SELF-CHECK 5.5
When data is available as a report, that is, a form that is useful to users, the data
has become information.
Concert organisers, for example, can store and change data such as the date of the
next concert, seat number, ticket cost and sales. When this has been done, the
organiser can use the software to access information such as the number of tickets
sold in every price range or percentage of tickets sold on the day before the concert.
Database software is useful for someone who needs to reach out to a large number
of people. For example, a volunteer who is looking for blood donors for the
National Blood Bank can store a file of all donors in his area so that he can access
their names and telephone numbers to enquire on the type of blood donated,
postcode or the last date of his blood donation.
The data can be in the form of text, video, graphics, audio and others. Databases
are stored in secondary storage. To fulfil the needs of organisations, data needs to
be collected, stored and accessed effectively. Databases can help with these three
processes. Databases also enable data to be processed and shared by various
parties. Data can also be edited, added and erased easily. Users can perform
queries over the database to solve problems. A number of important terms in
database include entities, attributes, field, record and relationship.
(a) Entities are things, people, places or events whereby the data and
information stored is about them. Examples of entities are universities,
students, employees, cars and doctors.
(b) Attributes or fields are data or information that explains the characteristics
or features of a certain entity. For a student entity, examples of attributes
include name, address, date of birth, identity card number, matrix number
and gender.
(c) Record is a collection of related attributes for a certain entity. It can also
explain a certain event, which is a number of related fields about certain
event grouped together logically to form record. An example of a record
which groups together a number of attributes for a student entity is
presented as follows:
(d) Files are various collections of records containing the same attributes.
An example is a file of First Year Student containing all records of Year 1
students in the Faculty of Information Technology and Multimedia
Communications.
(e) Database is a collection of several files that are related to one another.
The main source of data for a computer-based information system is the
database. Another objective of the database is to reduce data duplication.
For example, a student database may consist of a combination of student
personal file, file of courses offered at Open University Malaysia,
co-curriculum activity file and student finance file (see Figure 5.12).
Figure 5.13 illustrates a model for structuring data in a database, which in
this example is the hierarchical model.
Figure 5.14 shows the example of database, which consist of two tables; Customer
Table and a Book Rep table. The Customer table has 15 records and 10 fields, while
Book Rep table has 4 records and 10 fields.
With the traditional file system, we may face problem in getting a list of the
studentsÊ names based on department or list of courses taken by a student because
the information is present in three different files.
(a) Data Redundancy ă Same data attributes are repeatedly present in different
files;
(b) Data Integrity Problem ă Data needs to be updated in all files to ensure that
it is consistent throughout; and
(c) Program and Data Independence Problem ă Program and data are closely
related as data is created to feed into a program.
(d) Data integrity can be retained in terms of security and reliability; and
SELF-CHECK 5.6
The use of graphics software is very satisfactory if the work is done by a graphic
artist who has artistic ability as well as the ability to use sophisticated graphics
software to translate the ideas. An artist uses the software as a tool to produce
computer-based arts. Graphics software is a software that converts numerical data
into a graphic display form such as the bar chart and pie chart. It enables users to
produce various types of graphical forms. Five types of graphics software are
shown in Figure 5.16.
There are four categories of system software, namely OS, utility program,
device driver and language translator.
Windows, Mac OS, UNIX and Linux are commonly used operating systems.
INTRODUCTION
In this topic, we shall know more about programming language. Computer
programs are developed by using programming languages. A program is a set of
instructions followed by the computer, so that data can be processed. The process
of producing a program is called programming. Programming is part of the larger
software development process which consists of problem specification, program
design, programming, program testing and program maintenance.
There are many programming languages such as Python, Java, Perl, Eiffel, C, C++,
C# and COBOL. These different programming languages were invented at
different points in time, as shown in Table 6.1.
Figure 6.1: Relationship model between users, programming language and computer
Benefit Elaboration
Influences usersÊ thinking For example, an object-oriented language will cause the
in solving problems user to think of a solution based on the object concept
while a logic-based language will trigger the user to
think of the solution based on logic.
Tools for solving problems Most problems are more efficiently solved by experts in
using the computer their respective fields. Therefore, experts in certain fields
can learn appropriate programming languages in order
to solve their problems.
Programming
Application Year
Language
Computer language generation is said to have begun from low level to high level.
A programming language is said to be a low level of one when it resembles the
language that is actually used by the computer. A high-level programming
language, on the other hand, closely resembles the language used by human
beings such as the Malay Language. Table 6.4 shows five programming language
generations and how the programming language is represented in each of the
generations.
It uses symbols and words to represent instructions and data, and does not
use binary digits like the machine language. An example of a program in the
assembly language is given as follows:
V86_signal_return:
Call SYMBOL_NAME (save_v86_state)
movl
xorl
call SYMBOL_NAME (do_signal)
jmp restore_all
ALIGN
Among the reasons for the invention of the high-level languages are as
follows:
(ii) To enable a program to run on more than one machine, as it only needs
to be recompiled before being run on a different machine; and
(ii) Report generators are languages used to generate queries and reports
from databases; and
(iii) Application generators perform more than query languages and report
generators. They are tools that generate software according to usersÊ
needs with regard to data required to be processed and reported.
SELF-CHECK 6.1
Each characteristic has its own strengths and weaknesses. Besides these six
characteristics, there are also other characteristics of programming languages such
as:
But for now, we shall focus on the six core characteristics mentioned earlier. The
following subtopics will discuss the strengths and weaknesses of each
characteristic.
Object-oriented language was invented to develop systems that are large and
complex.
The need for an object-oriented language arose when existing languages could no
longer fulfil the needs of systems that are becoming more complex. The advantages
of object-orientation are ease of system management, ability to change system
properly and reusability of components in a new system. The structure of an
object-oriented language makes a program easier to design and understand.
Object-oriented languages handle images, audio, video and sound much easier
than procedural languages (third generation). The basic idea is to focus on objects
inside a system, not on functions that occur inside the system.
Concept Description
Class Blueprint that defines the variables (or attributes) and the methods
common to all objects of a certain kind.
Encapsulation Term given to the process of hiding all details of an object that do
not contribute to its essential characteristics. Encapsulation hides
the implementation details of the object and the only thing that
remains externally visible is the interface of the object (i.e. set of all
messages that the object can respond to).
SELF-CHECK 6.2
In writing logic-based program, users make use of Horn Logic - statement that
uses IF-THEN. All facts and rules will be stated in Horn Logic form. Subsequently,
the user will state a problem to be solved. The system will try to solve the problem
based on the facts and rules that have been given. For example, we can produce
the following information based on Horn Logic:
actor {ali}
rich {ali}
Finally, we can ask the system the following question which means is ali happy?:
? – happy (ali)
The system will answer yes or no based on the information given earlier. An
example of the logic language is Prolog.
Examples of function languages are Lisp, FP, Scheme, Common Lisp, Hope,
Standard ML, Miranda, Haskell, Hugs and Lucid.
6.4.5 Script
Scripting languages are translated languages that are normally produced for a
certain objective. They can be used for developing prototypes rapidly. This type of
language is portable between various types of computer platforms. Systems that
have been developed in scripting languages run slower. Examples of scripting
languages are JavaScript, Python and PHP.
HTML, JavaScript and PHP are the Internet-based scripting languages that are
used to develop applications for the Internet.
(a) C
It is a small language with attractive features. The C language is mostly used
in the development of system software and application software.
(b) C++
C++ adds on object features to the C language based on ideas from the Simula
language. Initially, it was known as C with Classes language. This language
is mostly used in large and complex systems development such as telephone
switching, graphic user interface system and road traffic control.
(c) Java
Java is an object-based language which was invented in 1995 by James
Gosling. It has the features of C++ and Simula.
Java converts Java programs into byte code, not to object code, where the
byte code can run in any operating system by using Java virtual machine
without any changes to the program. This technique enables any Java
program to be portable among many computer systems. Initially, Java was
mostly used in producing graphics and animations on websites. It is known
as a widely used programming language in the world. Java has been popular
with the slogan „Write once, run everywhere.‰
(d) Perl
Perl is a scripting language that can be used in the processing of text,
common gateway interface, database communication and others. PERL has
portability feature.
(e) Python
Among the applications that have been built using Python are web
applications, address book, computer network management and astronomy
software. Python is an alternative to Perl.
main ( )
{
printf (“hello world \ n”);
}
This source code needs to be compiled or converted into object code before it can
run in any computer. The compilation process is done by the compiler. If this
program is compiled in Linux, it can only run in Linux; if it is compiled in
Windows, it can only run in Windows.
This problem is said to be non-portable, that is, any software that is compiled in
operating system type A cannot run in operating system type B. The problem of
non-portability arises because the object code produced from the compilation
process is different for different operating systems. The object code is specific for
only one type of operating system.
While the source code is compiled, it will be linked to a library, that is, a set of
existing instructions in an operating system. In Windows operating system, the
library is given extended dynamic loading library (.dll). Examples of libraries in
Windows operating system are vb200.dll and vb3000.dll. The software (or object
code) that is produced requires this library to run. Since the library is only present
in the specific operating system (for example, Windows), the object code that is
produced can only run in Windows system.
For example, two types of architecture for the processor are RISC and CISC.
Examples of CISC processors are Intel, AMD and Cyrix while examples of RISC
processors are Alpha, Motorola 6800 and PowerPC. Any program that is compiled
for an Intel processor cannot run on an Alpha processor because both contain
different object codes.
To convert assembly language programs into object code, we need to use the
assembler. The object code produced is not portable. We can use assembly
language to write the program. The assembly language is mostly used in the
development of operating systems and it is used specifically in certain operating
systems.
The higher the language is, the nearer it is to the human language form.
Object-oriented language was invented to develop systems that are large and
complex.
Scripting languages are translated languages that are normally produced for a
certain objective.
Assembler Interpreter
Compiler Logic-based language
Encapsulation Machine language
Function-based language Object-oriented language
Imperative language Visual language
Inheritance
7
LEARNING OUTCOMES
By the end of this topic, you should be able to:
1. Define the term „Internet‰;
2. Discuss the history, development and evolution of the Internet;
3. Explain Internet addressing, applications of the Internet and ways
of searching for information via the Internet; and
4. Discuss the current and future trends of the Internet.
INTRODUCTION
In this topic, we shall focus on the Internet. You may be familiar with browsing the
Internet, however, do you know what the real capability of the Internet is? Do you
know the definition, history, development and evolution of the Internet? In this
topic, we shall learn about these things as well as how the Internet addresses the
computer that is connected to it. Besides that, you will also learn about the effective
process of searching for information over the Internet. Finally, we will explore the
current and future trends of the Internet. Let us start!
The Internet is the short form of „interconnected networking‰ that refers to the
largest type of global network. Imagine that all computer networks in the world
are linked to form one big network that spans the globe. The network formed is
called the Internet, in other words, a network formed by an interconnection of
computer networks in the entire world. With the Internet, a computer in Kuala
Lumpur can access a computer in China, India, US, Japan, Saudi Arabia and
anywhere else in the world.
The Internet is a grouping of computer networks that is very large and covers
the whole world. It operates using Transmission Control Protocol/Internet
Protocol (TCP/IP).
There were various proprietary networks linking several countries before the
Internet era (for example, the Malaysia Airlines network linking the companyÊs
offices worldwide) but these were not the Internet. The Internet has adopted the
TCP/IP in order to enable various types of computers to work together. The
Internet has been successful in creating a global village whereby a community can
easily communicate with another community without physical and time
boundaries.
The term „intranet‰ refers to a portion of the Internet that is located within
one organisation. „Intra‰ means inside or within.
For example, a portion of the Internet that is located in all the faculties in Open
University Malaysia (OUM) constitutes an intranet. The portion must be guarded
by a firewall (a type of security software) to ensure that outsiders could not simply
come into OUM network to access its confidential files. Therefore, the intranet is
really a subset of the Internet ă one at the organisational level, while the other, at
the global level.
SELF-CHECK 7.1
(a) Internet;
(c) Extranet.
In the 1970s, initiatives were taken to create a standard data sharing among various
types of computer networks. At that time, every computer company introduced
network systems that were different from one another. This initiative enabled all
computers of different brands in various types of networks to share data or to
communicate among themselves easily. In 1974, a data sharing technique called
Transmission Control Protocol (TCP) was introduced. Later, in 1978, this technique
was expanded to what was called TCP/IP.
In the 1980s and early 1990s, Internet usage was still confined to universities,
research centres and government organisations. Its main applications were e-mail,
file transfer, remote login and Usenet. In 1989, a breakthrough occurred in the
European Laboratory for Particle Physics (European Organization for Nuclear
Research [CERN]), a large research centre in Switzerland that was destined to
change the Internet forever. Tim Berners-Lee, a researcher at CERN, proposed an
information sharing technique based on hypertext for the Internet environment.
The multimedia system contains graphics, text, audio and video which can be
indexed and accessed easily by users in the entire world. This system has been
given various names like the World Wide Web, also known as the Web, W3 or
WWW. The Internet, in the shape that is most familiar to many of us, was born!
The Web can be defined as a network of various types of information like graphics,
audio, video and its text is based on hypertext. The original term for hypertext was
introduced by Ted Nelson in 1967. Originally, hypertext only involved document
texts but now, it involves documents based on graphics, audio, video and others.
Ted Nelson worked to develop a hypertext system that was named Xanadu.
The basic idea of the hypertext was once presented by Vannevar Bush in an article
As We May Think in 1947. According to Nelson, hypertext means a collection of
documents or nodes that have links or references among them. Users can read a
document and access other documents via interactive links. The basic concepts in
hypertext are link, accessibility and interactivity. With hypertext, the information
provided is linked among themselves like a cobweb.
In 1992, there were 70 sites that offered HTTP and Web services on the entire
Internet. HTTP was still not widely used because there was no Internet browser
that was good and attractive for users. Most Internet browsers at that time were
based on text.
In 1993, a browser based on graphics was developed by Marc Andreessen and Eric
Bina at the National Centre for Supercomputing Application (NCSA) in the US.
This browser, called Mosaic, was given out for free to users. It contains interface
features that are attractive and user-friendly. A combination of ideas from Berners-
LeeÊs hypertext and the Mosaic browser was finally successful in popularising
HTTP on the Internet.
Mosaic software was considered the main invention ă a great application that has
successfully popularised the Internet to general users instantly. At the end of 1993,
within just two years of the HTTP introduction, there were 700 websites.
The Internet began to attract the media and the general public, and a lot of news
concerning the Internet was found in magazines, newspapers and television (TV).
On the commercial aspect, the Internet began attracting the attention of giant
commercial organisations. Many people think that the Internet is the key to their
future business success. Many Internet-based companies have been formed in
large numbers. Marc Andreessen and a few friends set up an Internet technology
company and produced an Internet browser called Netscape. This browser is given
free to all users. The giant Microsoft Corporation was quite late in entering the
Internet browser arena. This company produced the Internet Explorer browser as
a means of dominating the Internet. Competition between these two Internet
browser software brands in attracting the Internet users market was very
interesting. Many people thought that whoever dominates the browser software
will dominate the Internet. The textbox below presents an interesting story about
the Netscape-Microsoft Internet browser software war.
From 1996 to 1999, there was a war on Internet browser software ă the software
that was used to surf the Internet between software giant Microsoft and
Netscape. Why? Many people thought that whoever managed to control the
market in the Internet browser software would ultimately control the Internet
because the Internet browser is the „vehicle‰ for accessing the Internet.
Microsoft Corporation entered the Internet browser market quite late. After
realising the importance of the Internet, Microsoft began to set out a strategy to
control the Internet. Remember that Microsoft was controlling 90 per cent of the
PC operating system market (nine out of ten PCs sold were using Windows
95/98/ME/XP system). As a first step, Microsoft produced the Internet
Explorer and it was given out for free to customers. As a result, in 1998, almost
90 per cent of the browser market was controlled by Internet Explorer.
SELF-CHECK 7.2
ACTIVITY 7.1
1. Surf the web for articles on the Internet between 1997 and 1999.
In the frenzy to popularise the Internet, some reports from the
media could have been sensationalised. Based on current facts,
which statements by the pundits then have now become true and
which statements have turned out to be wrong?
2. In your opinion, what will the Internet be like in the next seven
years to come?
Although the popularity of the Internet has increased and many dotcom
companies have emerged rapidly, the year 2000 was a difficult year for the
Internet. Weaknesses on the Internet were felt by users. Among problems that
arose were the difficulty in searching for relevant information, network
congestion, unfiltered news, fake news, spread of viruses through e-mails,
inadequate security for financial transactions over the Internet, invasion of
privacy, data theft and widespread online pornographic materials. While the
Internet saw the booming of many tech start-ups, there were also many dotcom
companies that suffered losses and had to close down.
The Internet will continue to develop. Table 7.1 shows the history of the Internet
(five phases) and how it has developed throughout the course of history.
1st Phase Before 1969 Birth of the ARPANET for the purposes of research and
computer resource sharing in the US only. Most users
were scientists, students and academicians. The Internet
was used as a tool for sharing computer resources.
2nd Phase 1970ă1990 Communication like e-mail, FTP and Usenet were used
widely. Usage was still confined to universities and
government agencies. Internet usage concentrated in the
US, Europe and Japan. The Internet was used as a tool
for communication.
4th Phase 1998ă2000 Internet explosion era. The number of users expanded
rapidly. The Internet was used for business transactions.
It became the subject of conversations and many articles
regarding the Internet were written in various
magazines.
5th Phase 2001ăonwards Internet reality era. Many dotcom companies closed
down. The realities of the InternetÊs advantages and
disadvantages were felt. Initiatives to improve the
Internet continued.
ACTIVITY 7.2
Year Event
1969 Four computers were connected on the ARPANET network in the US. The
computers were from University of California, Los Angeles, University of
California, Santa Barbara, Stanford Research Institute and University of Utah.
1971 The number of computers in the ARPANET went up to 21. The technique of e-
mail communication was introduced.
1973 The University College of London was connected to ARPANET, the first
connection of ARPANET outside the US.
1982 ARPANET used TCP/IP completely. Definitions of Internet and intranet were
introduced. „Internet‰ refers to the (worldwide) grouping of computer
networks that uses TCP/IP while „intranet‰ refers to a computer network that
uses Internet Protocol.
1988 The Internet was massively attacked by „Internet worms‰, which was a
computer software that spread on its own. This incident demonstrated the low
level of safety on the Internet. Computer Emergency Response Team (CERT)
was set up to monitor the security on the Internet.
1989 The number of computers exceeded 100,000 units. A book entitled Cuckoo Nest
was published. This book explained how a group of invaders from Germany
successfully entered some of the US military computers, without permission,
via the Internet.
1990 ARPANET was terminated and replaced by the National Science Foundation
Network.
1991 HTTP was produced by Tim Berners-Lee at CERN. This became the basis for
the development of the Web on the Internet.
1992 The number of computers on the Internet exceeded 1 million units. Malaysia
gained access to the Internet. The Internet network in Malaysia was managed
by the Malaysian Institute of Microelectronic Systems (MIMOS). The network
was known as JARING and is participated by several local universities
including OUM.
1996 Browser war between Netscape Communicator and Internet Explorer. At that
time, almost 80 per cent of users were using Netscape Communicator.
1997 The backbone function of the National Science Foundation Network for the
provision of the Internet passage was taken over by a commercial company.
Java, a computer programming language which was based on objects was
launched by Sun Microsystem in 23 May 1997. This language received
extraordinary responses. Java enables websites to have various attractive
animations. Search engines were also introduced. There were already 17,618
discussion forums based on e-mails.
1998 The Internet was estimated to have millions of websites. Electronic commerce
(e-commerce) and portal technology began to attract attention.
1999 The number of computers on the Internet was estimated at 76 million units. The
number of web servers was estimated at seven million units.
2003 Wi-Fi (wireless LAN) technology was expanding rapidly. It started to become
a main source of connection to the Internet for many compatible devices.
2008 The Internet became more accessible to many people via portable and wireless
devices such as laptops and smartphones as compared to fixed line services on
desktop computers. The shift to mobile access of the Web has accelerated with
the rise of smartphones and later with the rise of tablet computers. Social media
platforms started to rise in popularity.
2018 It is estimated that well over half of the worldÊs population have online access
or are using the Internet. Most of the growth of Internet users has been
attributed to affordable smartphones and various data plans.
In the Internet history and timeline, we have found rapid development of the
Internet just within a period of 50 years. The Internet began as a research network.
Then, it became a communication and data sharing network (later it evolved into
the Internet becoming a platform for social media and social network) and a
network for e-commerce. The Internet has removed physical boundaries that
divided the world and created a global village that transcends time and space.
ACTIVITY 7.3
The Internet has greatly affected human life today, whether in Malaysia
or the entire world, and it is expected to continue to do so in the
foreseeable future. Imagine if the Internet did not exist today. What
would society be like? What are the activities that users cannot do
without the Internet? Discuss with your coursemates in the myINSPIRE
online forum.
There are two types of computers on the Internet ă host computers and server
computers. A host computer is a unique computer on the Internet which has an IP
address. IP address is made up of four sequential numbers which are organised in
the format of „a.b.c.d‰. Examples of IP addresses are 202.187.48.7, 202.187.46.197
and 192.228.128.18. Each sequence of a, b, c, and d consists of numbers between
0 and 255. For example, IP address for a host at OUM consists of numbers between
211.25.48.X and 211.25.54.Y. A good analogy for an IP address is the identity card
number. It is unique to a certain host. There are no two hosts on the Internet that
has the same IP address. A computer needs to have an IP address to access the
Internet.
As a simple rule, if the computer is a PC and has an IP address, then the computer
is a host computer. If a user accesses the Internet using services provided by the
Internet service provider like unifi.com.my, time.com.my or maxis.com.my via a
home computer, the user does not need an IP address. The userÊs computer will be
given an IP address dynamically by the Internet Service Provider (ISP).
Computers can also function as servers, that is, computers that can be accessed by
users on the Internet. A server is a high-powered computer that is used as a
platform for websites, e-mails, electronic discussions, archives, file server and
others. Normally, a server would use UNIX, Linux, Solaris or Windows Server
2019 as its OS.
FQDNs are used to assist Internet users because it is easier to remember a fully
qualified domain name (thestar.com.my) rather than an IP address (13.32.8.111).
Therefore, every server on the Internet has an IP number and name for
identification. A fully qualified domain name gives a lot of information regarding
a certain server. For example, the server name oumvle.oum.edu.my gives the
following meaning ă oumvle is the host computer, oum is the organisation name
and my is the country name. Therefore, in general, the name oumvle.oum.edu.my
refers to a server located at OUM.
The end part of the server name normally shows the location or type of
organisation in which the server resides which is called top-level domain (TLD)
that shows the suffix of the domain name. For examples:
Because the Internet originated from the US, the domain name for computers in
the US does not have a country name. For example, www.facebook.com.
We can see more examples with explanations of TLD an Internet address end part
in Figure 7.3.
Did you know that most server names are in the form of Uniform Resource Locator
(URL) and that has been the basis of HTTP? An example of a URL name is
https://www.oum.edu.my, whereby:
SELF-CHECK 7.3
The Internet also offers various forms of communication such as e-mail, online
discussion board, Usenet, e-mail based discussion and social media through the
Web. These communication techniques have successfully created a global village.
With e-mail, users can communicate with anyone, anywhere. E-mail is a type of
communication that is cheap and fast. An e-mail sent from the OUM takes only
seven seconds to reach the UK. By using e-mail, users can send attachments such
as Microsoft Word documents, software, zipped files, graphics or audio.
The Internet also offers discussions based on e-mails. Discussions normally focus
on a specific topic. Users need to have and e-mail accounts in order to participate
in the discussions. There are several locations that offer discussions based on
e-mail for free. One such example is https://groups.yahoo.com.
The Internet also offers various online discussion topics via Usenet. There are over
7,000 topics discussed in Usenet and users can choose from various topics that
interest them. In a Usenet discussion, anyone from any parts of the world can give
his opinion or idea freely. One of the ways to access is by accessing a Usenet server
such as http://dotsrc.org/usenet.
Internet has become the platform or host to various social media and social
networking sites such as Facebook, Twitter, LinkedIn, YouTube and many more.
All these sites have the features of Web 2.0, which is a term for sites that allow
users to connect, interact, contribute and collaborate with each other, rather than
being websites with static pages or just for retrieving information. Web 2.0
provides users with the opportunity to effectively present their ideas, lead online
discussions, share educational content and document files as well as collaborate
with each other in real time. Some of the Web 2.0 applications are Google Docs,
Prezi, Pinterest and many others.
On the Internet, you can also search and obtain various types of information for
reference and reading. A user can get the entire literary works of William
Shakespeare, translations of the Quran, sayings of Prophet Muhammad PBUH,
classical Malay literary works, recipes for cakes, lecture notes, US Central
Intelligence Agency reports on Malaysia and many more. Many foreign and local
universities have placed their lecture sources such as notes, sample examination
papers and online software onto the Internet to be accessed by and for the benefits
of the students. An example of a lecture website is http://www.vlib.org.
The Internet is also a large archive of computer software. It contains various types
of software such as graphics, word processing, databases and games. A type of
software that is getting wide attention on the Internet today is the open source
software. The open source software consists of high quality software and can be
obtained together with the program codes.
The Internet also offers various news sources which are up to date and fast via
newspaper and television websites.
(a) https://edition.cnn.com
(b) https://www.thestar.com.my
(c) https://www.bharian.com.my
Users can also buy various things via the Internet. For example, users can buy
reference books from companies in Germany via the Internet. Purchases via the
Internet normally require credit cards. It is estimated that total sales via the
Internet, also called e-commerce, could reach up to billions in the near future.
(a) https://www.amazon.com
(b) https://www.ebay.com
(c) https://www.lelong.com.my
The Internet also offers a variety of entertainment such as music, videos, movies,
blogs and games. On the Internet, you can also find various websites that have
been built by marketers for the purpose of promotion and advertising. Users can
visit the website of a museum, a university, a company or of an individual person
and view the various types of information being displayed. The websites contain
a variety of information in the form of text, audio, video, graphics, cinema,
software and so forth. In other words, there are numerous materials on hundreds
of websites that can be accessed through the Internet.
Based on the discussions, we can think of the Internet as a very large virtual
environment, without boundaries, without a clear map and without anyone in
control, and it covers the entire world. It can be said to contain a reservoir of
knowledge about the world. It also offers ways of communicating to human beings
effectively and speedily.
We can see the summary of things available on the Internet in Figure 7.4.
ACTIVITY 7.4
In your opinion:
(a) How has the Internet benefited individual users and the society at
large?
(b) What problems have you encounter with the Internet? What
processes can be improved on the Internet?
Searching for information involves the process of searching the place where the
required information is present. This is an important process. Many users spend a
lot of time exploring the Internet and searching for information but to no avail.
The user ends up obtaining information that is not relevant and/or out of date.
Two main ways of searching for information over the Internet are through search
engines and portals. Other minor approaches that can also be used are the Usenet,
FAQ, e-mail discussion forums and archive sites. Examples of components that are
used to search for information on the Internet can be seen in Figure 7.5.
Figure 7.5: Components that are used in searching for information on the Internet
The Internet security level has improved a lot. This can be seen on especially on
online banking sites such as cimbclicks.com and maybank2u.com. Even so, there
are still hackers who are able to access the host computer without permission.
If they managed to successfully invade the website, they will be able to steal data,
change sites, steal credit card numbers and perform other transactions.
ACTIVITY 7.5
Users are still questioning the level of data security over the Internet for
e-commerce transactions. There have been thousands of stories of stolen
credit card numbers by intruders from company servers. What is the
guarantee provided by companies that the credit card numbers used in
e-commerce transactions are safe?
Search engines are not intelligent but they are also not dumb either. They function
based on robot and index.
How does this robot work? A search engine will send many robots to wander
around the Internet. These robots will bring back data on the web servers visited.
Based on the data brought back by the robots, an index will be built. This index
basically contains key words and identifies in which servers the key words are
present. Every search engine has different techniques in building the index.
Therefore, two different search engines will give different answers for the same
key words. Since the size of the Internet is very large, not all Internet servers will
be accessed by the robots. When users make a request based on key words in a
search engine site, the search engine will refer to the index to obtain relevant
servers. The search engine will always perform the updating process over the
index.
7.6.2 Portals
The second best way to access information is to use portals. A portal is a server
that contains a directory of several servers on the Internet based on categories of
information available on the servers. Users can find information by accessing the
servers in related categories.
(a) http://www.igoogleportal.com
(b) https://www.yahoo.com
(c) https://www.wikipedia.org
Just remember that Usenet is an online discussion corner. There are various
discussion corners in Usenet. In one discussion corner, new users may be asking
very trivial questions in the eyes of experienced users. Often, whenever trivial
questions are asked in the discussion corner, experienced users would say ă
„RTFM or the FAQ‰. Do you know the meanings of these abbreviations?
The acronym RTFM means „read the fine manual‰. In other words, the new user
should have read the manual first before asking trivial questions or simply refer to
the FAQ, which is a document in the form of questions and answers. Questions in
the FAQ are those that are often asked in the Usenet discussion corners. More
details about Usenet and FAQ will be deliberated in the upcoming topics in this
module.
Besides FAQ and RTFM, users can also search for information on the archive
server, that is, a server that contains a lot of information on specific topics. The
address of the archive can normally be obtained from FAQ portals or documents.
Many hosts on the Internet serve as archives or centres of information gathering in
certain fields.
SELF-CHECK 7.4
(b) Usenet.
In summary, cyber laws in Malaysia may not be used to stop the broadcast of
illegal materials outside of Malaysia. The act only has jurisdiction over websites
operating in Malaysia. In line with the progress of the Internet, the Malaysian
government has gazetted the Computer Crime Act 1997 and Communication and
Multimedia Act 1998 to deal with unhealthy activities over the Internet.
Nowadays, there are many crimes committed through the Internet. There are also
individuals who abuse the Internet as a source of reference for their criminal acts.
For example, misuse of chat or social networking site to lure women or teenagers
for various purposes are not healthy. This is quite dangerous isnÊt it? Various laws
have been enacted in recent years to provide effective protection to women and
children. Furthermore, various methods have been used to provide education and
training as well as creating awareness among Internet users, regardless of gender
and age, to better protect themselves and use Internet safely.
With most of the data available online and easily accessible to many people,
concerns about data privacy has been increasing among Internet users. In order to
provide better data protection to both online and offline users, laws and
regulations such as MalaysiaÊs Personal Data Protection Act 2010 and European
Union General Data Protection Regulation have been introduced and adopted.
Businesses will also increase via the Internet. Various steps are being taken to make
the Internet more widespread and easy to use by users, for example, Internet access
via TV, fourth and fifth generation (4G and 5G) approach to mobile phones as well
as the use of optical fibres and high powered lines to houses.
Based on earlier discussions, we also find that the Internet has its own set of
problems. By understanding the problems, users will be aware of its limitations,
future of the Internet and will not easily believe everything that is found on the
Internet. The Internet is a virtual space and has a very wide coverage.
There are five major trends that are related to future Internet, as shown in
Table 7.3.
Table 7.3: Five Key Trends that are Related to Future Internet
Trend Description
We use a variety of For example, online banking, online games, Internet TV, digital
online services every movies, video on demand, magazine subscription or online
day newspapers, online purchases, online distance learning and
social networking.
The Internet has Users will be powered by equipment and low cost devices that
evolved rapidly from will allow them to create their own content. This will make the
the concept of products and services more personal. To make the content and
sharing information products more attractive, the collaborative concept will be
to collaborative adopted for the production and better service. This will spark a
publication phenomenon that will change work ethics and commercial and
social activities amongst the Internet users.
The number of smart The smart products are used to collect and process data. This
products increases information could then be used in the subsequent preparation
every day of information in order to facilitate decision making.
Info graphics from the following websites may also provide you with an overview
of the future developments on the Internet:
(a) https://www.visioncritical.com/internet-of-things-infographics/
(b) http://dailyinfographic.com/2016-the-year-of-the-zettabyte-infographic
(c) http://www.smashingapps.com/wp-content/uploads/2011/01/The-
Internet-in-2020.jpg
ACTIVITY 7.6
From 1969 until today, computers and the Internet have undergone five phases
(before 1969, 1970ă1990, 1990ă1997, 1997ă2000 and 2001ăonwards) and have
become a major part of our life.
Ć The Internet is a grouping of computer networks that is very large and covers
the whole world. It operates by using TCP/IP.
Ć The Internet began in the US with the birth of ARPANET, which was intended
for research and sharing of academic resources. ARPANET has grown rapidly
but was later replaced by the National Science Foundation Network.
Ć HTTP and the Web have sped up the already rapid development of the Internet
even more.
Ć There are two types of computers on the Internet, namely host computer and
server computer.
Ć The computer can also function as a server, that is, the computer can be
accessed by other users on the Internet.
Ć The server has two forms of identification, namely IP address and fully
qualified domain name. A fully qualified domain name is much easier to
remember compared to the IP address.
Ć There are several major trends associated with the future of the Internet
including the existence of online services and the growing number of smart
products.
ARPANET Intranet
Cyber law Internet
Domain Internet Protocol (IP)
E-mail National Science Foundation Network
(NFSNET)
Extranet
Search engine
Frequently asked questions (FAQ)
Security
Fully qualified domain name (FQDN)
Transmission Control Protocol/
Hypertext Transfer Protocol (HTTP) Internet Protocol (TCP/IP)
Hypertext Usenet
Information Web
INTRODUCTION
In this topic, we shall learn about the various software that are available on the
Internet. Some software can be obtained free of charge while others have to be
purchased. This topic will also discuss a popular Internet communication
technique, that is, e-mail. In the beginning, e-mails were text-based but now, you
can even send several types of data together with the e-mail such as text
documents, graphics, audios, PowerPoint presentations and many more. We will
also discuss matters related to e-mail such as ethics, the smiley icons and many
others. Finally, we will discuss about the Usenet and frequently asked questions
(FAQ). Are you ready?
We will look at the types of software in more detail, starting with shareware and
freeware in the next subtopic.
Shareware is a type of software that can be used free of charge within a certain
period of time.
After that period, if the user continues to use the software, he needs to send
payment to the programmer of the software. This allows the consumer to make a
choice whether to continue using it or to switch to another application.
Do you know some of the examples of this software? Examples of shareware are
WinZip (see Figure 8.2) and McAfee (antivirus).
Besides shareware, there is also freeware. It is available free of charge from the
Internet. Often, this software has specific charges to users who want to add
functionality or upgrade the software. If not, the user will remain with the basic or
normal functions of the software.
Open source software is a software that can be obtained without any cost,
together with its source codes that is licensed to be studied, changed and
redistributed freely to others.
Distribution of the software together with its source codes has the following
advantages:
(a) Users can modify the software and are not tied or bound to any company;
(b) Users have the opportunity to remove errors that may be present in the
source codes; and
(c) Users can also learn how the software is built based on the source codes.
The open source software begins with the GNU project (GNU is not UNIX). It is a
project founded by Richard Stallman from the Massachusetts Institute of
Technology (MIT) at the beginning of 1980s. The original aim of this project was to
produce a system based on UNIX for free of charge use. This project has been
successful in producing software of high quality such as GNU Compiler Collection
(GCC) compiler, Lisp program compiler, Emacs editor and others. All GNU
software programs use the copyright called GNU Public Licence (GPL) which
states that anyone can modify the program source code but the modification must
be shared with other users. Basically, GNU encourages software and source code
sharing among users so that high quality software can be produced.
The GNU Public Licence concept is the opposite of the commercial software
concept. Commercial software would tie users to the software company. If the
software contains errors, users will have to wait for the newer version to be
produced and this will take a long time. If the software company raises the price,
users will have to accept that and pay more for the latest version of the software.
Users can make any modification to the source code of the open software but users
are requested to share the modification with other users via the Internet. With this
intellectual sharing, it is hoped that the software will be continuously modified so
that it will become a high quality software.
Examples of open source software which are widely used today are Linux
(operating system), Apache (web server), GNU Compiler Collection (C language
compiler), Perl (high-level programming language) and R (statistical software).
We can see the definitions of GNU Public Licence software in Table 8.1.
GNU Public
Definition
Licence Software
There are thousands of high quality open source software available over the
Internet for users. You can visit the following website for detailed information on
open source software:
(a) http://www.opensource.org
(b) http://www.gnu.org
SELF-CHECK 8.1
File Transfer Protocol (FTP) is a technique of downloading data from any FTP
server on the Internet onto the userÊs computer.
Many servers offer anonymous FTP services, which means the server allows
anyone, anywhere to download data from it.
Users can use a variety of software to manage the files on the server. Among the
commonly used software is CuteFTP (see Figure 8.5).
8.5 TELNET
To use Telnet, a user needs to have a user account on the server to be accessed.
The Telnet technique can be used to access servers at foreign university libraries,
Usenet server, Internet Relay Chat (IRC) server, multi-user domain server or
database server.
Let us look at an example of the use of Telnet. Suppose a user wants to perform
complex calculations that require high performance computers (super). What
should he do? The user can proceed to the supercomputer centre in Malaysia
located at Universiti Teknologi Malaysia (UTM), Jalan Semarak, Kuala Lumpur to
perform the tasks. A supercomputer is a type of computer with high capability and
cost. It can be used to perform simulations, car modelling, complex calculations,
weather forecasting and many others.
Besides that, the user can access the supercomputer via the Internet. The user can
Telnet to the supercomputer and perform computations on the computer
remotely. The Telnet technique enables the sharing of supercomputer resources
for all users wherever they may be in Malaysia.
8.6 E-MAIL
An e-mail is a communication technique between users on the Internet. In the early
days, e-mails were only text-based. Today, users can send various types of data
together with the e-mail, for example, Microsoft Word documents, PowerPoint
presentations, Excel spreadsheets, graphic .jpg, audio .mp3 and others. The
computer server that manages the e-mail is called the Simple Mail Transfer
Protocol (SMTP) server.
To use e-mails, users need to have an e-mail account on the e-mail server. Most
organisations like universities and private companies give out free e-mail accounts
to their staff. If users use the services of tm.net.my (Telekom Malaysia), they are
also given free e-mail accounts.
There are websites that offer free e-mail accounts such as Gmail at mail.google.com
and Yahoo! Mail at mail.yahoo.com. Users can access the websites and register for
the e-mail accounts. These free e-mail websites are popular among students and
other individuals.
An e-mail account contains two parts ă account name and the name of the SMTP
server (domain name). For example, a user with the name Anis Shafiqah has an
account name of anis_shafiqah on the host server SMTP oum.edu.my. If the user
registers at www.oum.edu.my with that account name, the userÊs e-mail account
will be anis_shafiqah@oum.edu.my. The account name has a minimum of eight
characters and a maximum of 32 characters, on condition that it does not contain
special characters or space.
The following e-mail account names are not valid: „anis shafiqah‰ and
„a shafiqah‰. On the other hand, the following account names are valid:
„anis_shafiqah‰ and „a_shafiqah‰. Select a good account name that is suitable and
can be easily remembered by other users. Names such as „brutal99‰, „lanunlaut‰,
„amy89810‰ and „mahakaya‰ are certainly not suitable. Imagine the feelings of the
receiver when he receives an e-mail from someone with the name,
mat_brutal@hotmail.com.
To read an e-mail on the user account on the SMTP server, users can use two
techniques:
(a) Users can use the server software and access the said SMTP server; and
(b) Users can download the e-mail from the SMTP server onto a personal
computer using the Post Office Protocol 3 (POP3) technique.
Advantages Disadvantages
Can discuss with and pose questions The number of e-mails received may be a
to many Internet users who are lot. Certain active discussion corners will
knowledgeable in certain fields. see more than 200 e-mails a day.
Answers to questions may be obtained Users need to spend a lot of time reading
very quickly. e-mails.
Can share opinions and information with Most e-mail contents are rubbish and not
people who have the same interest. beneficial.
Low cost. ă
(a) Observe traditional customs during discussions. Always respect other usersÊ
opinions even if they disagree. Agree to disagree;
(b) Remember that it is a virtual discussion corner. Users do not know other
users or their background. Other users may be older or may have more
experience. They may be a professor, researcher, program expert, chief
executive officer, coursemate, neighbour or others;
(c) Show good conduct. This demonstrates your personality to other users. If a
user is noisy and obnoxious during the discussion, most likely his questions
will not be entertained by other users;
(d) Share your expertise and ask questions if you need the expertise of other
users. By sharing, a user can establish communication with other users;
(e) Respect the privacy of other users. Do not discuss private issues;
(f) Be willing to forgive other usersÊ mistakes and be ready to help in solving
problems. Do not entertain those who like to quarrel;
(g) Discussion forums are archived. Maybe in 10 yearsÊ time, if users search on
the Internet, they may find their old e-mails again. Therefore, be careful
when writing them; and
(f) Do not post usersÊ private e-mails onto the discussion forum without the
permission of the concerned users (very important). This violates the privacy
act of certain countries.
8.6.3 Smiley
An e-mail content in the form of text makes it difficult for users to express emotions
like anger, happiness, hatred, tears and laughter. Therefore, the smiley icon
technique is used. A smiley contains text-based symbols used in e-mails to
represent a certain emotion such as anger, hatred and laughter. To view a smiley,
users need to tilt their heads 90 degrees leftwards. Nowadays, most e-mails have
options for smiley icons (see Figure 8.7):
Is it less effective or impactful? Let us change it into a more effective e-mail and
have better impact by using the smiley icons:
The smiley symbols or icons used are :-) and :-(. The second e-mail shows that the
writer feels sad and jokingly asks if the receiver can help him.
There are hundreds of smiley symbols and there are most common ones are shown
in Table 8.3.
Do you know how the smiley icon was started? You can visit the following website
to learn the history of smiley icon and how it began:
http://www.cs.cmu.edu/~sef/sefSmiley.htm
ACTIVITY 8.1
In your opinion, what other icons can be added? Try to find other icons
from other websites. Compare the ways and means of how they are
written.
ACTIVITY 8.1
8.6.4 Acronyms
What is ASAP, ROTFL, RTFM, YMMV, BTW? These characters are acronyms or
short forms that are used to represent phrases that are normally used on the
Internet. In Table 8.4, nine of the popular acronyms are shown. Acronyms are used
in order to facilitate users to write quickly, without the need to type full sentences
in the e-mail, discussion and chat. This can save time and reduce spelling errors.
In fact, space can also be saved!
ROTFL rolling on the floor laughing Laughing while rolling on the floor,
a cynical expression
RTFM read the fine manual Advised to read the manual before
asking
ACTIVITY 8.2
If you receive the following e-mail, what can you understand from it?
Guideline Explanation
Ensure that your e-mail This makes it easier for the receiver to read your e-mail.
content is short and It is not proper to send a long-winded e-mail, hoping that
precise. the receiver will read it. Remember, the receiver is also
busy with other work and may be receiving hundreds of
e-mails a day.
Ensure that an appropriate This will help the receiver to determine the importance of
and concise title is used. the e-mail received.
Do not enclose a large- This would cause problems to the SMTP. Limit the size of
sized attachment. your attachment to less than 1MB. There are cases when
users send e-mail attachments of 50MB in size.
Ensure that the e-mail sent Use the virus scanner to examine the e-mail received.
or received does not
contain virus.
Process your e-mail in a For example, before going out for lunch, solve all your
batch. e-mail communications immediately. Do not postpone.
Do not subscribe to many For example, if you subscribe to five discussion corners
e-mail discussion corners. and each discussion has 100 e-mails a day. As such, you
will receive an average of 500 e-mails a day. Much of you
time will be used just to read the e-mails.
Do not reply to e-mails E-mail enables you to reply directly even to those whom
while you are angry. you are not comfortable with. You may regret sending the
reply. Once sent, an e-mail cannot be retracted.
8.7 USENET
A Usenet discussion does not involve e-mails. Users do not have to register with
any server to enter Usenet. A user simply need to have Internet access to access a
usenet news server and participate in the message threads or read Usenet postings.
Servers are usually operated by public universities or local Internet service
provider.
Usenet discussion is divided into a number of major topics. These topics are later
broken down into more specific subtopics (see Figure 8.9). Therefore, users can
easily search for discussion forums that are of interest.
Nick
In Usenet discussion forums, users can share opinions, request for help, argue,
spread rumours, sell items, fire at someone, criticise someone, get to know each
other and others. There is no filtering of the Usenet contents. Therefore, the Usenet
contents may be true or false. Users are reminded not to readily believe stories
such as get-rich-quick-schemes or pills for preventing old age that are available in
Usenet.
Therefore, FAQ originate from various Usenet discussion forums. For example,
if there is a new user involved in comp.text.tex discussing TeX document
processing software, the user may want to know the background of TeX, its
history, how to use TeX and so forth. The new user can ask these questions in
comp.text.tex. However, a better way is for the user to read the FAQ in the
comp.text.tex discussion forum. Normally, each discussion forum has a FAQ sent
to the forum every month.
It is wise to read the FAQ first before posing questions because it contains useful
information for new users to refer to and to know. An archived FAQ document is
available at the website http://www.faqs.org and has been discussed in Topic 7.
SELF-CHECK 8.2
One of the phenomena of the Internet is the addictive use of social network
websites and applications such as Facebook, Twitter, Instagram, LINE, Google+
and many more. So, what do you know about social network websites?
Boyd and Ellison (2013) in their article titled Social Network Sites: Definition,
History and Scholarship have defined the social network websites as web-based
services that allow individuals to:
(b) Articulate a list of other users with whom they share a connection; and
(c) View and traverse their list of connections and those made by others within
the system.
Facebook is the most popular social network site that allows users who are part of
the same „network‰ to view othersÊ profiles, unless a profile owner has decided to
deny permission to those in their network. Figure 8.11 shows the interface of the
Facebook website for Open University Malaysia.
Other popular social network sites, geolocation applications and trending social
media applications that are based on the Internet and cloud storage are Twitter,
YouTube, Foursquare and Instagram. These software or applications have created
their unique approach and phenomenon for their users.
The other trend on the Internet that is currently attracting many users is the growth
of smartphone usage. It led to the active development of mobile applications in
accessing data over the Internet. In addition, cloud computing allows accessibility,
storage and online communication such as through Google ChromeOS or
Chromebook, Box, Dropbox, Google Drive and others. Last, but not least, is the
wearable computing such as Google Glass and smart watches. All these new and
developing technologies cater to the growth of the Internet around the world.
SELF-CHECK 8.3
Discuss the Internet phenomenon and predict the future of software and
applications used for the Internet.
There are various types of software on the Internet. Some of them are
shareware, freeware, open source software, protocols, file transfer, Telnet,
e-mail and Usenet.
The open source software begins with the GNU project (GNU is not UNIX),
a project founded by Richard Stallman from the Massachusetts Institute of
Technology at the beginning of 1980s. The original aim of this project was to
produce a system based on UNIX for free of charge use.
Among the advantages of open source software is that users can change or
modify the software and they are not tied to any company.
There are several ethical issues that need to be observed during e-mail
discussions.
Acronym or brief phrases are used to represent commonly used phrases on the
Internet.
The Internet has grown to be a phenomenon in various aspects of our daily life
including the way we communicate, share and work. There are many software,
applications and websites available for social networks, communication, cloud
computing, wearable computing and many more technologies to fulfil our
needs.
9
LEARNING OUTCOMES
By the end of this topic, you should be able to:
1. Describe four basic elements of communication;
2. Identify communication as an important component of information
technology (IT);
3. Explain the functions of coder-decoder in a communication system;
4. Describe two types of electromagnetic signals for data
transmission;
5. Identify two modes of transmitting data;
6. Identify three techniques of controlling data flow direction;
7. Identify three types of wires used as media for transmission; and
8. Explain the concept of cellular radio technology.
INTRODUCTION
Communication is simply the transfer or exchange of messages, ideas, thoughts,
information or knowledge by means of whatever forms like words, writing,
behaviour or even body language. Data communication is a more specialised term,
targeting at the collection and distribution of electronic data in the form of text,
voice, pictures, graphics, video and others via the communication network.
There are four elements for each type of communication to happen. The elements
are message, sender, receiver and media as illustrated in Figure 9.1 during a
telephone communication.
9.1.4 Security
When data is sent, it will become an attraction for eavesdropping. An example is
buying goods via the Internet using credit cards. The credit card number sent via
this medium will be easily stolen, if security measures are not taken. Among the
security measures often used is encryption. We shall discuss this issue in the next
topic.
SELF-CHECK 9.1
ACTIVITY 9.1
Can you imagine how electromagnetic signals that carry information are delivered
to the receiver?
(a) Frequency
Refers to the number of recurring waves (see Figure 9.3). It is measured in
hertz (Hz), which is one cycle per second. Signals with 40Hz recur
40 cycles per second.
(b) Amplitude
Refers to the height of the wave or the waveÊs highest energy level,
as shown in Figure 9.5. Amplitude is measured in various units,
for example, voltage (V) or decibel (dB). The stronger the signal, the higher
is the amplitude.
(c) Phase
Refers to the rate of signal change with time or the measure of time
shift of the waves and is measured in degrees (À). Signals with the
same frequency can have different phases when they are compared.
In Figure 9.6, the bottom wave (b) has a different phase (phase 180À)
compared with the top wave (a). One complete wave cycle begins at a point
and continues until it reaches the point again. A shift in phases happens
when one cycle is not yet complete but another new cycle has already begun,
that is, before the previous cycle has completed fully. This happens at
point 1 in Figure 9.6(c).
Digital signals are in two states only, either low voltage and high voltage, off
and on or 0 and 1.
SELF-CHECK 9.2
Data transmission between two points or between two computers can happen in
two forms, namely in parallel or in series. Data that is sent through the parallel
transmission will be delivered in one go, normally in one byte (8 bits)
simultaneously. If 8-bit data is sent, 8 parallel wires will be used to send the data
ă each bit is sent via separate wires, as shown in Figure 9.8. Extra wires are needed
to send data between the sender and the receiver. These signals allow the data to
be sent in a proper sequence.
Printers, for example, receive data from the computers via the parallel ports that
are transmitted in parallel, that is, character (byte) by character (byte). This
transmission is suitable for short distances. Parallel transmission is not practical
for data communication. Computers normally transmit data in serial form because
of the high speed. Centronics parallel interface is an example of the parallel format.
Serial transmission is transmitting data serially, that is, the data is being sent one
bit after one bit (see Figure 9.9).
Serial transmission is slower than parallel transmission but is more suitable for
long distances. Serial transmission is the normal method of data transmission in a
communication network. In data communication, the data is transmitted serially.
Two modes of transmission for serially transmitted data are asynchronous
transmission and synchronous transmission.
Each character can be separated by a different time space, which means that there
is no synchronisation between the sender and the receiver, especially when there
is no data being sent. Synchronisation is achieved only at each character. The
receiver will synchronise with the sender when start bit is received. Several
agreements between the sender and the receiver include the number of bits per
word, parity check (whether odd or even), speed of transmission and how the
message is ended.
For sending each character, two additional bits are also sent. For example,
when sending 100 characters, the total bits being sent are 1,000 bits (eight bits
per character + two bits for start/stop 100). These 1,000 bits are equivalent to
125 characters, where 25 additional characters constitute the overheads for the
asynchronous transmission. The asynchronous transmission is clearly not efficient
for sending large amounts of data. However, it is suitable for low-speed data
communication, normally up to 32,000bps.
The receiver will check the data bits received until a header is found which
contains Synchronous Idle (SYN) characters and start bit, as shown in Figure 9.11
above. Next, both the sender and the receiver will mutually synchronise between
them. The receiver will receive all characters until a tail is found containing the last
character and SYN character. Data block (or packet) size varies from a few
characters to hundreds of characters. The bigger the data block, the faster the
transmission will be.
SELF-CHECK 9.3
9.4.1 Simplex
Simplex transmission allows data to move in only one direction, similar to the one-
way traffic (see Figure 9.12).
9.4.2 Half-Duplex
Half-duplex transmission confirms that data moves in two directions but only one
direction at a time. For example, moving through a very narrow bridge allows you
to move only one car at one time, climbing the road to FraserÊs Hill where going
up and coming down are fixed at different hours, people who communicate using
walkie-talkie or radio taxi as well as communication between two computers using
modems (see Figure 9.13).
(a) The time for the device to change its role from sender to receiver or vice
versa;
(b) The waiting time while the sender device transmits a message to confirm
readiness to receive data to the receiver device; and
(c) The waiting time for the sender device while waiting for the reply on the
readiness to receive data from receiver device.
9.4.3 Full-Duplex
Full-duplex transmission allows data to be sent in two opposite directions all the
time, just like the two-way street (see Figure 9.14).
ACTIVITY 9.2
Bit rate is the real measure of the number of bits transmitted every second.
Bit rate or data rate is measured in bit per second (bps). For example, modem
speed is 14,400bps.
Baud rate is a measure of the number of changes of line states per second.
Change of line state means a change from state 0 to state 1 or vice versa, for
the digital signal. For the binary digital signal, baud rate = bit rate.
Frequency refers to the amount of data being sent via a channel or line at wave
frequency ă the cycle of waves per second. Frequency is stated in Hertz (Hz)
or cycles per second.
Bandwidth is the difference between the highest and the lowest frequency
that is supported by a certain channel or line.
Data can be sent at various frequencies within a certain bandwidth. The maximum
transmission speed depends on the available bandwidth. The bigger the
bandwidth, the higher the transmission rate or the speed of transmission will be.
There are three grades of bandwidth. Let us learn more about each grade of
bandwidth in Table 9.1.
Bandwidth Description
Voice band This bandwidth is present in PSTN, the traditional telephone network.
It is called voice band because PSTN is originally built for voice
communication instead of data. The width of its bandwidth is 4,000Hz,
which is sufficient for sending voice. Since its bandwidth is limited, it is
used for communication at the rate of up to 28.8Kbps.
Broadband It involves the satellite, microwave, coaxial cable and optical fibre. It is
used for high-speed computers and has a speed of between 56K to
30Gbps.
SELF-CHECK 9.4
1. State the differences between bit rate and baud rate. When will both
the bit rate and the baud rate be equal?
The types of transmission media for carrying signals depend on the types of
signals. Twisted pair wire and coaxial cable carry signals in the form of electrical
pulses. Light pulse signals can be carried via optical fibre cable. For the
electromagnetic wave that penetrates the air, it requires the support of microwave
and satellite systems. The three forms of data ă light pulses, electromagnetic waves
and infrared waves ă are all the types of waves that come with the wireless type of
transmission media.
Transmission media can be classified as guided (via the physical media such as
twisted pair wires, coaxial cables and optical fibre cables) or unguided (via air,
vacuum and water).
There are two types of wires or cables, namely unshielded twisted pair (UTP) and
shielded twisted pair (STP). Unshielded twisted pair cables are cheaper and easier
to handle but can be interrupted easily and have a shorter coverage distance as
compared with shielded twisted pair.
Besides being classified into unshielded twisted pair and shielded twisted pair,
twisted pair cables are also classified according to categories set by EIA/TIA-568.
In general, the factors that differentiate between these categories are the thickness
of wires according to American wire gauge (AWG) and the error features.
In a voice communication system, every coaxial cable can support about 60 voice
channels. Such cables that support multiple voices are called bandwidth coaxial
cables with a speed of up to 100Mbps. This type of cable is called thick coaxial
cable, thicknets or 10Base5, which is also called thick Ethernet.
Another type of such cable is the basic band coaxial cable that is used to send data
at high speed such as in the local area network (LAN). The cable that is often used
in the local area network is the RG-58AU cable, often called the thin coaxial cable,
thinnets or 10Base2, which is also called thin Ethernet ă with a speed of up to
10Mbps. An example of the coaxial cable can be seen in Figure 9.16.
Coaxial cable offers bandwidth and a degree of immunity from highly unstable
signals. In addition, this cable is cheap to install and complies with existing
standards. However, this cable incurs high cost for long distances because of the
need for repeaters. The safety level of this cable is not yet high. Termination and
connecting points of this cable need to be done correctly to avoid spoilage that can
create congestion in the network, thus, preventing access to it.
Optical fibre is made from silicon fibre or silica, which is thinner than the human
hair. It can be used to transmit various types of data such as video, pictures,
multimedia, music and graphics. Since the data is transmitted via light, it is not
affected by electronic interference and that will reduce errors in data transmission.
This fibre is also lighter than coaxial cable. Optical fibre cable is used for linking
long distances or linking between continents. Each fibre can support multiple voice
channels or TV channels.
measured in increments of two hertz until 40GHz. Figure 9.18 is a simple diagram
that describes how relay stations are used to provide coverage over a geographic
region.
Microwave technique is used for high volume communication and over long
distances. Parabola discs and towers require high costs to be built. Therefore, the
cost of a microwave system is expensive and it is for long distances. This technique
is suitable for communication between tall buildings in city areas, especially when
the cost of installing optical fibre cable is very expensive. Now, microwave systems
are often used to link up networks between buildings in campuses and towns.
For a medium-sized microwave system, the cost is average, it can be divided into
sub-channels and can be extended over long distances. However, it can be easily
interrupted by noise from the weather and electricity as well as the need to
overcome the line of sight problem including geography. The use of microwave
also follows tight rules in order to avoid overlapping.
Satellite acts as a relay station between one earth station and another earth station.
The signal frequency that is uplinked to the satellite is different from the signal
frequency that is downlinked to the earth station. Types of satellites are classified
according to their locations from the earthÊs surface as well as the signal frequency
to uplink and to downlink. Figure 9.19 illustrates how a satellite system relays
signal.
Satellite system is expensive but cost effective for sending large volumes of data.
The satellite coverage area on earth is called footprint. The position between the
satellites needs to follow certain rules in order to avoid signal interference between
each other. There are three advantages and seven disadvantages of using the
satellite system, as presented in Table 9.2.
Advantages Disadvantages
Satellite footprint offers a large Signal gets noisier while its strength
geographical area of coverage. deteriorates as distance increases.
High loading enables large volumes Limited lifespan of 7 to 10 years, after
of data to be transmitted. which the satellite will run out of real
orbit.
Low cost per user.
Data transmission can be intercepted
and decoded, unless they are
encrypted.
Satellite transmission can be
intercepted by other people.
High cost of installation and
operation.
Requires a decoder and parabola
dish.
Delay in receiving the signal.
9.6.6 Infrared
Infrared (IR) technology is a data transmission in the form of infrared radiation,
without going through wires. This approach is limited to only a small area and is
based on the line of sight. The transmission rate is about 10Mbps. This technology
can be used for wireless computer network. Mobile computers and devices such
as the mouse, printer and smartphone may have an IrDA port that enables the
transfer of data from one device to another using infrared light waves. The most
common example of infrared communication is your TV remote control The
infrared signals allow you to change channels, increase or decrease the volume
and perform many of other remote operations without having to leave the couch.
9.6.7 Radio
Radio frequency technology that utilises the wireless transmission is divided into
two types, namely high frequency and low frequency. High frequency radio
technology such as the cellular radio can penetrate office walls but has limited
coverage. Low frequency radio technology utilises the radio spectrum technology,
has a big penetrating power and wide coverage but has a problem of interference.
Radio spectrum technology utilises the normal radio frequency such as amplitude
modulation (AM), frequency modulation (FM) and short wave. This technology is
normally used for pagers.
Cellular radio technology is designed for mobile computing and is mainly used by
mobile phones, also called the cellular telephone. In Malaysia, there are many
cellular telephone operators like Celcom, Digi and Maxis. Cellular technology uses
radio frequency and cell sites. A cell site is a geographical area of a roughly circular
shape where cellular phones can get signal coverage and thus operate within that
specified physical area. Users move from one cell to another cell. Each cell is linked
to the master cell site that provides a link to the normal telephone network.
The radio frequencies which are available to the cellular network are limited.
As such, a key feature of cellular telephone service involves the reuse of
frequencies across different cells in order for an operator to accommodate a large
number of users. Users themselves sometimes resort to installing amplifiers or
boosters on their own phones in order to improve the signal strength of their
equipment.
Cellular radio technology can also use low earth orbit satellite. Examples of cellular
radio satellites are Iridium and Teledesic. Cellular radio technology has seen a lot
of development and various cellular technologies have been introduced of late, for
example, 5G networks.
The sender is the message transmitter or the place where a message begins.
The sender may be a person, software application, machine that can create
messages or replies without human assistance, system user, sensor, staff card
reader or other input devices.
A message can be in the form of a file, request, reply, status, control or mail.
The cellular radio technology concept is becoming more popular now. Many
communication companies like Maxis, Celcom and DiGi use this technology.
INTRODUCTION
We are vigorously going through the process of information revolution where the
development and use of information and communications technology (ICT) has
revolutionised our capability to extract, manipulate, store, communicate and
present information. The main characteristics of this era are a rise in the number
of knowledge workers, a world that has become more open in the sense of
communication and the sharing of data. However, this paradigm shift brings new
ethical problems such as privacy right which is threatened by the risk of the free
flow of information over the networks or devices. This topic will address the
concerns in ethics, privacy and security from the aspect of guidelines, techniques,
risks and safeguards in dealing with the way technology is used.
10.1 ETHICS
The technology revolution has generated a lot of controversy. One of the
controversies concerns questions about what is (and what is not) ethical with
regard to the activities involving information technology. The standards that
determine whether an action is good or bad are known as ethics. Computer ethics
refers to the moral guidelines that govern the use of computers, mobile devices,
information systems and related technologies. Frequently discussed aspects of
computer ethics are information accuracy, intellectual property rights, codes of
conduct, green computing, information privacy, unauthorised use of computers,
software theft and many other concerns on the usage of the various technologies.
The advancement of technology has created a world without borders. We can now
interact with anyone regardless of location. In addition, data can be moved from
one location to another. Even your confidential data that used to be kept in your
drawer, can be easily assessed now if the data has been converted into the
electronic form. Behind the facilities provided by these technologies, we need to
be aware of irresponsible parties who will take advantage of our carelessness when
using IT in our daily activities. Now, more than ever, it is very important to
emphasise computer ethics in the usage of such technologies.
In most organisations, computers are used to help the management ensure smooth
and efficient running of the business operations. Top management also uses
computers to facilitate in making important strategic decisions. Ethical problems
are often discussed in human resource management. This is because information
technology (IT) has opened new ways of conducting ethical and unethical business
processes electronically. Computer users are now confronted with series of ethical
issues especially when they perform duties in the office. Examples of situations
that could raise questions about ethical or unethical use of IT include:
(a) An employee who uses his computer at work to send personal email
messages;
(d) A student who copies text from the Web and uses it in a research paper for
his English composition class;
ACTIVITY 10.1
The following subtopics will discuss ethical issues related to information accuracy,
intellectual property rights, codes of conduct and green computing.
Information accuracy is important because many lives may be dependent on it, for
example, the medical information at hospitals, therefore, the information must be
accurate. To obtain accurate information, we need the right value. If someone gives
inaccurate information, it is difficult to find out who made the mistake. Many
situations or actions can lead to inaccurate information. The most common case is
when the user enters a wrong value or data. Moreover, inaccurate information may
accrue from typographical mistakes. To avoid such mistakes, the organisation
must find hire those with relevant experience and skills in data entry, and it must
use programs which can discover typographical mistakes.
A copyright gives authors, artists and other creators of original work the exclusive
right to duplicate, publish and sell their materials. A copyright protects any
tangible form of expression. A common infringement of copyright is piracy, where
people illegally copy software, movies and music. Many areas are not clear-cut
with respect to the law because copyright law gives the public fair use to
copyrighted material. The issue surrounding the phrase, „fair use‰ allows the use
for educational and critical purposes.
ACTIVITY 10.2
Use the link below to download the full code of conduct shown in
Figure 10.1:
http://www.southsidemontessori.edu.au/uploads/1/0/9/5/10956261
5/code__it.pdf
You may also find examples of codes of conduct online that define acceptable
forms of communications for websites where users post commentary or other
types of communications such as blogs, wikis and online discussions.
Nowadays, IT has radically changed our work and life while enhancing our
productivity, economy and social well-being. However, most people do not realise
that IT has also been contributing to environmental issues. Computers and other
IT infrastructure absorb significant measures of power, and is expanding day by
day, placing a substantial weight on our electric grids and adding to greenhouse
gas (GHG) emissions. In other words, IT is both a solution and a problem for
environmental sustainability.
Conserve Energy:
Use computers and devices that comply with the Energy Star
programme.
Do not leave a computer or device running overnight.
Turn off the monitor, printer and other devices when not in
use.
ACTIVITY 10.3
Today, huge databases store data online. Much of the data is personal and
confidential, and should only be accessible by authorised users. Many individuals
and organisations, however, question whether this data really is private. Some
companies and individuals collect and use this information without your
authorisation. Websites often collect data about you so that they can customise
their advertisements and send you personalised e-mail messages. Some employers
monitor their employeesÊ computer usage and e-mail messages.
Technology has facilitated the process of data collection and storage. For example,
banks store data on every customer. The data includes age, marital status, total
savings, total loans, savings conducts and others. Universities keep student
records, which include academic achievements, co-curricular activities, types of
studies, types of financial support, age, parentsÊ occupations, nationality and many
others. The Road Transport Department (RTD) keeps car ownerÊs names and the
related details. All these are examples whereby individual privacy can be misused
or abused by the keepers of information.
If customers have credit cards, the banks will have data on spending habits,
methods of debt repayments, types of purchases, income and others. Therefore,
bank and road transport officers may use these data to sell to some interested
parties for marketing and other purposes. All the data that are stored in banks,
universities and RTD are personal private data which can be used for evaluating
an individualÊs lifestyle.
(b) Can banks sell personal data of individuals to other companies for marketing
purposes?
(c) Can banks provide information on individual savings to other banks for the
purpose of loan approval?
(d) How can individuals determine that their personal data which is kept by the
authorised parties is accurate? and
(e) Can the RTD commercialise information of its databases concerning cars and
their owners?
The Internet has expanded the issue of privacy even more widely. With the
Internet, users can use e-mails for communications. Privacy issues that may arise
from the use of e-mails include:
(b) Whether the contents of e-mails are regarded as personal items that cannot
be publicised to other parties;
(c) Whether the employer has the right to read e-mails of his employees;
(d) Whether the government has the right to filter e-mail contents; and
E-mails that are sent through the Internet can be read by anyone, anywhere. The
e-mail is like a postcard. All e-mail messages are open for all to read. A number of
techniques have been introduced to ensure the safety of messages in e-mails. One
of the techniques is to encrypt the message, whereby it is converted into a form of
codes. The codes will be reconverted back to the actual message upon reaching its
destination. Research on encryption is still ongoing and various techniques have
been devised to better safeguard against intrusion by irresponsible persons.
Privacy rights is also an ethical issue because many records, which are stored by
non-governmental organisations are not covered by existing laws. In spite of that,
individuals have shown that they are very concerned with the control issue of who
has the right over personal information and how it is used.
10.2.1 Cookie
A cookie is a small text file that a web server stores in your computer. Cookie files
typically contain data about you such as your username, postal code or viewing
preferences. Websites use cookies for a variety of purposes.
Most websites that allow for personalisation use cookies to track user preferences.
These cookies may obtain their values when a user fills an online form which
requests for personal information. Some websites, for example, store usernames in
cookies in order to display a personalised greeting that welcomes the user by name
to the website. Other websites allow users to customise their viewing experience
with preferences such as local news headlines, local weather forecast or stock
quotes.
Some websites use cookies to store usernames and/or passwords so that users do
not need to enter this information every time they sign in to the website. Online
shopping sites generally use a session cookie to keep track of items in a userÊs
shopping cart. This way, users can start an order during one web session and
completes it on another day at another session. Session cookies usually expire after
a certain time, for example, a week or a month.
Some websites use cookies to track how often users visit a site and the webpages
they visited while at the website. Websites may use cookies to target them with
relevant advertisements. These websites store the userÊs interests and browsing
habits in the cookie.
SELF-CHECK 10.1
1. Explain how cookies work and what they are used for.
The PDPA prohibits data users from collecting and processing a data subjectÊs
personal data without his consent. The Act also prohibits data users from
disclosing or making its data available to any third party without the consent of
data subjects. It requires data users to inform data subjects on the purpose of its
data collection, the class of third party who may have access to the data and the
choices that data subjects have on how the data is to be used.
The Act also imposes a duty on data users to put in place adequate security and
indemnity measures to prevent the theft, misuse, unauthorised access, accidental
disclosure, alteration or destruction of data under their care. The Act also provides
for the rights of data subjects to access, modify and update their personal data.
There are exceptions to the PDPA. It does not apply to credit reporting business,
data collected/processed for the prevention or detection of crime, for the purpose
of preparing statistics and research, in accordance with a court order or for the
purpose of discharging regulatory functions.
A digital security risk is any event or action that could cause a loss of or damage
to computer or mobile device hardware, software, data, information or processing
capability. While some breaches to digital security are accidental, many are
intentional. Some intruders do not disrupt a computer or deviceÊs functionality;
they merely access data, information or programs on the computer or mobile
device before signing out. Other intruders indicate some evidence of their presence
either by leaving a message or by deliberately altering or damaging data.
What to Include
Disaster Type What to Do First What Might Occur
in the Plan
Type Description
Cracker Someone who accesses a computer or network illegally but has the
intention to destroy data, steal information or other malicious actions.
Unethical Unethical employees may break into their employersÊ computers for a
employees variety of reasons. Some simply want to exploit a security weakness.
Others seek financial gains from selling confidential information.
Cyber Someone who uses the Internet or the network to destroy or damage
terrorist computers for political reasons. Cyber terrorism usually requires a team
of highly skilled individuals, millions of dollars and several years of
planning.
The next subtopic shall continue the discussion on cyber crimes, focussing on the
types of criminal activities in the cyberspace.
There are several cyber crime activities that can take place such as Internet and
network attacks, unauthorised access and use, software theft and information
theft. The following subtopics will explain them in details.
Copyright © Open University Malaysia (OUM)
230 TOPIC 10 ETHICS, PRIVACY AND DIGITAL SECURITY
(a) Malware
Also known as malicious software, it consists of programs that act without a
userÊs knowledge and deliberately alter the operations of computers and
mobile devices. There are many types of malware, for example, computer
viruses, worms, Trojan horses, spyware and adware. Malware does the
damage after it has been implanted or introduced into a targetÊs computer.
It can trigger in a variety of ways such as when a user opens an infected file,
runs an infected program, connects an unprotected computer or mobile
device to a network or when a certain condition or event occurs, for example,
when the computerÊs clock reaches a specific date that is intended. It can take
the form of executable code, scripts, active content and other software.
(c) Phishing
This attack can be traced as far back as 1987. Since then, the risk of falling
victim to a phishing attack has increased incrementally due to the world-
changing adoption of Internet users and the constant pool of personal
information available through social media. Phishing attacks are an email-
based form of social engineering. Disguised as legitimate communication,
the fraudulent email tricks the recipient into responding by enticing them to
click a link, open an attachment or directly provide sensitive information.
Phishing attacks have become one of the most prevalent methods of
cybercrime because they are effective due to their ability to bypass detection
methods and offer low risk as there is little chance of capture or retribution.
In brief, to safeguard from Internet and network attacks, several prevention can be
practised including the use of antivirus software, be suspicious of unsolicited
e-mail attachments, scan any removable media for malware before using it,
implement firewall solutions and back up regularly.
Some system administrators set up alerts to let them know when there is an
unauthorised access attempt so that they may investigate the reasons. These alerts
can help stop hackers from gaining access to a secured or confidential system.
Many secured systems may also lock out an account that has had too many failed
login attempts.
Unauthorised use refers to the use of a computer or its data for unapproved or
possibly illegal activities. Unauthorised use includes a variety of activities, for
example, an employee using an organisationÊs computer to send personal e-mail
messages, an employee using the organisationÊs word processing software to track
his childÊs soccer league scores or a perpetrator gaining access to a bank computer
and performing an unauthorised transfer.
Among the measures that can be used to curb this activity include activating the
access control that will limit who can have access to the a computer, device or
network, determining when they can access it and what actions they can take while
accessing it. Setting up usernames and passwords or using biometric devices to
grant access control can also be added in.
To protect software media from being stolen, owners should keep original
software boxes and media or the online confirmation of purchased software in a
secure location, out of the sight of prying eyes. All computer users should back up
their files and drives regularly, in the event of theft.
SELF-CHECK 10.2
Ethics is the standards that determine whether an action is good or bad while
computer ethics are the moral guidelines that govern the use of computers,
mobile devices, information systems and related technologies.
A digital security risk is any event or action that could cause a loss of or
damage to computer or mobile device hardware, software, data, information
or processing capability. The common digital security risks are caused by cyber
criminals, computer crimes and calamities.
OR
Thank you.