ICT Textbook
ICT Textbook
CIRCULATION
OF ICT
ROHAYAH RUSLAN
MAZLINAH GHAZALI
Editor:
Sharifah Khadijah Syed Mohsin
Authors:
Noor Azimah Hassan
Nurul Hafidzah Noor Halim
Hanizah Abdul Wahid
Nurulhidayah Abdul Latif
Nafaizatulnananiah Hashim
Nazatulshima Zakaria
Norzariyah Yahya
Rohayah Ruslan
Mazlinah Ghazali
Assalamu’alaikum. A warm greeting from Department of ICT, Centre for Foundation Studies,
International Islamic University Malaysia (IIUM). Alhamdulillah, the third edition of Basic
Applications of ICT book is finally out.
This book is motivated by the desire of ICT lecturers to guide students with the
fundamental knowledge of Information and Communications Technology (ICT). This edition
has six chapters. It covers all basic applications of ICT that are essentials for your knowledge.
This includes topics that have developed significantly in recent years such as cloud computing,
social media, mobile apps and many more.
Within each chapter, we present Concept Check and end-of-chapter exercises in which
you can check your understanding of related topics. There are also topics on IT and Islam
which discusses the relationship of humans and IT from Islamic perspectives.
It is hoped that this book will be a valuable reference for you and be the key point to
motivate you in reinforcing your computing skills by advancing the knowledge of IT in the
future.
Thank you.
ii
TABLE OF CONTENTS
iii
iv
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
OVERVIEW OF IT
11.
12.
13.
14.
15.
16.
17.
18.
19.
20.
21.
22.
23.
24.
25.
26.
27.
28.
29.
LEARNING OUTCOMES
INTRODUCTION
Today, computers are used everywhere in our society. Businesses, schools, government
agencies, and other organisations use computers and computer technologies to assist day-to-
day transactions, provide better services to customers, and communicate with others. Since
computers are widespread today, it is essential for everyone to know something about
computers and be a highly efficient and effective computer user.
The future of computers and digital technology promises exciting challenges and
opportunities to computer users. It may change the way people and organisations collaborate
with each other in their daily life.
This chapter is designed to help you understand what computers are, how they work, and
how people use them. It also introduces the important terms and concepts of computing
operations and Information Technology (IT) as well as an overview of Information System (IS).
Finally, the chapter closes with an overview of Islam and IT.
What is a computer?
A computer is an electronic device that operates under the control of stored instructions in
its memory. Basically, a computer is used to capture and process the data, generate the
results, and store future use results. A computer is a programmable machine that
manipulates data according to a set of instructions given by the user. Computers are popular
because they have the advantages of speed, reliability, consistency, storage, and
communication capabilities.
2
To understand how computers work, computer users must understand these basic
principles.
1. Data is anything in a suitable form to be processed by computer. Data is turned into
information.
2. Program is a set of instructions that direct the computer.
3. Hardware and software have their specific functions.
4. All computers involve input, processing, storage, and output.
Nowadays, most computers are equipped with communications operation since the
ability to share information with others is crucial in this era. The role of communications has
greatly contributed to the enormous growth of technology nowadays. By communicating
with one another, all information, resources, and expertise can be shared. Communications
could be in a form of wired or wireless communications. Data or information can be
transmitted by modem to or from other computers via e-mail and social networking sites.
3
Figure 1-1 Basic operations of a computer
Data Representation
Before we look at how computer processes data, we need to know how a computer
represents data. Computer cannot recognise data or information in a way of human
interactions. Human will follow instructions and process data using numbers, letters, and
characters. Computer process data in a different way. Data consist of analog data and digital
data. Analog data use continuous signals or waves that vary in strength and frequency. One
example of analog data is the human voice.
4
letters, and characters, bits are combined into groups of eight called bytes. Whenever you
enter a number into a computer system, that number must be converted into a binary
number before it can be processed.
• ASCII-8 (or Extended ASCII) uses 8 bits to represent a character. ASCII-8 has 256
characters which included characters used in countries other than USA such as the
character £.
• Unicode uses from 8 bits to 32 bits for its character representation. Some versions are
UTF-8 (8 bits), UTF-16 (16 bits), and UTF-32 (32 bits). Hence, Unicode can represent more
than 65,000 characters and symbols. It covers most of the world's writing systems such
5
as Arabic, Chinese, Hindi, Japanese, Korean, Thai and many more languages. Modern
computers and programming languages use Unicode. Figure 1-5 shows some of the
Arabic characters in Unicode.
6
• Reduction of paperwork: Since computers save files digitally, the need for paper records
is significantly reduced. This will save cost, space, and be more environmentally friendly
because cutting down trees is reduced.
• Availability: Nowadays, computers are equipped with Internet connection. This
facilitates people to access any computer system from anywhere and at any time.
Types of computer
Computers come in different shapes and sizes. They can be generally classified according to
their processing power. At the beginning of the computer era, computers were huge and
expensive and could only be afforded by huge organisations. Later, personal computing
became popular due to the reduced costs of computers and the good design for ease of use.
7
capabilities, storage capacity, and accuracy. It can execute multiple calculations
simultaneously through its parallel architecture and shorten the time required to solve a
problem. The performance of a supercomputer is measured in floating-point operations
per second (FLOPS), which is a more accurate measurement than million instructions per
second (MIPS).
2. A mainframe computer has multiple cabinets, each the size of a large-sized refrigerator
called frames, on an elevated platform to hide cables and to allow cool air to circulate
from beneath. The hardware components are kept in separate water- or air-cooled
frames. The mainframe computer is placed in a very large room of one's building floor.
Users access a mainframe through a terminal. The mainframe is designed for batch
processing and record-keeping for processing millions of instructions. This type of
computer is often used by large organisations such as banks, airlines, colleges, and
insurance companies.
8
Figure 1-7 IBM mainframe
A server is a medium-sized computer used to host programs and data for a small
network such as a faculty computer lab or a hospital office network. It is typically stored
in a room either nearby or far away from the clients. It can serve many users at the same
time. Some servers consist of a collection of individual circuit boards called blades. One
blade server contains the hardware necessary to provide the complete processing power
of one PC. This type of server is much easier to upgrade and expand, consumes lower
power and cooling costs, and is more secure than a tower server. (See Figure 1-8 and
Figure 1-9.
Figure 1-8 IBM tower server Figure 1-9 IBM blade server
9
4. A microcomputer is also known as a personal computer (PC). It is popular in offices,
schools, and homes due to its invention of very small yet powerful microprocessors that
reduced the computers' size and cost. A personal computer is often differentiated by the
type of operating system it uses, with Microsoft Windows and Apple MacOS leading the
operating system market share.
Some giant PC makers are DELL, Hewlett-Packard (HP), Lenovo, Acer, and
Samsung. These companies provide personal computers that use Windows operating
system, while Apple Inc. sells personal computers that use MacOS. Other operating
systems for personal computers include Linux and Chrome OS which are open source
operating system.
2. Laptop computers are also known as notebook computers. They are lightweight, portable
computers, yet they can be as powerful as the average desktop computers. The keyboard
is on top of the system unit and a monitor is hinged to the system unit. A laptop computer
can operate on either a battery or power supply.
3. Tablet computers are portable computers that use a touch screen, or a kind of pen called
a stylus to input data. They are smaller and less powerful than laptop computers. Some
of the designs are called convertible tablet (has a detachable keyboard) and slate tablet
(excludes a keyboard).
4. Smartphones are wireless Internet-capable cell phones that usually provide personal
information management functions such as an address book, a calculator, a calendar, and
a notepad. Like tablet computers, many smartphones have a touch screen to access
information. Instead of or in addition to an on-screen keyboard, a variety of options are
available for typing on a smartphone such as swipe keyboard app, mini keyboard, keypad,
slide-out keyboard, portable keyboard, virtual keyboard, and speech-to-text app.
10
created to support the concept of Internet of Things (IoT). Some popular types of
wearable devices are an activity tracker like Fitbit, a smartwatch like Apple Watch, and a
smart glass or smart eyewear like Google Glass.
Desktop
Laptop
Tablet
Smartphone
Concept Check
Describe the differences between supercomputers, mainframe computers, and
microcomputers.
In your opinion, what makes mobile devices more popular than desktops?
11
Storage
Storage refers to the media that hold data, instructions, and information for current or future
use. The two components of storage are the media and storage devices. The media are the
physical materials that hold data, instructions, and information (e.g metal disk platter,
magnetic tape, microchip). The storage devices are the hardware or mechanism that record
and retrieve data to or from the physical media (e.g read/write head, media player/driver).
The capacity of a storage is referring to the amount of data the storage can hold. It
measures the number of bits or bytes stored on it. If a file size is 1KB, that means there are
1000 bytes (1 x 10³) or 8000 bits (1 x 10³ x 8). Refer to Table 1-2 for the terms used for
capacity.
Access time is the time taken to complete one reading operation or one writing
operation. Access time is a measurement that calculates the amount of (1) time it takes for
a computer program or device to locate data item on a storage medium or (2) the time that
required to provide the item in RAM to be transferred to or from the CPU. Transfer rate is
also affecting the access time. The process of transferring data from the storage medium to
the memory is called reading or retrieving. Writing or saving is the process of transferring
data from memory to a storage medium.
12
Table 1-3 Differences between primary and secondary storage
Primary storage Secondary storage
• Volatile (loses its contents when the • Non-volatile (keeps its contents even
computer power is switched off) after the power is switched off)
• A temporary holding place for data and • A permanent holding place of file for
instructions needed during processing. future use.
As you start your computer, the operating system files that reside in the secondary
storage are loaded into the memory and prepare your computer interface for you to interact
with the system. As you open a file, the data that reside in the computer storage are loaded
into the memory to allow you to work with the file. If you create a new file, the data in the
new file are also held in the memory. However, if you failed to save the newly created data
onto the storage media, you will not be able to retrieve it later and it is lost. Therefore,
secondary storage is essential for us to keep the file permanently for future use.
RAM consists of memory chips where the processor and other devices can read from
and write to these memory chips. RAM chips reside on a memory module, or a small circuit
board. Inside the system unit, these memory modules are inserted onto the memory slots on
the motherboard.
13
When the computer or mobile devices are
switched on, certain operating system files, for
example, the files that determine the display of a
computer screen will be loaded into the RAM, from the
hard disk. These files will remain in the RAM as long as
the power is on. If the user executes another
application such as opening the Microsoft Word or
running a browser, these instructions are loaded into
Figure 1-11 Memory modules
RAM and loaded into RAM. By then, we will see the
containing memory chips
application window appears on the computer's screen.
At this time, RAM already contains the operating system and the application's instructions.
User's data such as documents being typed will also reside in the RAM.
Since RAM is volatile and cannot hold its contents forever, any data, instructions and
information that we may need in the future must be stored elsewhere. This process is called
saving, which involves copying data, instructions and information from RAM into a storage
device.
A hard disk must be formatted before it can be used. Formatting is the process of
dividing the disk into tracks and sectors to enable the operating system to store and read data
14
on the disk. Circular lines or concentric rings called tracks are divided into sectors, which are
the invisible wedge-shaped sections. Two or more sectors are combined to form a cluster.
For stack of platters, cylinders run through the same tracks of multiple platters. The operating
system records exact locations of files on the disk in a table by storing the filenames, and the
locations using track and sector numbers. This table is known as New Technology File System
(NTFS) for newer OS and File Allocation Table (FAT) for older OS.
Hard disk has multiple platters, and each has its own read/write heads. The platters
rotate as fast as 5,400 to 7,200 rotations per minute. There is no direct contact since there is
a cushion of air about 0.000001 inch distance between the read/write heads and the hard
disk surface.
Contaminants such as hair, dust, smoke particles and dirt may cause a head crash.
This is because the read/write heads touch the disk's surface due to the existence of such
particles. Another possible cause could be when the computer accidentally dropped while it
is still running and as a result, the read/write heads of the hard disk touch the disk surface.
This phenomenon creates scratches on the surface that can cause bad sectors, or areas on
the hard disk that have become damaged. Head crash may cause loss of some or even the
entire hard disk data. Today's hard disks come in a tightly sealed casing that can absorb minor
jolting and shield them from contaminants.
15
hard disks. The demand for small package and light weight storage is also growing especially
in smartphones and other small and mobile devices. As such, manufacturers keep reducing
the size of storage devices and adding more capacities on this technology. Switching to an
SSD is the best upgrade to make a PC works faster. Even though a solid-state drive is more
expensive compared to a hard disk, it offers faster access speed (but slower than RAM) and
lighter in weight.
SSDs use electronic memory or flash memory which stores data, instructions and
information in sections called blocks. Initially, SSDs were used only for critical tasks due to
the expensive price. But now they become popular in many applications. SSDs have given
huge benefits to many organisations for faster data access such as in telecommunication
corporations, streaming media and video editing firms. SSDs are used in many types of
computers including servers, desktop computers, mobile devices, notebooks, ultra-books and
other ultra-portable PCs. The power consumption is
about half or one third of HDD's power consumption
and is lighter in weight. SSDs are now popular
alternatives to hard disk drives.
What is the difference between data and information? Data are raw facts and figures
collected from various sources. Data can be in the form of letters (A-Z, a-z), digits (0-9) and
special characters. Data do not carry any specific meaning unless processed. The processed
data are called information, where they offer more meaningful form of data.
16
Information is a set of processed data. The processing operation manipulates the
data, according to the program used, to produce information. Therefore, information is more
meaningful to the user than data and may be useful for decision-making.
Referring to Table 1-4, the information is interpreted from the data based on their
context by using a simple interpretation or advanced statistical analysis. Data collection can
be a long and repetitive process. Data is collected in a datasheet. Analysis involves calculation
of data. The results may include statistical charts, descriptions, or findings. These are referred
to as information. Finally, both data and information are presented in reports. The
differences between data and information are shown in Table 1-5.
17
INFORMATION SYSTEM
An information system is an organised system for collecting, manipulating, storing, and
processing data into information. The goal of an information system is to process data and
produce quality information. Most companies will use information system to organise
information to provide better services to their customers.
One of the big companies that use information systems to help them gain a
competitive advantage is Amazon. During the first month of their business in 2005, Amazon
based in the U.S received orders from citizens in their 50 states and from other countries all
around the world. One of its success reasons is by building a strong relationship with their
customers using their information system. They keep records of past purchases and
customers preferences, in which they are then able to recommend new products that relate
to the interests of that customer. Without a smart information system, Amazon would be like
other conventional book-selling companies.
People
Connectivity
Procedures
Information
System
Data
Hardware
Software
1. People
People are the most important element of an information system. They prepare the
procedures for the users and they design the software for the system. They input the
data into the system and use the information produced. They build the hardware and
ensure it runs smoothly.
18
Since people are very important in developing and maintaining an information
system, most companies have an IT (Information Technology) department. The skilled
staff in the IT department will train the users to understand how to use the
information system effectively.
2. Procedures
Procedures are the guidelines, rules, or manual for users to follow when using an
information system. They describe how to use the hardware, software, and data.
They also explain how tasks must be done or how to accomplish an activity. All
information system should have well documented procedures to ease the process of
using the system.
3. Hardware
Hardware is the physical component of an information system. This includes
input/output, processing, and storage devices. For the hardware to function, they
must be instructed by software. All hardware must be reliable and capable of handling
the expected workload of the information system.
4. Software
Software, or also called computer programs, are the non-physical component of an
information system. They consist of step-by-step instructions that tell the hardware
how to perform a task. The software must be developed and tested carefully so that
they can organise data and produce the expected output. Every task that a user
performs using an information system is done by the software.
5. Data
Data are unprocessed factual items, such as text, numbers, images, audio, and video
files. Data are manipulated by the software to produce useful information that are
requested by the user. The data entered the information system must be accurate so
that the result is accurate too. The difference between data and information will be
discussed in detail later.
6. Connectivity
Connectivity or network allows at least two devices to be connected by wire or
wireless connection. For an information system that involves more than one piece of
19
hardware to function, connectivity is compulsory (for example, a server is connected
to a client).
Concept Check
Which part of an information system is the most important?
The hardware and software are two parts of an information system. Name the other
four parts.
Before this, banking procedure was very time-consuming. Everything had to be done
manually by filling up a manual form. To withdraw money, customers need to fill in a
withdrawal form and to deposit money; they need to fill in another form. But when ATMs
were invented, customers are no more restricted to the bank's working hours to do basic
transactions like drawing cash or checking bank balance. By inserting bank card, the ATM can
analyse a customer's information and then dispense the requested amount of money.
Another benefit is customers can perform interbank cash withdrawal. They are not
restricted to a specific bank's ATM only. This results in improved efficiency and productivity
for banks. All communications are kept safe with an encryption which keeps your transactions
private from other users. It is a fast, reliable, and effective way to access your account
through the use of an information system.
We can conclude that information systems have improved banking sector in several ways:
• Process task faster - This will benefit both the banks themselves and the bank users,
queues are shorter and less staff need to be employed
20
• Make quick decision- Important decisions can be made a lot quicker- for example when
applying for loans, banks can quickly assess the person through the information system
by simply using their identification number.
• Process the transactions quickly- Transactions can be done a lot faster not only in the
bank but also by use of debit card by bank users elsewhere or at ATMs.
• Manage online transactions- Customers can perform online transactions without visiting
the physical bank by simply using online banking facility.
• Provide better customer support services- Banks have more information at hand and it
can be very helpful. For example, to cancel a bank card in case of theft, information
systems allow the bank to look up for detail and find the account wish to be cancelled
within a few minutes.
21
• What are the steps to withdraw money?
• What is needed to do to use ATM card for the first time?
• How to check account balance?
Connectivity ATM has to connect and communicate through a host processor. The host
processor is the gateway through which all the various ATM networks
become available to the cardholder (interbank network). Most ATMs built
within the past several years have the equipment necessary to connect
via Wi-Fi connection.
Nowadays most of ATMs are using industrial cellular routers with 4G LTE
connectivity as a main or a back-up source of connectivity between ATM and
the central system of the bank. Some use reliable wired Internet access
options such as DSL or fiber optic.
Islam and IT
Allah shows the importance of input, process, and output in a human life. Surah Al-Baqarah
verses 31 till 34 from Al-Qur’ān, exhibit the significant practice of input, process, and output
designed for human beings. Allah raises the status of humans by inputting the knowledge in
their aqal. With this given knowledge, humans need to strive to succeed in this world and the
hereafter. Allah does not look at the outcome but the process to achieve the outcome is
more important.
And He taught Ādam the nature of all things; and then He placed them before the angels,
and said: "Tell me the nature of these if ye are right." They said: “Glory to Thee, of
knowledge we have none, save what Thou Who art perfect in knowledge and natures.” He
said: “O Ādam! Tell them their natures.” When he had told them, God said: “Did I not tell
you that I know the secrets of heaven and earth, and I know what ye reveal and what ye
conceal?” And behold, We said to the angels: “Bow down to Ādam and they bowed down.
Not so Iblis: he refused and was haughty: he was of those who rejected Faith.
Al-Baqarah (2):31-34
By referring to Surah Al-Baqarah verses 31-34 from Al-Qur’ān, exhibit the significant
practice of input, process, and output designed for human beings. Allah raises the status of
humans by inputting knowledge.
22
Summary
Chapter 1 introduced you to some basic computer concepts. It discussed the overview of
basic computing operations and the types of computers available nowadays. Next, this
chapter explained the elements in Information System (IS). Finally, Islam and IT are also
mentioned in this chapter. Many of the terms and concepts introduced here will be discussed
further in later chapters.
23
GLOSSARY OF KEY TERMS
Access time – It is the time taken to locate an item on the storage medium and deliver the
item from memory to the CPU.
Bad sectors – Areas on the hard disk that have become damaged.
Capacity – is the amount of data the secondary storage can hold, measured in number of
bytes (or characters) stored on the secondary storage.
Cluster – is two or more sectors combined.
Cylinders – run through each track of multiple platters.
Data – Numbers, words, images or sounds that represent facts.
Hardware – All the machinery and equipment in a computer system that can be physically
touched.
Hard disk – is a circular platter or platters made of aluminium, glass or ceramic, coated with
metallic substance that allows data to be recorded magnetically.
Head crash – is when the read/write heads touch the surface of the disk due to the existence
of such particles or when dropping the computer while it is running. This phenomenon
creates scratches on the surface that may cause loss of data.
Information – Data that has been summarised and presented in a meaningful fashion for use
in decision making.
Information Technology (IT) – Any technology (the use of computer hardware and software)
that helps to produce, manipulate, store, communicate and/or disseminate information.
Information System (IS) – A system used to collect hardware, software, data, people,
procedures, and connectivity Data that has been summarised and presented in a meaningful
fashion for use in decision making.
The Internet (the "Net") – Worldwide computer network system that connect hundreds of
thousands of smaller networks for sharing purposes.
Mainframe – The second largest computer system after the supercomputer that is capable of
great processing speeds and data storage. It can support hundreds or thousands of users
simultaneously.
Media – or the physical media that hold data and instructions.
Microcomputer – It is also called personal computer (PC) that fits on or next to a desk or can
be carried around.
Network – A communications system that connects two or more computers.
Non-volatile – storage keeps its contents even after the power is off.
24
Operating System (OS) – A type of system software that controls the functions of a computer
system.
Real-time processing – Each transaction is processed immediately as it is entered.
Sectors – are the invisible wedge-shaped sections used to store data on a hard disk.
Server – A central computer in a network that holds collections of data and programs for
connecting PCs and other devices.
Software – Also called programs that tell the computer hardware how to perform a task.
Solid-state drives (SSDs) – use electronic memory or flash memory which stores data,
instructions and information in sections called blocks.
Storage devices – are the hardware that record or read data and instructions to or from the
storage medium.
Storage, secondary storage – or auxiliary storage, refers to the media that hold data,
instructions, and information for future use.
Supercomputer – A high-capacity computer with large number of processors to produce the
fastest calculating device.
Tracks – are circular lines or concentric rings on the hard disk
Transfer rate – is the time requires to read or write an item, from or to a device which is also
affecting the access time.
Volatile – means that RAM loses its contents when the computer power is switched off.
25
PRACTICES
Multiple-Choice Questions
1. Which of the following operations constitutes the four basic operations of all
computers?
A. Input C. Hardware
B. Internet D. Programming
6. Which technology allows users to shift their desktop computing activities to computers
on the Internet?
A. Cloud computing C. Handheld computers
B. Distributed databases D. Wireless communications
26
7. The primary storage refers to ____________ .
A. RAM C. Optical Disc
B. Hard disk D. Solid-State Drive
10. The time required to retrieve data from a secondary storage is ________________ .
A. transfer rate C. retrieve time
B. access time D. rotation per minute
Short Answers
1. In an information system, the rules or guidelines for people to follow are called
____________.
2. The five types of personal computers are ____________.
3. The time taken for the read/write heads to locate the information stored on a hard disk.
________________________
4. A file allocation system for a newer operating system such as Windows 10 is known as
________________________
5. The magnetic disk that uses flash memory to speed up the starting process of a computer.
________________________
Discussions
1. Computer prices such as desktops, laptops and smartphones vary based on the their
specifications. So how can you decide to get the best computer for your own use? Discuss
the criteria to get a computer at an ideal price for a student. You may gather more
information by asking your friends which choices they have made when buying
computers. Did they feel satisfed or regret about the computer that they have chosen?
27
2. A computer can simulate (behave as) any other medium. It can play music like an MP3
player; it can show video as if it were a television; it can be programmed to serve as an
answering machine, and so forth. Computers are almost everywhere, and they affect
most walks of life. This is a future in which digital devices have replaced all the things they
can emulate. Has anything been made easier or harder in your life by the advance of
computers? What benefits to your life can you see in such a future? What risks can you
foresee?
3. Why solid-state drives require less energy to operate? Why are not all hard disks being
replaced by solid-state drives? In your opinion, will hard disks become obsolete in five-
year time?
28
30.
31.
32.
33.
34.
35.
36.
37.
38.
39.
40.
IT TRENDS
41.
42.
43.
44.
45.
46.
47.
48.
49.
50.
51.
52.
53.
54.
55.
56.
57.
58.
LEARNING OUTCOMES
At the end of this chapter, you should be able to:
• Define the trends of IT which includes Fourth Industrial (IR 4.0), the characteristic and
data analytic of Big Data, features of Internet of Things(IoT) and Cloud Computing
• Explain the pillars, impact and challenges of IR 4.0
• Describe the application, advantages and disadvantages of Big Data and Internet of
Things(IoT)
• Describe the components, usage, advantages and disadvantages of Cloud Computing
INTRODUCTION
Information technology has become an integral part of our daily life. The 21st century has
been defined by the numerous advancements in information technology. Information
technology has served as a big change agent in different aspects of business and society.
Furthermore, it has proven to be a game changer in resolving economic and social issues.
In recent years, technology innovations have significantly shaped the IT industry in many
sectors. IT becomes an essential need for the growth countries to develop potential and
opportunities in new technologies. It shows the evolution of IT trends have make changes to
this world in the coming years. There are few current IT trends that popular today, for
example cloud computing, wireless connectivity, industrial revolution (IR), Internet of Things
(IoT), big data and many more.
30
Figure 2-1 IR Stages
31
INDUSTRIAL REVOLUTION (IR) 4.0
Today, we are in the current stage that known as IR 4.0. It is introducing the wide usage of
cloud technology, artificial intelligence (IR) and internet of things (IoT) by using machine
learning and cyber physical systems (CPS). CPS is one of the latest technology use in IR 4.0 by
presenting the way of communication between humans and the engineering system.
According to Ericsson.com in its blog mentioned that, CPS is a combination of software,
computer, network and physical process. Ericsson gives an example in future it may have a
situation where the machine, trucks, containers and other physical devices will communicate
each other to enhance the processing time while not waiting for humans.
32
NINE PILLARS OF IR 4.0
There are nine (9) pillars of IR 4.0 to be highlighted and related with the latest and future
technology.
33
Figure 2-3 Nine Pillars of IR 4.0
34
In general, IR 4.0 will be the main indication in the modern technology today. It consists
of nine pillars of IR 4.0. These pillars are approaching from variety of technologies that apply
and use by people in this era. For example, big data is focusing more engaging the huge size
of data in autonomous system or machine and the data can be connected with other data
too. It shows that the manufacturing sectors will be improving in handling the big data and
will be processing their products in a short time. Thus, in the same time the data can be shared
and used by many people in other areas too.
Disadvantages
Speed up the growth of unhealthy lifestyles.
medicine. Increase of harmful
Expand the area of internet and
specialist professions. cybercrimes.
35
THE IMPORTANCE OF IR 4.0
36
IMPACTS AND CHALLENGES OF IR 4.0
IMPACTS
• More contributing to advance digital technologies such as:
- Mobile devices
- Internet of Things (IoT)
- Advance Human-Machine Interfaces
- Authentication and fraud detection
- Smart Sensors
- Augmented Reality /Wearables
- Cyber Physical system
- Cognitive computing
• Increase human productivity
• Income inequality to skillful person that tend to use technology become more
productive
• Pollution to our planet by producing chemicals and toxic
• Machines and robots substitute human labor in manufacturing and warehouse
37
CHALLENGES
• Increase poverty and hunger between different level of socialization of income
• To understand the transformation business process
• New talent and skillful workers needed in the industry
• Process of digitalization and automation in many sectors
• The learning process of advanced manufacturing
• Implementing the sensor technology
In conclusion, IR 4.0 is playing a vital role in the industries and other sectors too. It involves
the nine pillars of IR 4.0 that work together with the cyber-physical systems in the real world
of industries. From this view, we can see that IR 4.0 encourages the workers to join and
enhance their skills by using the upgrading automation and interlinked system. Thus, it will
help the industry to solve many problems in fast pace and increase the quality and
productivity.
As of now, IR 5.0 is still in progress and it is an upgrading level of IR 4.0. Later, IR 5.0 will
improve more on human-capabilities, collaboration between computers, machines, robots
and human workers. It will enhance the usage of technology in IR 4.0 and emphasis on the
arrival of human hands and minds into the industrial framework.
https://www.miti.gov.my/index.php/pages/view/industry4WRD?mid=55
9#tab_547_1919
38
Figure 2-7 MITI Industry 4WRD
Sources: https://www.miti.gov.my/index.php/pages/view/industry4WRD?mid=559#tab_547_1919
39
Concept Check
Define Industrial Revolution (IR)
Briefly explain the IR stages - IR 1.0, IR 2.0, IR 3.0, IR 4.0.
Briefly explain the nine (9) pillars of IR 4.0
List the advantages and disadvantages of IR 4.0
BIG DATA
Data has been defined in previous chapter and here we have other terms called Big Data. Big
Data is a collection of tremendously huge, fast and complex data sets that are difficult to
handle using traditional data processing applications. These data sets could be structured,
semi-structured and un-structured and have the potential to be mined for information. In
other words, Big Data is a field of data science that studies how massive data sets can be
collected, processed and analysed to extract information.
A smartphone generates approximately one quintillion or 1018 bytes of data every month
and if this values multiply by 3.5 billion, the result is unimaginable. This gigantic amount of
data is what we called as big data.
Every human being generates approximately 1.8 megabytes of new information every
second in recent year, so the scale of big data is incalculable, and it is expected to reach 150–
200 zettabytes by 2025. Companies like Google, Microsoft, Amazon, and Facebook store at
least 1,200 petabytes of information between them.
40
CHARACTERISTIC OF BIG DATA
The following table describes five characteristics of Big Data that also known as 5V.
Big Data Analytics is a method of extracting valuable information from large amounts of data,
such as hidden patterns, unknown associations, market trends, and customer preferences.
Big Data Analytics is used for risk management, product improvement and innovations, as
well as helping companies in making faster and better decisions.
41
APPLICATIONS OF BIG DATA
Big Data has a variety of application, including education, weather forecasting, media and
entertainment, healthcare, e-commerce, and social media networks.
Education
Weather Forecasting
42
Healthcare
E-commerce
43
ADVANTAGES AND DISADVANTAGES OF BIG DATA
Cost reduction, improvement in decision making and increasing on production of new product
and services are some of the advantages of Big Data.
• Cost Reduction
Big data aids in the provision of business intelligence that can lower costs and increase
operational performance. Big data analytics can give companies insight into the impact of
different variables in the manufacturing process, allowing them to make more informed
decisions.
Whereas privacy and security concern, requirement of the data analytic tools and
technical expertise are among the disadvantages of Big Data:
Customer privacy information, such as online transactions, orders, and subscriptions, can
be accessed by parent entities using data analytics. These databases can be shared
between companies for mutual benefit.
Choosing the right analytics tool can be difficult; some tools are complicated and require
intensive training, and the cost of the tool is dictated by the features and applications it
supports.
44
Concept Check
Define Big data
Briefly explain the characteristics of Big Data
Describe the application of Big Data
List the advantages and disadvantages of Big Data
In the Internet of Things, there are three categories of things which are:
• Sensors that collect information and then send it.
• Computers that receive information and then act on it.
• Things that do both.
Artificial intelligence, connectivity, sensors, active engagement and small devices among
the main features of the Internet of Things (IoT).
• Artificial Intelligence
With the proper use of data, networks, and algorithms, artificial intelligence features
in the Internet of Things make things smarter. Our watch, for example, can be
converted into a smart device that monitors heart rate, blood pressure, and sleep.
• Connectivity
• Sensors
The key reason this technology stands out is because of its sensors. They are crucial in
shifting the Internet of Things from a passive to an active network, defining its
boundaries.
45
• Active Engagement
• Small Devices
Over time devices are more powerful, cheaper and smaller, Internet of Things
purposely makes use of small devices to deliver its scalability, flexibility, and precision.
The Internet of Things covers a wide variety of applications, from small devices like smart
watches to vast areas like smart cities. Let's see how some examples of how the Internet of
Things can enhance our quality of life such as smartwatches, smart home, smart classroom,
smart farming and smart cities.
Smartwatch
Smart Home
Smart Farming
Smart Cities
47
ADVANTAGES AND DISADVANTAGES OF IOT
Access information, communication, cost-effective and automation are some advantages of
the Internet of Things.
• Access Information
Data and information that is stored distance from your current location can be
access in real time.
• Communication
Computer communication processes are improved through a network of
interconnected devices, resulting in better and faster performance and makes system
communication more straightforward and eliminates inefficiencies.
• Cost-effective
Using a connected network to transfer data saves time and money. The same data that used
a long time to transfer can now be transferred in a fraction of the time.
• Automation
Automation is useful for managing daily tasks without requiring human interaction,
which improves service quality.
Besides advantages, there are also the disadvantages of Internet of Things (IoT) in terms
of privacy and security, complexity, unemployment and dependability:
• Privacy and Security
One of the major disadvantages of exchanging information over the internet is the
possibility of being easily compromised by third parties. This result in data being
misused, which contributes to the rise of cybercriminals
• Complexity
A complex network that connects a variety of devices may introduce flaws that affect
the entire system. This is by far the most difficult part of the internet of things, but it
has huge potential.
• Increase Unemployment
The need for human labor would be greatly reduced when every job is automated.
This would have an immediate effect on one’s ability to find jobs.
• Dependability
The Internet of Things (IoT) has a significant impact on everyday life and, doubly, it is
a big part of our lives. People become useless and powerless if there are technology
failures such as no Internet access in their area.
48
In Malaysia, the IoT industry is expected to generate over 14,000 new jobs
and contribute billions of ringgit to the economy.
https://www.investkl.gov.my/Relevant_News-@-
Malaysia_Gets_Serious_on_Developing_IoT_Ecosystem.aspx
Concept Check
Define Internet of things (IoT)
Briefly explain the features of Internet of things (IoT)
Describe the application of Internet of things (IoT)
List the advantages and disadvantages of Internet of things (IoT)
CLOUD COMPUTING
Cloud computing is recognized as a virtual server environment that provides access to services
and resources through the Internet connection including software, databases, servers,
networking, storage and intelligence.
It is known as a home for storing and accessing the data and programs through Internet
connection and becomes a backup drive instead of using pen drive, external hard drive and
compact disc. The cloud is just an icon for the Internet. According to Rizwan and Priyanshu in
2018, stated that the cloud term is refer to the collection of networks that provide the
Internet connection for the user to access the data remotely. The purpose of cloud is to show
the connection between other clouds that contain variety of data, server and other
components of cloud computing.
Before the cloud computing existed, we can see that the usage of Internet is difficult in
terms of slow connection of data load, not enough storage in our physical server or hard drive
and even need more cost to develop new system and compute the desktop electrical power.
49
Since, the existence of cloud computing is close to the user, it means that all the data can be
accessing with fast, easy and offers broad connections.
Nowadays, everyone uses cloud computing to complete their daily task. For example, to
access email, watch online movies, play online games, conduct online class and meeting, do
online shopping and more. All these activities, will use the high capacity of storage, server and
require more time to load all the data using cloud computing from anywhere.
The first cloud computing services were introduced by Amazon in early 2000s and Google
started the document sharing for end users in late 2000s. Following are the services provided
by cloud computing:
50
Cloud Computing Architecture
Basically cloud computing consist of two parts which are the front-end and the back-end. The
front end is used by the end user and the back-end is used by the host to manage the whole
operation of cloud. Both end need to connect to each other with the Internet connection.
• Front End
It is used by the client to access the cloud computing which contains of the applications
and the interfaces. For example, apps created by the company itself or browser through
the Internet connection.
• Back End
It represents the cloud itself. It is used and managed by the companies to control all the
related facilities like data storage, network, servers, security system, traffic management
and virtual machines.
One of the Cloud Service Provider in Malaysia is Exabytes Flexi Cloud Server which
provides Email Hosting, Business Web, Cloud Hosting and Domain Name Registration or
Renewal.
51
Figure 2-21 Cloud Computing Components
52
1. Public cloud
It belongs by a third-party of cloud service provider that offers the services and resources like
storage and servers with the Internet connection. It allows the end users to access all the
services (hardware, software and supporting infrastructure) as long as manage their own
account through the web browsers. Since, the services and resources are free, it is most
suitable to use by individual and not ideal for the company or organization. It is because public
cloud has lack of security and configuration to the organizations.
2. Private cloud
3. Hybrid cloud
It offers a combination of public and private cloud arrangements with the technology that
allows data and applications to be shared between them. It gives better advancement of
cloud services, more deployment options and greater flexibility.
53
EXAMPLES OF CLOUD COMPUTING USAGE
54
ADVANTAGES AND DISADVANTAGES
● Cost savings – free users from ● Risk of data privacy - Since all the data
maintenance and upgrade. are stored away from us and centralize, we
cannot protect the data from being used by
the cloud services provider. Hence, the data
are at risk of being used for any purpose by
the provider.
● Automatic Software Update - User do not • Less control of business assets – cloud
have to manually update the software from service provider is monitor and own the
time to time. cloud infrastructure.
Concept Check
Define cloud computing
Briefly explain basic components of cloud computing
Describe types of cloud deployments
List the advantages and disadvantages of cloud computing
ISLAM AND IT
Whatever is in heavens and whatever is in the earth is Allah’s; and whatever you
manifest what is in your minds and hide it, Allah will call you to account according to
it Al-Baqarah(2):283
55
SUMMARY
Nowadays, technology is growing very fast, enabling more changes happened in most of the
industries and give big impact to the society such as their daily live will depend more to the
devices compared to the humans. With the combination between the modern technology like
nine pillars of IR 4.0 and the Internet has shown us that the tasks can be completed in a rapid
way and it can save our time by producing more quality and quantity of the products. In
conclusion, the evolving of IT trends in every year will develop more IT professional in every
sector and variety fields.
56
GLOSSARY OF KEY TERMS
Big Data – a collection of tremendously huge, fast and complex data sets that are difficult to
handle using traditional data processing applications.
Big Data Analytics – a method of extracting valuable information from large amounts of data,
such as hidden patterns, unknown associations, market trends, and customer preferences.
Cloud Computing – Delivery of computing services including servers, storage, databases,
networking, software, analytics and more over the Internet (“the cloud”)
Cloud computing architecture – Components and subcomponents required for cloud
computing.
Cyber Physical System (CPS) - a combination of software, computer, network and physical
process.
Descriptive analytics – identifies what has happened and summarizes fast data into a form
that is understandable by humans. These analytics helps in creating reports like company’s
revenue, profit, sales and so on.
Diagnostic analytics – describes why did it happen and looks into the cause of a problem. It
is characterized by techniques such as drill-down, data mining and data discovery.
Internet of Things (IoT) – is an environment where electronic devices or objects that are
equipped with sensors, programs, and other technologies connected with other devices and
systems through the Internet in order for them to interact with each other in real time
Predictive analytics – predicts what will happen and attempts to forecast the future using
statistics, modelling, data mining, and machine learning to improve in on suggested patterns.
Prescriptive analytics – prescribes the solution to a particular problem and it works with both
descriptive and predictive analytics. Most of the time it relies on artificial intelligence and
machine learning. Business rules, algorithms computational modelling procedures are used
in these analytics.
Smartwatch – is a watch that has varieties of features such as monitoring the heart rate,
calculating the number of steps, and offering reminders during the day not only just
timekeeping.
Smart Home – is a residence equipped with various smart appliances or devices such as the
refrigerator, lights, cameras, or the coffee maker that are connected to the Internet and can
be time-controlled using laptop, smartphone or tablet.
Smart Classroom – is a technology-enhanced learning classroom where equipments such as
digital screens, tabs, whiteboards, assistive listening devices, and other audio/visual elements
are incorporated into the classroom, making lectures simpler, more engaging, and more
interactive.
57
Smart Farming – is refers to the use of digital technology such as the Internet of Things (IoT),
robots, drones, and artificial intelligence (AI) to manage farms in order to increase the
quantity and quality of products and reduce the amount of human labour at the same time
Smart Cities – is an urban area where data is gathered using a variety of electronic and sensor
methods. The data is used to gain insights into how to manage assets, resources, and services
more effectively and also to improve operations in the region
Volume – the incredible amounts of information generated every second from different
sources such as social media, smartphones, sensors, images and videos.
Variety – data that is structured, unstructured, or semi-structured that can be mined for
information from a variety of sources.
Veracity – the quality of the data is being analysed. High veracity of data contribute in a
meaningful way to the overall results.
Value – the amount of valuable, reliable and trustworthy data that needs to be stored,
processed, analysed and found insights.
Velocity – the speed of data that has been stored and generated in a particular development
process flow to provide data on demand and at a faster pace. Twitter messages or Facebook
posts is an example of a data that is generated with high velocity
58
PRACTICES
Multiple-Choice Questions
1. Which of IR evolution is started to use computer and automatic machine?
A. Industrial Revolution 1.0 C. Industrial Revolution 3.0
B. Industrial Revolution 2.0 D. Industrial Revolution 4.0
3. Which of the following characteristic of Big Data is refer to the type of data that is
structured, unstructured, or semi-structured that can be mined for information from a
variety of sources?
A. Volume C. Variety
B. Value D. Velocity
4. Which application of Big Data helps the companies to achieve marketing objectives more
reliably and effectively, such as optimizing social content, informing content strategy,
monitoring brand image, and recognizing influential consumers?
A. Media and Entertainment C. E-commerce
B. Social Media Network D. Businesses
5. Which features shift the Internet of Things from a passive to an active network?
A. Artificial Intelligence C. Connectivity
B. Active Engagement D. Sensor
59
7. Which of the following is NOT the devices that incorporated in smart classroom?
A. Digital screen C. Whiteboard
B. Google Classroom D. Tabs
10. Given below are examples of cloud computing usage. Which pair of cloud computing
usage is NOT CORRECT?
Cloud Computing Example
A. Cloud apps e-mail
B. Social media Instagram, Facebook
C. Cloud storage Wideo, Powtoon
D. Online streaming Youtube
Short Answers
2. The rate at which data is processed and generated in a production process flow in order
to provide data on demand and at a faster pace refers to ________________.
60
3. ___________________ is referring to the use of digital technology such as the Internet of
Things (IoT), robots, drones, and artificial intelligence (AI) to manage farms in order to
increase the quantity and quality of products and reduce the amount of human labor at
the same time
4. ________________________________________________________________________
among the main features of the Internet of Things (IoT).
6. Develop new talent and skillful workers needed in the current and future industry is one
of the _____________________ occur in IR 4.0.
7. There are three different methods to apply the cloud computing, which are
_____________________________________________________________.
Discussions
1. Velocity is one of the characteristics of Big Data. Describe the velocity in the Travel and
Tourism area.
3. The Smart car is one of the applications of the Internet of Things which are not included
in this chapter. Discuss how IoT can handle and solve the problem of the car.
4. What are industries (for example- automotive) available in Malaysia that are using and
applied IR 4.0. Name the industries/companies and give examples of tasks using IR 4.0.
5. Discuss why IR 4.0 needed in most industries and the importance of it.
6. Discuss Cloud Computing in Malaysia. Explain about the providers and their services.
61
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
SOFTWARE
12.
13.
14.
15.
16.
17.
18.
19.
20.
21.
22.
23.
24.
25.
26.
27.
28.
29.
30.
LEARNING OUTCOMES
At the end of this chapter, you should be able to:
• List the types of general purpose and specialized application software and the function of
each type
• Give examples of general purpose, specialized and mobile applications and their basic
features
INTRODUCTION
Computers without software would be useless. Without an operating system, you would not
be able to use your computer. Without a word processing program, you would not be able
to prepare your documents. People use software to manage business processes,
communicate with employees, complete assignments, prepare flyers for events and many
other purposes. The aim of this chapter is to discuss about software and its categories.
SOFTWARE DEFINITION
Software, also known as programs, is the instructions that are used by computers or other
devices to perform various operations and functions.
SOFTWARE OWNERSHIP
Every software must have creator or author. The author of the software is the one who owns
the copyright of the software source code. Ownership of the software source code is
important. The copyright owner is the only one who has the right to modify the source code,
copy, distribute or sell the software for profit gain. Under the copyright law, the copyright
owner is granted the exclusive rights for its use and distribution.
63
Software ownership can generally be fitted into the following categories:
• Commercial software
Commercial software or also known as proprietary software is software owned by an
individual or an organization. Commercial software can be bought, leased or licensed
from its developer or manufacturer. It is a closed source software which means users may
use the software but cannot make any change on the source code.
• Open source software
The main objective of using open source software (OSS) is to reduce the total cost of
software ownership. Generally, OSS allows anyone to create a new version by modifying
the software. It can be modified to be used on different operating systems or processors,
or even share the software with others. The intention of OSS is not only to make a reliable
software which is easily accessible and marketable, but also to make it easy to understand,
allows it to be modified and duplicated.
In 1983, the free software movement was launched. Later in 1998, the term free
software was replaced by open source software (OSS). It was suggested that the term OSS
is less ambiguous and less confusing with regard to the commercial domain. There is a
claim that the open source movement began since 1969, when the Internet started.
• Freeware
Freeware is a software, most often, proprietary software that is free. However, there are
limitations on its use and the source code is kept secret by the software manufacturer.
When using freeware, full features are available to the user.
• Shareware
Shareware is a type of proprietary software which is initially free of charge to users. After
a certain period, users may have to purchase the software in order to use them. When
using shareware, most of the times, full features are not available to the user.
64
Table 5-1 Comparison between commercial software, freeware, shareware and open
source software
Proprietary Software
Open Source Software
Commercial Freeware Shareware
Copyrighted
Source code is kept secret by the manufacturer/producer
Source code is available
(closed source)
Examples
Operating system – Utilities –WinRAR Utilities - GoodSync
Windows, MacOS (file backup and Operating system –
Application – file synchronization Linux, Ubuntu, KaiOS (for
Utilities – Norton Google Chrome, software), smartphones)
Utilities, System GOM Player FileScavenger
Cleaner 7 (undelete and
recovery program) Utilities – ClamAV
(antivirus software),
Application – Application – Corel UltraDefrag
Microsoft Office WordPerfect Office
Assuming your company needs software, but your budget is limited. Can you make copies
of the software to cater for your company’s needs? How about if you are a lecturer and you
require your students to use certain software for assignments. Can you make copies for
educational purposes? No might be the answer for these questions. Therefore, other
alternative for these two situations would be looking at freeware or open source software.
65
Concept Check
SOFTWARE TYPES
The two main types of software are application software and system software. Application
software are considered as end-user software because they are mostly used by users to
complete their daily tasks. Meanwhile, system software is programs installed in a computer
to control and work with the computer hardware.
System Software
When we use a computer, we expect the machine to take care of the specific work behind
the scenes. For example, when we switch on the PC, we want the PC to be ready to be used.
The programs will manage and control the devices in the computer system, take care of the
computer monitor, keyboard, mouse, memory and hard disk. Other programs help to
connect and interact with the external devices to the computer system. As an example,
before a new printer can work, the computer must first detect the printer. Installing the
necessary program will initiate communication between the printer and the computer.
When you browse the Internet and download many files onto your computer hard disk,
eventually the hard disk will be full. Saving files to and retrieving files from the computer will
become slower. When this happens, you need to let a program to clean up the hard disk and
rearrange the files in order to improve the performance of your computer. What about if you
have found some useful information from the Internet and want to download it? The
downloading time will take a long time if the file is huge. To shorten the downloading time,
it is best to compress the file. These are some examples of why a computer needs the system
software to handle these technical details.
66
Definition of system software
System software is a collection of many programs that handle the operations of computer
hardware. System software allows users to interact with the application software. At the
same time, system software works with the computer hardware to deal with the majority of
technical details with little or no user intervention. Often the user does not know that most
of the computer tasks are performed by the system software. From the time the user turns
on the computer, the system software will start interacting and handling the technical details.
Concept Check
Operating System
The operating system (OS) is a set of programs to manage and control the whole operations
of a computer system. OS allows interaction between the end users, the application software
and the computer hardware. The operating system is the most important component of
system software. The computer will not be functioning without an OS. The operating system
normally assists the user by performing the tasks quietly without the user being aware of it.
The operating system coordinates all the hardware components including the CPU, memory,
and the storage devices as well as input output devices such as the monitor and printer, or
simply known as peripheral devices.
67
Almost every type of computer, from the simplest gadget, like your smartwatch, to the
complicated supercomputer, needs an operating system. Each operating system performs
various functions based on the tasks required and number of users that access the computer
system. Supercomputers, personal computers, game consoles and smartphones need their
own specific operating systems to carry out the tasks they need to perform.
Figure 3- 2 The operating system acts as the interface among the hardware, application
software and the user
The basic functions of the operating system are illustrated in Figure 5-3.
68
Booting and shutting down
Booting refers to the process of starting or restarting the computer. A cold boot is when you
turn on a computer that has been turned off completely. A warm boot is when you restart a
computer which is already running. During the process of booting, there are four steps
involved:
1. The CPU activates the program called BIOS (basic input/output system) which is stored
on the computer’s ROM chip. BIOS program prepares the computer to accept the input
from the keyboard and display information on the screen.
2. The BIOS checks a series of tests to ensure the computer and the peripheral devices are
functioning well. This process is called POST (power-on self-test). Among the
components tested are the computer’s RAM, disk drive, hard disk, keyboard and mouse.
If this POST failed, you will get an error message on the screen.
3. The operating system is loaded into RAM. It means that the operating system program
will be copied from the storage device, such as hard disk or solid state drive, to memory
and will stay in the memory the entire time the computer is turned on. At this point, the
operating system takes control of the computer, for example, to manage the processor
and other components of the computer system.
4. Configuration and customization settings are checked. For Microsoft Windows, the
database of information for this configuration is stored in the registry. The registry
contains the configuration and other applications such as display setting of the desktop
and mouse setting.
A computer needs to be shut down in a controlled way so that power is removed from
the computer’s main components, including RAM and hard disk drives. However, power may
still be retained in some internal components such as an internal clock.
69
Provide user interface
A user needs to interact with the computer. The part of a program that allows the user to
control and to interact with the program is known as user interface. The two types of user
interface are command line interface and graphical user interface (GUI).
In a command line interface, the user needs to type commands in order to interact with
the OS. Specific codes are typed to perform specific tasks. DOS (Disk operating system) used
command line interface to operate the microcomputers in 1980s. An example of command
used in a command line interface is DIR (for “directory”). This command instructs the
computer to display a directory list of all folders and file names on a disk.
70
With GUI, the user interacts with the operating system using graphical objects such as
icons, buttons, dialog boxes, windows, menus, ribbons, etc. In 1995, Microsoft released its
Windows 95 which used GUI.
Manage hardware
The operating system handles basic tasks which includes controlling various peripheral
devices such as the printer, keyboard and mouse. Most operating systems today are
equipped with Plug and Play capability where a device will automatically be identified and
configured with no user manipulation of the computer system. When a user connects a
device without Plug and Play capability, he will be prompted to insert the driver program
required for that device. However, if the driver is not available on hand, the user must search
the necessary driver from related website.
Data and instructions that the CPU needs to process is stored temporarily in RAM. These
data and instructions will be removed from RAM once they are no longer needed by the CPU.
OS coordinates these activities and it will ensure that the space in the RAM is enough to store
the next instructions and data.
71
the files and folders, such as to rename, copy, move and delete the files and folders, using file
management feature.
72
Examples of Operating System
If you have a laptop or a desktop computer, your computer will not be functioning without
first installing the operating system. Some of the operating system are commercial software
while others are free downloadable. Examples of commercial operating system are Microsoft
Windows 10 and Mac OS X. Some examples of open source operating system are Linux,
Ubuntu and OpenSuse. If you are using a smart phone or a tablet, the operating systems are
known as mobile operating system. Examples of these operating systems are Android and
iOS.
The earliest version of the operating system for personal computers was called DOS (Disk
Operating System). MS-DOS (Microsoft Disk Operating System) was an operating system
developed by Microsoft for IBM PC that used the command-line user interface. It was
developed for 16-bit Intel microprocessors and worked with only 640KB of RAM at a time.
Concept Check
73
Open source operating system
The following are some examples of open source operating system available to download.
No Example Logo
1. Linux
2. Ubuntu
3. Gentoo
5. Debian
6. Fedora
7. OpenSUSE
Ubuntu
Ubuntu is an operating system that is developed by a group of programmers from the whole
world together with the employees of Ubuntu's commercial sponsor, Canonical Group Ltd.
Ubuntu is created based on the idea of open-source software. Therefore, users do not pay
any licensing fee for Ubuntu. Users can freely download, use, and share the software.
Ubuntu is developed with the focus on sharing the knowledge of information technology
with the community. Individual contributions will not only benefit the members of the open
source community, but also to develop friendship between them. The fact that it is free,
allows every computer user from individual to businesses to download and access the
software as they like, without having to pay any license fee.
74
Contrast to the commercial software such as Windows and MacOS, software used for daily
computing are provided free of charge by Ubuntu. The user-friendliness and choice of
available applications make Ubuntu as one recommendation for novice open source users.
Some examples of application software are:
• Office Suite: a full office suite with a word processor, spreadsheet, and presentation
software. Examples are Apache OpenOffice and LibreOffice.
• Desktop Client e-mail: Evolution, an e-mail program with an interface similar to Microsoft
Outlook. Another example is Mozilla Thunderbird.
• Web Browser: Examples are Mozilla Firefox, Opera, and Flock.
• Database: PostgreSQL and MySQL are the two best-known open source database
programs, but commercial database programs such as Oracle and IBM's DB2 are also
available. Glom is an example of tools that provide an easy-to-use graphical interface for
designing and editing databases.
To download Ubuntu operating system, visit the Ubuntu's Web site,
http://www.ubuntu.com.
Features of Ubuntu
The features include:
Figure 3- 10 Menu
75
Figure 3- 12 Qalculate! (calculator)
Figure 3- 11 BleachBit (cleaning utility)
Figure 3- 13 Photo Flare (image editor) Figure 3- 14 Pithos (Pandora Radio client
for Linux)
Utilities
Utilities are programs to manage and maintain the general housekeeping tasks for the
computer. These programs are small and specifically designed for certain tasks to make
computing easier. Most operating systems provide their own utilities. However, there are
other powerful utility programs which are sold separately or bundled as utility suites.
Types of utilities
Some examples of important utilities are:
• Antivirus programs
This program helps to protect your computer system against viruses or any threat that
might invade your computer system. Examples of antivirus are Bitdefender, Kaspersky,
and McAfee Antivirus.
76
• File compression programs
This program helps to reduce the file size to save the storage space and to make sending
the files over the Internet more efficient. Examples are WinZip and WinRAR.
• System maintenance programs
These programs help to manage system resources. Some examples of system
maintenance programs are
o Backup programs. Backup programs help to make copies of files in case the
originals are lost or damaged. Examples of backup programs are Windows File
History, Paragon Backup & Recovery and CrashPlan.
o Troubleshooting programs. This program helps to identify and correct any
problem in your computer before they become serious. Examples of
troubleshooting programs are Windows Disk Cleanup, Windows Task Manager,
Optimize Drive and Free PC Audit. Free PC Audit is a freeware that provides
information for the system, hardware and software. It extracts details of all
components of the PC, shows installed software with version and product key.
Table 3-3 shows the steps on how to use Disk Cleanup, a utility program in Windows,
which allows you to identify and remove non-important files. This is necessary if you want to
free up your disk space.
77
Table 3-3 Steps to use Disk Cleanup
• Wait until the program identify files that you can delete
78
Another way to increase storage devices performance is to use the Optimize Drives tool.
Optimize Drives is a utility program in Windows 8 and above, which identifies and removes
unnecessary fragments and rearranges files and unused disk space to increase disk
performance.
Besides using the utility program offered by your operating system, you can also use open
source tools. Examples of open source tools in Windows include:
• WinContig
WinContig can be used to quick defragment files without the need to defragment the
whole disk.
79
• AMANDA Network Backup
It allows users to make copies of
files/directories to various types of
media, such as tape drives, disks or
optical media.
• 7-ZipFile Manager
• ClamWin
Figure 3- 20 ClamWin
80
Device Drivers
Imagine a car without a driver. Will it be useful? It is absolutely not. The same goes for a
component that is connected to a computer system. Every device, such as a printer or disk
drive, needs to have a special program associated with it. This program is known as a device
driver. It works with the operating system to allow communication between the device and
the rest of the computer system. It acts like a translator between the device and the program
that use the device.
Before you can use a device in your computer, you must install a device driver. There are
drivers that come with the operating system such as the keyboard driver. In DOS systems,
drivers are files with a “.sys” extension. In Windows environments, drivers often have a “.drv”
extension.
Language Translators
Language translators are computer programs that convert the instructions written in a
programming language into a language that computers understand and can process. Java
interpreter is one example of a language translator.
APPLICATION SOFTWARE
Application software is categorized into three: general purpose applications, specialized
applications and mobile applications (also known as mobile apps).
General-Purpose Applications
Also known as basic applications, general purpose applications are programs which are the
most widely used, regardless of the user’s field or job specialization. These programs include
81
word processors, spreadsheets, presentation graphics and database management system
or DBMS. The functions of these four types of software are briefly stated in Table 3-4.
Word processor
A word processing program is a very widely used software. This type of software is used to
create a variety of text-based documents such as letters, reports, memos and any kind of
written materials. One of the most commonly used word processors is Microsoft Word.
Other examples are WPS Writer, Apple Pages and Corel WordPerfect. Examples of open
source word processors are LibreOffice Writer, Calligra Words and AbiWord. Word
processors are also available online, for example Google Docs and Zoho Writer.
82
• Spelling and Grammar Checker: Users can check for any typing or spelling error. This
feature supports a variety of languages. In order to change to a preferred language,
the user can go to the Review tab, click Language and choose the preferred proofing
language.
• Thesaurus: Users can look for the synonyms of a particular word in the document.
• Word Wrap: This feature automatically brings the cursor to the next line when the
current line has reached the margin. Once the margin is changed, the text in the line
will be readjusted.
Spreadsheet
The spreadsheet program is used to organize numbers, analyse them as well as create graph
to visualize the numerical data. For instance, lecturers use spreadsheet to record students’
marks and calculate grade point average (GPA). Furthermore, lecturers can create graphs to
analyse the results.
One of the most commonly used spreadsheet programs is Microsoft Excel. Other
examples are Corel Quattro Pro, WPS Spreadsheets and Apple Numbers. Examples of open
source spreadsheet programs are LibreOffice Calc and Apache OpenOffice Calc. Spreadsheet
programs are also available online, for example Google Sheets and Zoho Sheet. Spreadsheet
programs create a workbook file which may contain many worksheets.
83
Figure 3- 22 Sample data on a spreadsheet showing the use of formula
84
Presentation Graphics
Presentation graphics program is used by sales or marketing people, teachers or even
students to create presentations that may include text and images, sound, video, music files,
as well as links to other files or websites.
One of the most commonly used presentation graphics programs is Microsoft PowerPoint.
Other examples are Apple Keynote, Corel Presentations and WPS Presentation. Examples of
open source presentation graphics programs are OpenOffice Impress, LibreOffice Impress and
Showcase. Presentation graphics programs are also available online, for example Google
Slides and Prezi. Some basic features of presentation graphics programs are:
• Links: Links allow user to navigate through the presentation slides or to other files, or
to web pages.
• Slide Show Animation: Animations make the slide show more interesting.
• Slide Design: Slide designs allow users to select a design from design templates
provided. The templates have included color schemes, slide and title masters with
custom formatting, and styled fonts.
• Multimedia: Audio and video elements can be added to a slide to make it more
appealing.
• Voice narration: Users can record their voice as narration for the slides.
• Charts, tables: Users can create tables and organizational charts.
One of the most commonly used DBMS is Microsoft Access. Other examples are Oracle
RDBMS and IBM DB2. Examples of open source DBMS are Cubrid, FireBird and MySQL. There
are also online platforms such as Knack and Amazon RDBMS. Some basic features of DBMS
are:
• Table: A table stores data. Each table has rows called records and columns called fields.
Fields are discrete pieces of information. Each field is assigned a specific data type to
ensure the correct type of information is entered into the field.
85
• Form: A form enables users to enter or manipulate data by providing user friendly
interfaces.
• Query: A query allows users to extract specific information from a table.
• Report: Users can print their own customized reports based on the selected criteria.
Concept Check
What is general purpose application?
What is the function of word processor, spreadsheet, presentation graphic and DBMS?
Name examples of general-purpose applications.
Specialized Applications
Unlike general purpose applications, specialized applications are more specific and focus on
a certain job or profession. For example, there are software specifically used in graphic
related jobs, some software are for creating and editing multimedia files, while some other
software are meant for creating web documents. The most popular specialized software are
discussed in this section.
Graphics Program
Professionals in graphics arts deal with graphics related works. These professionals
manipulate graphics using various types of software which are specially designed for the jobs.
These include desktop publishing, image editing and drawing programs. Below are the
details of these programs.
86
Type of software Function Example
Drawing or • Create and edit vector images which use Adobe Illustrator,
Illustration geometric shapes defined by math CorelDRAW, Inkscape
program equations
• Used for graphic design, page layout,
create sharp artistic image
Figure 3- 25 Canva
Other than using these three types of software, graphics arts professionals also import
text or graphics from other sources such as word processors, digital cameras, scanners and
image galleries.
87
Image galleries contain a lot of electronic images. The images are either clip art or stock
photograph. Clip art is any graphic illustration, while stock photographs are photos ranging
from people to landscape. Some clip art galleries are provided in certain applications such as
Microsoft Word. There are also web-based image galleries, such as shown in Table 3-6, which
provides free images or by charging the user.
Concept Check
What is the function of desktop publisher, image editor and drawing programs?
A website can have multimedia elements to make it interactive and interesting to viewers.
One of the commonly used multimedia elements is animation. Animation can be in the form
of moving text or even more complicated features. A specialized program such as Adobe
Animate is used to create animation that can be part of the website.
Another technology which is also used in creating website is Cascading Style Sheets (CSS).
CSS is commonly used to standardize the styles for web pages, such as the design, layout and
variations in display for different devices and screen sizes. CSS helps related web pages to
have a consistent look.
Designing a website may begin with planning the overall design using a graphical site map.
The map uses boxes to represent each web page, with lines connecting the boxes
representing the link between them. The homepage of a website is normally the first or the
main page that contains the introduction and table of contents leading to the following pages
with more specific information.
Concept Check
What is HTML?
89
Video Game Design Software
Now, everyone can create a video game using video game design software such as Twine,
Stencyl, and Game Maker. Before creating a video game, developers need to prepare a
prototype. A prototype allows developers see how the game plays, allows developers to
improve the design, and forms the foundation to make a full game.
• Twine
Twine is a free program that uses a visual editor with codes and syntax which are easy to
understand. Developers will enter story text and commands into a series of linked nodes.
Twine allows developers to embed photos, music, and even other flash games. Examples
of games made in Twine are Howling Dogs and Afterward.
• Stencyl
Stencyl uses a Lego-like approach to coding, where developers arrange code "blocks" and
snap them into logic statements. This tool packaged together several sample games,
which developers can modify. Examples of games made in Stencyl are Handheld Video
Game and The Brim.
• GameMaker
GameMaker uses an approach which is similar to drag-and-drop interface. However, the
language used for the coding only works in GameMaker. Example of GameMaker games
is Spelunky.
One of the most commonly used project management software is Microsoft Project.
Other examples are Basecamp and Teamwork Projects. ProofHub is an online project
management app. Other examples of project management software are Bitrix24, Freedcamp,
Zoho Projects and Asana. Followings are some primary functions of project management
software:
90
• Project planning: A project manager can use the software to create a project schedule
whereby project tasks can be mapped and relationship between one task to another task
can be visually described.
• Task management: Project tasks, deadlines and status reports can be created.
• Document sharing and collaboration: Project stakeholders can access documents
from a centralized source, therefore productivity is increased.
• Calendar and contact sharing: Project managers and stakeholders can automatically
be updated with the project timelines. Their calendars will include scheduled meetings,
dates for every activity and contacts.
• Time tracking: Project managers are able to monitor the duration for all tasks and to
keep records for third-party consultants.
Shown below are the examples of application software for open source and commercial
software.
Table 3-7 Examples of Application Software for Open Source and Commercial software
91
Type of Program Open Source Software Commercial Software
Sozi
LibreOffice Base
Microsoft Access
MySQL
Database
PostgreSQL
Oracle DB
Firebird
Evolution Microsoft Outlook
E-mail Zimbra Eudora
Roundcube Forté Agent
OpenLibreOffice.org Draw Microsoft Paintbrush
Graphics or Drawing Inkscape Adobe Photoshop
Blender Corel Painter
Mozilla Firefox ExpressVPN
Web browser Opera Microsoft Edge
Midori Apple Safari
The following are some descriptions on the advantages and disadvantages of open source
software.
92
Criteria Advantages Disadvantages
The current code base can be
The existence of a new project or
Fees for used by anyone to create new
the current status of a project
modifications projects, and no modification fee
may be difficult to know.
is required.
Continuing improvement and
Continuing No warranty regarding media,
outstanding improvement are
improvement viruses, and performance.
possible.
More likely to be built to open
Interoperability standard, so interoperable with Users must be open source savvy.
other open standard systems.
The process of software
development may not be
No pressure from the market,
Development properly defined, certain steps
therefore there are fewer
Processes may not be emphasized such as
conflicting priorities.
lack of system testing and
documentation
Mobile Apps
The word “app” is an abbreviated form of “application software”. It became the “Word of
the Year” in 2010, listed by the American Dialect Society. By definition, mobile app refers to
a computer program which is designed to run on mobile devices such as smartphones and
tablet computers.
Nowadays, mobile devices are becoming essential gadgets for many individuals. Mobile
users are increasingly depending on apps to do transactions like booking tickets, ordering
foods, shopping and banking, etc. Some of the most commonly used apps are social
networking, listening to music, viewing videos and scanning quick response or QR codes.
The following are some commonly used apps based on its usage.
• Social networking: Facebook, Instagram, Twitter
• Messaging: Whatsapp, Telegram
• Shopping: Shopee, Zalora, Lazada, Mudah, Carousell
• Music: Pandora, Spotify, SoundCloud, GarageBand, YouTube Music
Figure 3- 28 QR
• Videos: YouTube, Netflix, iFlix
93
• QR codes: QR Reader, QR Droid
The websites to download mobile apps are known as app stores. It is a digital distribution
platform that allows users to download apps either for free or with some charges. Table 3-9
shows a list of websites that provides mobile apps based on operating system.
94
Figure 3- 30 Microsoft Store
Based on statista.com, more than 178 billion apps were downloaded in 2017 and experts
predict almost 260 billion downloads in 2022. The two largest worlwide platforms for apps
distributions are Google Play for the Android users and Apple’s App Store for iOS users.
Android users are offered among 2.6 million apps and Apple’s App Store around 2.2 million
apps to choose from. The most popular apps downloaded are games (23%), followed by
business (10%) and education (9%). The rest go to lifestyles, entertainment, utilities, books,
music etc.
95
• Internet access
Internet access can be obtained from either a data plan or a Wi-Fi hotspot. Users are
typically charged for the data plan with a monthly fee. Public Wi-Fi provided by hotels,
coffee shops or airports is usually free and offer fast connection within the range.
However, information sent by a public Wi-Fi is not encrypted. Another method is to
use home wireless network which is a more secure network.
Name Description
Appery.io
96
Mobile Roadie
TheAppBuilder
Other platforms include Appy Pie, BuildFire, NativeScript and many more.
Concept Check
97
Software Suite
Concept Check
98
ISLAM AND IT
According to cyberlaw.com, generally, any software used beyond its intended purposes or is
pirated can be considered as illegal use of the software. As end-users, we must avoid
ourselves from using software illegally. Making copies of software onto a disk or computer
or downloading it from another source even if the copies are not intended to be sold for profit
and are only for personal use can still be considered illegal. Buying pirated software from
irresponsible parties is also an illegal act. Islam propagates good actions. Allah loves people
who show their very best behaviours in their actions. Using software illegally is not a good
practice. Therefore, we should avoid it.
However, nowadays, it is common for people to use pirated software. On 24th May, 2017,
the New Straits Times Online reported that The Johor Office of Domestic Trade, Co-operatives
and Consumerism Ministry has seized 76 copies of pirated software and six computers
estimated to worth RM741,300 from two business premises in UluTiram, Johor. The ministry
took a very serious view of companies using unlicensed or pirated software. This unethical
practice was a clear violation of the Copyright Act 1987, under which the management may
be liable to criminal prosecution. In Malaysia, any business remises, organisation or individual
found in possession and using pirated software shall be punishable under Section 41 (1) of
the Copyright Act 1987, namely a fine up to RM20,000 for each pirated software in addition
to five years jail or both f convicted.
[An-Nasaa'i and At-Tirmithi narrated it on the authority of Al-Hasan ibn 'Ali, may be
pleased with him - At-Tirmithi graded it saheeh]
99
SUMMARY
This chapter introduced you to software, one of the important elements in Information
Systems. You also learned about the software ownership which comprises of commercial
software, open-source software, freeware and shareware. There are two types of software:
System Software and Application Software
100
GLOSSARY OF KEY TERMS
Animation – Features with visual and sound effects.
App store – A website that provides access to specific mobile apps that can be downloaded
for a fee or free of charge.
Basic input/output system – A set of built-in software routines which controls many of the
most important functions of the computer
Cascading Style Sheets (CSS) – Used to define web pages styles, including the design, layout
and variations in display for different devices and screen sizes. It helps related web pages to
have a consistent look
Cold boot – to start up a computer that is turned off, performs a "power-on-self-test" (POST)
Command line interface – a means of interacting with a computer program where the user
types some coding as the command
Desktop publishing – Graphic specialized software for mixing text and graphic for publications
Device drivers – Programs to allow the computer to communicate with the devices that are
connected to it.
Downloading – Requesting or copying a file from another computer through the Internet
Embedded Operating System – Specialized OS for use in a computer that is part of a different
kind of machine such as computers in cars, digital TV, digital cameras, ATMs, point-of-sale
terminals and GPS navigation systems
101
Graphical user interface – A means of interacting with a computer program by using graphical
elements such as windows, icons, and buttons
Illustration or drawing program – Used to create and modify vector images or geometrical
shapes.
Licensed software – Any software which is used by the user under a valid purchase in order
to get the license
Memory – Temporary storage area to hold data and instructions that will be needed by the
CPU to process
Mobile Operating System – An operating system for mobile devices like smartphones and
tablets to run the application programs
Multitasking – The handling of more than one task at the same time by a computer processor
Operating systems – Programs to coordinate all activities among the computer hardware
devices, provide the interface for the computer users, and run all application software.
Peripheral devices – Devices to connect to the computer system to add functionality like
mouse, keyboard, monitor, printer and scanner
Plug and Play – A combination of software and hardware support that enables the Windows
operating system to detect and configure hardware with little or no user involvement
Quick response or QR code – Consists of black modules or square dots arranged in a square
grid on a white background, which can be read by an imaging device such as a camera.
102
Source code - any collection of computer instructions, possibly with comments, written using
a human-readable programming language, usually as plain text.
Specialized applications – Programs which are more specific and focused on a particular job
area.
Utilities – programs to manage and maintain the computer’s general housekeeping tasks for
the computer. Eg. performing backup and recovering damaged files
Word wrap – A feature in word processor that brings the cursor to a new line when the
current line is full.
WYSIWYG – What you see is what you get. Creating a web page without direct interaction
with HTML code.
103
PRACTICES
Multiple-Choice Questions
1. Which of the following software licenses allow user to modify existing software?
A. Commercial C. Shareware
3. The category of operating system which is used by mobile devices is called __________.
A. embedded OS C. network OS
B. desktop OS D. mobile OS
4. When you buy a new device, you need to install __________ before you can use it with your
computer.
B. DBMS D. Spreadsheet
104
6. Graphic software used for creating a professional quality brochure.
7. The MOST common mobile app used especially for listening to music.
A. Instagram C. Pandora
B. Telegram D. Spotify
A. CSS C. GUI
B. WYSIWYG D. Browser
9. Which of the following is the website that provides mobile apps for Android devices?
105
Short Answers
2. In order to increase hard disk performance, you can use __________ tool to rearrange files and
remove fragments.
3. __________ allow user to mix text and graphics to create a professional quality textbooks.
4. The older version of operating system used _____________ where user must type commands in
order to give instructions to computers.
5. When your computer is off and you switch it on, this is called __________.
Discussions
1. You are working in an advertisement company. Your manager asks you to prepare a
marketing plan and budget information. Since the company you are working in is small,
your manager asks you to use free software. Use the web to research popular software
that you can use to accomplish the above tasks. List common features of each software.
Which software will you use and why?
2. You have used your computer for more than 1 year and realize that it is getting slower by
the day. Suggest ways to make your computer work efficiently.
3. Use the Internet to explore more on cloud/online applications such as Google Docs,
Google Sheets, Zoho Office and Microsoft Office 365. Compare the applications with
installed programs such as Microsoft Word and Microsoft Excel.
106
1.
2.
3.
4.
5.
6.
7.
8.
9.
THE INTERNET AND
THE WEB
10.
11.
12.
13.
14.
15.
16.
17.
18.
19.
20.
21.
22.
23.
24.
25.
26.
27.
28.
4) LEARNING OUTCOMES
At the end of this chapter, you should be able to:
• Explain the Internet, the Web and its revolution.
• Explain the requirements of Internet access and web utilities.
• Describe search tools; search engine, online database search and content evaluation.
• Describe popular communication mediums; e-mails and social media.
• Identify electronic commerce, including B2C, C2C, B2B.
• Explain the advantages and disadvantages of electronic commerce.
The Internet
The Internet is a connection between computers in a network. A computer with access to the
Internet enables users to send and obtain information such as e-mail, messages, audio, video,
graphics, computer applications and programs. The Internet can be defined as a global area
network that connects computers worldwide. Internet connections are supported by a
“backbone” that comprises numerous high-bandwidth data lines. The high-bandwidth data
lines are connected to major network hubs that play important roles to deliver or distribute
data from one source to a location, such as ISP and web servers.
108
The Web
The web is an acronym for World Wide Web (WWW). Web is an information sharing
environment where documents, audio, video and other web resources can be accessed
through the Internet. The WWW is one of the primary tools for billions of individuals
worldwide to interact on the Internet. WWW is invented by an English scientist named Tim
Berners-Lee in 1989 at European Laboratory for Particle Physics (CERN) in Switzerland.
Specifically, the Web documents are created and formatted using Hypertext Markup
Language (HTML), and these documents are referred to as websites. These sites may contain
images, video, audio, and software components.
Internet in Malaysia
The commercial Internet story in Malaysia began in 1990 when the Malaysian Institute of
Microelectronic Systems (MIMOS, now MIMOS Berhad) launched Joint Advanced Integrated
Networking (JARING). JARING was the first Malaysian Internet Service Provider (ISP) in
Malaysia and since 2015, JARING is no longer in service.
Since the early nineties, the Malaysian government has been seriously taking action to
facilitate and promote Internet usage in Malaysia. The Malaysian government has been
introduced and employed a range of policies to encourage Malaysian businesses to explore
online commerce. To ensure Malaysia is not left behind, the government has invested for
Multimedia Super Corridor (MSC). The MSC strategic location attracted more than 900 local
and international Information Technology (IT) and communication companies to venture into
online business.
109
The 98.7% of internet users use smartphne to access internet.
Text communication is the highest online activity on the internet at the
rate of 98.1%.
98.7% using WhatsApp
110
Web Utilities
Web utilities are known as utility programs that ease internet surfing activities and make them
safer. Examples of web utilities programs are plug-ins, filters and file transfer utilities.
Plug-ins
Plug-ins are programs that are automatically started and operated as part of a browser. It is
a software component that adds a specific feature to an existing computer program. When a
program supports plug-ins, it enables customization. The common examples are the plug-ins
used in web browsers to add new features such as search-engines, virus scanners, or the
ability to use a new file type such as a new video format. Well-known browser plug-ins include
Adobe Flash Player, QuickTime Player, and Java plug-in, which can launch a user-activated
Java applet on a web page to execute a local Java virtual machine.
Web Filters
A Web filter is a computer program designed to screens Web pages to determine whether
they should be displayed or not to the user. The web filters examine the origin or content of
a Web page that a user is trying to access against a set of rules stated by the party who
installed the Web filter. A Web filter allows users to block pages of certain web pages content
according to their preferences, such as push advertising, obscene content, viruses or any
content that the users prefer not to see. Among the well-known web filter are Norton Family,
Net Nanny, SpyAgent and Qustodio.
111
Figure 4-2 Content-filter by Norton Family
Browsers
Browsers are computer programs that allow users to access web resources. A browser
program needs to be installed into your computer systems. The browser is the application for
112
the users to locate, retrieve and display content on the web. The two most popular browsers
are Chrome and Firefox. Other major browsers include Microsoft Edge, Safari and Opera.
https://www.iium.edu.my
Domain name
The domain names state the resource’s location while the top-level domain (TLD) name
identifies the type of organization. Examples of TLD are:
113
Table 4-2 Types of Domain
114
HTML, Cascading Style Sheet (CSS), and JavaScript
Apart from the essential elements on a web page such as hypertext, links and images, a web
page may contain some other elements, including Cascading Style Sheet (CSS) and JavaScript
to provide highly interactive and animated websites. The following figure summarizes the
elements of a web page.
JavaScript
•makes a web page more dynamic by allowing users to interact with other
web pages
•handles complex functions and features
115
Search engine and web crawler
A search engine is specialized software that helps users to locate information on the WWW.
The search query enters by users will return a list of results known as Search Engine Results
Pages (SERPs). The information resulted is a combination of web pages, audio, videos, images,
and other types of files. Some search engines maintain their database, and some search
engine mine data in any online databases or open directories. Search engines continuously
update their database and ensure that their database contains real-time information by
continuously runs an algorithm on a web crawler.
Processed data
moved to other
computers
Web crawler will automatically visit, scan and grab the content of webpages. Web crawler
will process each web page’s data it visited and organize the data by indexing the web pages
for easier retrieval in its respective web server. The web pages indexing is similar to a book
indexing that lists all words used by an author of a book. The hits’ list will be retrieved from
the search engine web server index whenever a user requests an information search from a
search engine. The search engine’s will produced a list of hits using a primary method by
comparing the search string with the words stored in the web server index and the search
engine also decides the order of the hits that appears on the user search engine interface.
116
Online database search
The online database is a database accessible by computers in a local network or computers
on the Internet. Online databases are hosted on websites, made available as software as a
service product that is reachable via a web browser. Example of the online database are listed
in Table 6-2:
117
To eliminate documents which “software engineering” NOT
NOT
contain the term after NOT development.
Quotation mark searching for a
“data science”
“……” specific word combination or an exact
“artificial intelligent”
phrase
Brackets are used to group terms (biometric OR IRIS OR thumbprint OR
together, so that operators like AND “voice recognition”) AND
(……..)
can be applied to all the terms in the (authentication OR verification OR
brackets validation)
Content Evaluation
A search engine is a tool for online information retrieval. However, users should be careful
with the information retrieved and wisely select reliable information. For reliable information,
Internet users should consider criteria on authority, accuracy, objectivity and currency. The
followings are the questions based on each criterion.
• Authority
i. Is the author identified or anonymous?
ii. Has the author included a bibliography?
iii. Can you find references about the author?
iv. Is the author qualified to write about the subject?
v. Do you recognize the author as an expert in his field?
vi. Is there enough information about the author’s credibility?
vii. Is the author affiliated to an academic institution or credible organization?
• Accuracy
i. Is the text free from spelling errors?
ii. Is the text well-written and grammatically correct?
iii. Are research methodologies adequately explained?
iv. Are the sources cited reliable and can they be verified elsewhere?
v. Has the content been through an editing process or been peer reviewed?
118
• Objectivity
i. Does the author present objective arguments or make it clear when he is expressing
biased opinions?
ii. Are other points of view explored?
iii. Is it a personal website? Does it express personal opinions?
iv. Is the website a part of a commercial organization, a political party or an organization
with a specific agenda? If yes, question the motives for publishing the information.
v. Does the website promote a biased viewpoint?
• Currency
i. Can you tell when the information was published?
ii. Is the information up to date?
iii. How frequently is the website updated?
iv. Are the links up to date and working?
COMMUNICATIONS
How users communicate with each other? How users share information? How users send
messages? All these activities need a communication establishment between users and
facilitated by the Internet. In general, communication involved the exchange of information
via verbal, non-verbal communication or written communication. Focusing on Internet-based
communication, methods such as electronic mail (e-mail), instant messaging, Voice over
Internet Protocol (VoIP) and video conferencing are among preferable by users.
119
Electronic mail
Since around 1993, electronic mail, most commonly called e-mail or e-mail is one of the
important means of exchanging digital messages from an author to one or more recipients.
E-mails operate across computer networks and the Internet. Each e-mail is having the same
components such as addresses, subject and attachment.
Address of recipient(s)
Topic of the email explaining the main ideas of the email contents
Plug-ins
domain name
120
3) Attachments: Most of the e-mail programs allow you to attach files such as
documents and images. If a message has an attachment, the file name typically
appears on the attachment line. The letter or message comes next
E-mail spam is also known as a junk e-mail. It is a type of electronic spam where
unsolicited messages are sent by e-mail. E-mail spams are used by an organization or a
company to promote their applications, products or services commercially. However, e-mail
spams could harm the e-mail account owners by carrying disguised messages containing
viruses, “phishing” link and trojan horses.
121
they have an Internet connection. The most popular webmail services are Gmail,
Hotmail and Yahoo mail.
122
Social media
Social media is an electronic communication that facilitates online communities to share
information, ideas, personal messages, and other content. Social media allows real-time
communication among users.
123
To find, review, share and discuss
Traveloka, TripAdvisor,
Online reviews information such as hotel rooms,
Zomato
restaurant, visited places and more.
Share news, ideas, find and discuss
Discussion forums reddit, Quora, Digg
information and opinion.
The term used in Social Media has a thin line in differentiating the
function of each type, such as media sharing and social network.
Social network allows users to add live videos and pictures, while
media sharing also allows the similar sharing file format on its social
media wall. However, media sharing is created purposely to share
the multimedia content while social network is focusing on the
relationship between text including updates, comments with photos
and videos.
124
information, thoughts, and ideas and gives users quick access to social media content.
Facebook, for example, uses a tool called Deeptext to interpret respective users posted
content and find its meaning. AI will then use machine learning to learn the users’ social media
preferences, interest, taste, search trends, and pattern. It will then provide relevant ads to
users based on learnt machine learning algorithms and datasets. Example of AI in social media
are:
i. machine learning to recognize your face in photos on Facebook and Instagram
ii. LinkedIn uses AI to offer job recommendations,
iii. Snapchat takes advantage of the computer vision to track users features.
ELECTRONIC COMMERCE
Electronic commerce or e-commerce is a term used for business transactions across the
Internet. It involves buying and selling goods and services or transmitting funds or data over
an electronic network, primarily the Internet. E-commerce consists of different types of
businesses such as consumer-based online retailers, auction sites, drop shipping, and services
between organizations. E-commerce is also known as e-business or e-tail (retail conducted
over the Internet).
E-commerce allows buyers and sellers to electronically exchange products and services at
any time with no barriers of distance. Today, there will be no boundaries between
“conventional” and “electronic” commerce as more and more companies move their
125
operations onto the Internet. E-commerce business models are generally categorized as
follows:
i. Business - to - Business (B2B)
ii. Business - to - Consumer (B2C)
iii. Consumer - to - Consumer (C2C)
iv. Consumer - to - Business (C2B)
v. Business - to - Government (B2G)
vi. Government - to - Business (G2B)
vii. Government - to - Citizen (G2C)
However, this chapter will only look into the first three types of e-commerce; B2B, B2C and
C2C.
Business-to-Business (B2B)
In the business-to-Business (B2B) business model, companies sell their products to an
intermediate buyer who sells the products to the consumer. B2B transactions tend to happen
in the supply chain, where one company will purchase raw materials from another to be used
in the manufacturing process. The e-commerce transaction is initiated when a wholesaler
places an order from a company’s website from a factory. After receiving the consignment,
the wholesaler sells the end product to the final consumer who comes to buy the product at
wholesaler’s retail outlet. Example of a B2B is sourcing materials for a production process,
such as a fabrics manufacturer supplies fabrics to a textiles house.
126
Business-to-Consumer (B2C)
Business-to-consumer (B2C) business model involves electronic business relationships
between businesses and consumers with no middle-man. B2C is one of the fastest-growing
e-commerce as it eliminates the need for physical stores for any retail company. The B2C
transactions start when consumers go to virtual stores and malls on the Internet to purchase
available items that they need. Examples of the B2C are:
i. online banking such as BankIslam.biz or Maybank2u,
ii. financial trading like stock exchange, and
iii. shopping at lazada.com or amazon.com
Consumer-to-Consumer (C2C)
C2C business model involves electronic transactions of goods or services conducted between
consumers. It is a platform for one consumer to sell to other consumers. Some examples of
C2C include eBay, an online auction site, Amazon, which acts as both a B2C and a C2C
marketplace, and online classified advertising sites, such as Craigslist and Gumtree.
127
The importance of e-commerce
E-commerce with the optimized and well-developed website offers a whole range of
opportunities listed for businesses to:
i. widen market opportunities,
ii. increase products ranges,
iii. generate more sales,
iv. offer customers opportunities to shop around the clock,
v. provide convenient service,
vi. boost the business.
Advantages of e-commerce
E-commerce is often faster, cheaper and more convenient than the traditional methods of
bartering goods and services. The followings are the advantages of e-commerce:
i. e-commerce facilitates the round-the-clock availability of buying and selling
processes.
ii. The speed of access to an e-commerce transaction.
iii. Customer and buyer have a wider selection of goods and services.
iv. The e-commerce website is accessible all the time.
v. International reach - without necessarily implying a large financial investment.
vi. It shortens the product distribution chain, sometimes eliminating it - enabling
suppliers to offer products and services that suit the target market’s individual
preferences.
Disadvantages of e-commerce
Despite the advantages, e-commerce also has some drawbacks to the seller or buyer. The
disadvantages of e-commerce are:
i. Strong dependence on internet connection.
ii. Limited customer service at some area due to limited resources, high delivery cost or
geographical restraints.
iii. Not being able to see or touch a product before purchase is made.
iv. The necessitated wait time for product shipping
v. Lack of legislation that adequately regulates the new e-commerce activities, both
nationally and internationally
128
vi. The users’ loss of privacy, the loss of regions’ and countries’ cultural and economic
identity.
vii. Insecurity in the conduct of online business transactions.
129
The most common type of fraud in e-commerce is using stolen card details.
Criminals can get the card details through ATMs or at a service provider’s
payment terminal (examples: restaurants and hotels).
Payment Options
E-commerce facilitates online payment for its online transaction. An online payment method
is presented at the checkout page of the buying and selling transactions. It normally has
recognized logos such as Master Card, PayPal or common all-purpose terms like “credit
cards”, “bank transfer” or “payment-on-delivery”. The commonly used online payment
methods are:
1. Digital cash
Digital cash is an electronic version of notes and coins that aims to mimic actual cash
function. The consumer has to purchase the cash credit, which then is used to make
online purchases. Using digital cash, an online payment does not directly involved
banks. Example of digital cash is e-wallet, e-money, Flazz and T-Cash.
• e-wallet
Electronic Wallet (e-wallet) refers to an online account required to be deposited
with some amount of money. E-wallet requires a consumer to register to an e-
wallet provider. The e-wallet will allow the consumer to store multiple credit cards
and bank account numbers in a secure environment with the registration. E-
wallet users can make payments faster and with less typing. E-wallet needs digital
Wallet as the electronic devices to support its services. Digital Wallet refers to an
electronic device that allows an individual to purchase items online with a
computer or smartphone. Examples of e-wallet in Malaysia is are Grab Pay,
Touch’ n Go, Boost and Vcash.
130
2. Credit card
A credit card is a payment card that requires the credit card holder’s commitment to
pay for the amount of merchandise or service charged to his card with other agreed
charges to the card issuer. Credit card is one of the banks’ facilities to their customers,
in credit or debt, to ease payment.
4. Bank transfer
Bank transfer is a method of electronic funds sends from one account to another
account. Bank transfer can be done by visiting the bank, internet banking or using
ATMs.
131
GLOSSARY OF KEY TERMS
ARPANET – Advanced Research Projects Agency Network
Cascading Style Sheet (CSS) - control the layout of multiple web pages all at once
Content filter - a useful program to allow or block access to web pages or e-mail.
Crawler/spider – computer algorithm that collects the relevant content for search engine.
Electronic commerce – Any type of business transaction that involves the transfer of
information across the Internet.
Electronic mail – A method of exchanging digital messages from an author to one or more
recipients that operate across the Internet or other computer networks.
File Transfer Protocol (FTP) – A standard Internet protocol for transmitting files between
computers on the Internet over TCP/IP connections.
Internet Service Provider – A company that provides Internet services, including personal and
business free or for a fee.
Local Area Network - s a group of computers and peripheral devices that share a common
communications line or wireless link to a server within a distinct geographic area.
Messaging – The creation, storage, exchange, and management of text, images, voice, telex,
fax, e-mail, paging, and Electronic Data Interchange (EDI) over a communications network
Plug-ins – A software component that adds a specific feature to an existing computer program
Search engine – Software system that is designed to search for information on the World
Wide Web
Web – An information space where documents and other web resources can be accessed via
the Internet.
Web browser – The application for the users to locate, retrieve and display content on the
web
Web pages – Text documents formatted and annotated with Hypertext Markup Language
(HTML)
132
Islam and IT
Therefore, while we are on-line why don’t we listen the Al-Quran citation?
SUMMARY
The Internet started during World War II to rely messages for armies. Nowadays, it becomes
one of the important elements of everyone’s life. Everyone seems cannot bare living without
it. Now it reaches billions of computer users worldwide. People use the Internet to
communicate and all other activities such as searching, shopping (e-commerce), e-learning
and entertaining. The world becomes borderless with the Internet. Communications become
easier and faster-using applications on the Internet such as e-mail, messaging, social media,
cloud computing and the latest technology, the Internet of Things (IoT). However, as Muslim
user, we should be able to use the Internet as a medium to promote Islamic practice to the
world and avoid abusing it.
133
PRACTICES
Multiple-Choice Questions
2. JavaScript is _________________________.
A. used to create interactive websites that respond quickly.
B. a small program that can be sent along with a Web page to a user.
C. a style sheet language used for describing the presentation of a document written in
a markup language .
D. a programming language often used within HTML documents that makes the web
page more dynamic.
134
5. Below are the advantages of e-commerce EXCEPT
A. The speed of access services.
B. Its around-the-clock availability.
C. A wider selection of goods and services.
D. The time to receive the purchased product can be longer for overseas transaction.
6. All the followings are boolean operators that have been used with a search string. Which
of the Boolean will narrow a search?
A. OR
B. AND
C. (…..)
D. All the above
7. 𝑋𝑋 is a set of markup symbols or codes inserted into a file intended for display on the
Internet and tells web browsers how to display a web page’s words and images. Which of
the following best to represent 𝑋𝑋?
A. File Transfer Protocol (FTP)
B. Uniform Resource Locator (URL)
C. Hypertext Transfer Protocol (HTTP)
D. Hypertext Markup Language (HTML)
135
D. [email protected]
Short Answers
1. ____________________________________ refers to a company that provides Internet
services, including for personal and business.
3. Online banking, financial trading and shopping are the three examples of
____________________________ e-commerce.
5. Payment fraud detection is being used to identify whether purchases are made using
______________ payment cards.
Discussions
1. If you have to access the web, it is possible to do so without a dedicated browser?
2. Digital cash has been widely used to replace money in daily buying, selling and payments.
Discuss, what are the traits that persuade users to use digital cash in their daily
transaction activities.
3. Based on your experience and the knowledge that you learn from this chapter, discuss
the steps taken to evaluate a website’s content.
4. Find information from the Internet on how E-commerce is practised in Malaysia. Give
some examples of B2B, C2C and B2C E-commerce in Malaysia. Discuss the most popular
type of E-commerce.
136
29.
30.
31.
32.
33.
34.
35.
36.
37.
COMMUNICATIONS AND
NETWORKS
38.
39.
40.
41.
42.
43.
44.
45.
46.
47.
48.
49.
50.
51.
52.
53.
54.
55.
56.
7. LEARNING OUTCOMES
At the end of this chapter, you should be able to:
• Define communications systems and devices required
• Identify communications channels and communications devices
• Explain communications services
• Explain the concept of data transmission specifications
• Describe the concept of network and network terminology
• Explain the advantages of a network
• Describe the types of network
• Explain network architecture including network topologies and strategies.
• Identify the organizational networks including Internet technologies and network
security.
INTRODUCTION
Today, we receive information at our fingertips due to computer communications availability.
We have learned in Chapter 1, a computer is an electronic device or hardware that holds
digital data and information. Simply, computer communications mean the process of sharing
and transferring data and information between two computers or more. For example, a small
device like a smartphone can communicate with another smartphone or other device
whether they are near to each other or far away. All these are possible because of a network.
For us to connect to other devices globally, we need the Internet, which is the massive
network of networks.
Communications systems are electronic systems that exchange data from one location to
another location. These communications may involve transferring data via cables or wires, or
not involve cables at all. When cables are not involved, data are transferred through the air
and we call this wireless communication.
Computer Communications
Computer communications are everywhere because of the existence of the Internet.
Companies or universities provide Internet connections to their employees or students
respectively. Many home users especially in cities get connections by subscribing to the
Internet from their service providers. Others may register for mobile data on their tablets or
smartphones. Computer communications are essential nowadays due to numerous
138
applications such as e-mails, multiplatform messaging app like WhatsApp, social media
networking and electronic commerce or e-commerce. This shows that the Internet plays an
important role in our daily life.
In order to make a communications system successful, you need the following four basic
elements (See Figure 5-1).
139
Examples of sending and receiving devices are depicted in Figure 5-2. These devices
include all types of computers and portable devices including desktops, servers, mainframe
computers, smartphones, tablets, gaming devices and car entertainment devices.
Concept Check
Describe the four basic elements required in communications system.
Name some examples of sending and receiving devices that exist in your
surroundings.
Communications Channel
Communications channels refer to the medium in where data or information is transmitted.
These channels are divided into two types which are, physical connection and wireless
connection or wireless technology.
Physical Connection
Physical connection uses solid cables to transfer data from a sending device to a receiving
device. There are three major types of physical cables used in communications system and
networks, which are twisted-pair, coaxial and fibre optic cables.
There are several categories of twisted-pair cables and their speed varies from 1Mbps up
to 10 Gbps. The maximum cable length is 100m.
140
A coaxial cable consists of a single solid copper wire or
inner conductor covered with multiple layers of shields.
This type of cable is widely used for community antenna
television and cable television network to deliver television
and music programs.
Figure 5-4 Coaxial cable
The transmission capability of a coaxial cable is 80 times higher than the twisted-pair cable
and generally more expensive than the latter. Furthermore, coaxial cable is proved to be cost
efficient for short links within 10m and residential networks.
It has a data rate of 10 Mbps which can be increased with the increase in diameter of the
solid copper wire.
Nevertheless, nowadays, most Internet Service Provider (ISP) in Malaysia use fibre optic
instead of twisted-pair and coaxial cables to deliver their network service to customers. For
example, Telekom Malaysia using fibre optic in their product named Unifi, to all customers.
The transmission capability of a fibre optic cable is 26000 times higher than the twisted-
pair cable. The maximum connection distance for fibre optic cable can go up to 2 km.
Wireless Technology
Unlike physical connection, wireless technology is a transmission medium that does not use
cables. Data are transmitted through the air. Wireless technology makes communications
more convenient and can take place at many locations especially in the area where installing
cables are impossible.
The primary technologies used in wireless transmission medium for communications
include infrared, Bluetooth, Wi-Fi, WiMAX, LTE, cellular radio, microwaves and satellite.
141
Infrared is a wireless technology that uses infrared
light waves. The light waves can only travel over short
distances within the range of 10 feet and in a straight
line. Hence, there should not be any obstacles
between the sending and receiving devices. Examples
of devices that may use infrared technology are
mobile phones, wireless mouse, and TV remote
controls. Figure 5-6 Infrared technology
Bluetooth is a short-range radio technology standard that sends data over short distances.
Bluetooth is widely used for communication between smartphones, a headset with a laptop,
and a smart phone with a car entertainment device. The coverage area for Bluetooth
connection can be up to 10 meters or 33 feet.
Wi-Fi allows a device to communicate wirelessly over a network. It was created based on
IEEE 802.11x standard (See Table 5-1). Wi-Fi is the most popular wireless networking
technology today and is widely used in homes, schools, universities and companies.
IEEE stands for the Institute of Electrical and Electronics Engineers, a professional
association consists of engineers, scientists and students all over the world. IEEE was created
on 1 January 1963 in New York, USA. IEEE is responsible for the improvement of Wi-Fi, and,
therefore, the letter b, g and so forth as shown in Table 5-1, represent the amendment to the
standard. The other characteristic of Wi-Fi is the frequency either within the 2.4 GHz or 5 GHz
band. The 5 GHz band is able to transmit more data compared to 2.4 GHz. The 2.4 GHz band,
not only has a lower capacity in transmitting data, but easily gets interference from things like
cordless phones and microwaves.
142
When this chapter was written in February 2021, Centre for
Foundation Studies (CFS) of International Islamic University
Malaysia (IIUM) campus based at Gambang, Pahang uses 802.11n
standards for its Wi-Fi.
~ the source from ITD, CFS.
WiMAX stand for Worldwide Interoperability for Microwave Access. WiMAX was created
based on IEEE 802.16 standard. It was designed for long-range wireless networking spanning
distances miles or kilometres away.
A WiMAX tower station using high-bandwidth and wired connection can connect directly
to the Internet. Furthermore, the tower can also connect to another WiMAX tower using a
line-of-sight microwave link. The connection to the second tower is called a backhaul (see
Figure 5-7). A single WiMAX tower can transmit data to WiMAX-enabled computers or
routers up to a distance of 50 km radius. Therefore, WiMAX could provide Internet
broadband access to rural and remote areas that are not covered by cable companies.
There are two types of WiMAX specifications which are fixed wireless and mobile wireless.
With fixed wireless, a customer can access the Internet from a computer from a permanent
location. Whereas, with mobile wireless, a customer can access the WiMAX through mobile
devices such as smartphones.
143
LTE stands for Long Term Evolution and synonym to 4G for marketing purposes. LTE is
theoretically to support data downloads at 300Mbps or more based on experimental trials.
However, the actual network bandwidth available to an individual LTE customer sharing the
service provider's network with other customers is significantly less. Nonetheless, LTE is still
the leading-edge to tremendously increase the capacity and speed of cellular wireless
network.
Cellular radio is a type of wireless transmission media that is used for mobile devices and
mobile phones to transfer voice and data. Cellular radio uses high-frequency radio waves to
transmit signals through cells in which each cell is controlled by a Base Transceiver Station
(BTS). A cell is a geographic network area, whereas, a BTS facilitates between users’
equipment such as a mobile phone with the network. As long as any mobile phone is in any
cell, which means in the network coverage, the mobile phone can receive and make calls. As
the mobile phone is moving to another location, the BTS will pass the signals to another cell.
Taking over signals from one cell to another is called a handshake. If there is no handshake,
a drop call will occur (See Figure 5-8).
Simple call
If a phone in cell A calls a phone in cell B,
the call does not pass directly between the
two phones. Rather, the call or signal from
phone in cell A goes to BTS A. Then the
signal from BTS A goes to BTS B. Then only
the signal from BTS B goes to the phone in
cell B.
Roaming call
A scenario when cell phones are moving
between cells (when people are walking
along or driving). If a car passenger is
making a call and the car moves between
cells E, D and C, the phone call is
automatically “handshake” (passed from
cell to cell) so the call is not cut off (drop
call).
Satellites are specialized wireless receiving transmitters. Satellites are sent to space by
rockets and stationed in orbit around the earth. These satellites receive signals from earth
stations and then relay and amplify the signals to other earth stations. The purpose of
144
stationing a satellite in space is for providing telecommunications. Communications satellites
are commonly used for weather tracking, global positioning system (GPS), mobile phone
signalling, broadcasting television programs or military applications. There are more than
3000 satellites in orbit that are used by both governments and private organizations.
145
• High cost to setting the infrastructure - especially for networks that require fibre
optics. Therefore, ISP only prefer to set-up wireless networks or home fibre network
in a big city where there are many demands from customers.
Concept Check
Define communications channels.
List and describe the three physical connections.
Describe all primary technologies used for wireless connections (technologies).
Communications Devices
A communications device is any hardware that is capable of transferring data or information
between a sending device and a receiving device. At the sending point, a communications
device will relay the signal from the sending device to a communications channel. At the
receiving point, a communications device will accept the signal. The signal received can be a
digital signal or an analog signal based on the communications channel used. Telephone lines
accept analog signals. Computers can only relay and accept digital signals. For a
communication to happen, data must be converted. Therefore, a device known as modem is
used. Modem converts digital signals to analog signals and vice versa.
Modems
A modem is usually used to transfer digital data over a phone line. The word modem is an
abbreviation of modulator-demodulator. A modulator is a device that converts digital signals
to analog signals. Whereas, a demodulator is a device that converts analog signals to digital
signals. See Figure 5-11 for the two signals. Typically, a modem is provided by an Internet
Service Provider (ISP). Figure 5-12 explains how a modem works. Thus, the sending modem
converts the data received from the terminal into an analog signal which is compatible with
the phone line, and the receiving modem converts the signal back into digital data before the
data are received by the computer.
146
Figure 5-10 Modem
Figure 5-11 Analog and Digital Signals
The speed of a modem is called data transfer rate. The common measurement of a
modem’s transfer rate is depicted in Table 5-2. The higher the transfer rate, the faster the
modem is, as depicted in Table 5-3. Moreover, the price of the modem will be higher
compared to a lower transfer rate modem.
Table 5-3 shows the time taken by two types of modem to transfer an MP4 video of size
800 MB at different transfer rate. Modem B, which has a higher transfer rate than modem
A, completes the download in a much shorter time.
147
Table 5-3 Modem transfer rate and time taken to download
Modem Name Transfer Rate Time taken
Modem A 3.5 Mbps About 30 mins
Modem B 21 Mbps About 5 mins
Types of modem
A dial-up modem is connected to a telephone line at one end, and the other end is connected
to a computer. In order to access the Internet, the telephone line is connected to the Public
Switched Telephone Network (PSTN). A user needs to dial-up a number in order to connect
to the Internet (See Figure 5-13). Typically, this type of modem has a transfer rate of 56 Kbps,
which is the slowest transmission speed among other types of modem.
The function of a digital subscriber line (DSL) modem is to transfer digital signal over standard
telephone lines. This kind of modem is normally provided by the Internet service provider
(ISP) in order to establish Internet access. This modem will connect either to a router or a
computer. Currently, some DSL modems have built-in wireless routers, which allow you to
connect to your DSL modem via Wi-Fi. A DSL kit typically includes a splitter that allows you
to connect to landline phones. This scenario works exactly like when you subscribe Streamyx
from Telekom Malaysia whereby you are given a kit consists of a DSL modem, a landline phone
148
and the connection to the Internet. The speed of the DSL modem in this case is really
depending on the package that you choose for your Streamyx.
A cable modem allows connection between a computer and a cable television service line.
The transfer rate is about 1.5 Mbps, which is a faster transmission speed than a dial-up
modem. In most cases, cable modems are provided and installed by cable service providers.
The current trend in communication is most devices are connected directly to a wireless
network. Therefore, wireless modems are built-in in laptops, smartphones and tablets for
this purpose.
Concept Check
Explain the function of a modem.
Based on types of modem, discuss their functions.
Give examples of Internet package offered by ISPs in Malaysia and the type of modem
they use.
149
In a wireless network, however, a wireless network card is used. Most devices today, for
example laptops and smartphones, have built-in wireless network cards. Other laptops or
notebooks may use wireless adapters slotted into the USB port of the device itself in order
to access a wireless network.
Routers
A router is a device that connects networks. It
is used to connect at least two different
networks. A router can be used in any scale of
networks. For example, at home, a router
permits several computers to be connected to a
high-speed Internet connection via DSL modem. Figure 5-16 Router
One example of this kind of service is Unifi
package offered by Telekom Malaysia.
Hubs
A hub is a device that has multiple ports. It is used to connect computers in a network. The
problem with hub is, it repeats the same messages coming into one port to all other ports in
the same network. This leads to a lot of data traffic and slows down a network. Hubs are
more suitable to be used in a small network. See Figure 5-17.
150
Switches
A switch is a central device in a network that controls the flow of messages. It transmits an
incoming message directly to a destination device. Switches are more suitable to be used in
a larger network. See Figure 5-17.
Communications Service
A leased line is a private line and normally a dedicated line to one company to transfer
data and voice. Leased lines are used by companies to connect distant location of branches
together. For example, Maybank may register to Telekom Malaysia for a leased line to
connect all branches of Maybank in Malaysia. In this case, Maybank has to pay some fees to
Telekom Malaysia either monthly or any term agreement.
A cable service is a service using coaxial cables provided by cable television companies.
These companies use their existing television cables to connect to the Internet.
A fibre optic service is a communication service that uses fibre-optic cables. An example
of company that operates fibre-optic services is Fibre Comm. Sdn. Bhd.
151
Cellular service providers support data and voice transmission to wireless devices. In
Malaysia, examples of companies that offer cellular services are Celcom, Maxis, Digi and U-
Mobile.
Concept Check
152
Bandwidth
Bandwidth is the amount of data that can pass through a communications channel in a given
amount of time. In other words, an Internet connection that has larger bandwidth can
transfer data much faster compared to an Internet connection that has smaller bandwidth.
Bandwidth is usually expressed in bits per second or bytes per second. There are several
categories of bandwidth, which are voice band, medium band, baseband and broadband.
• Voice band is also known as low bandwidth. It is only suitable to transmit small amount
of data that does not require a lot of bandwidth. Low bandwidth is used for ordinary
telephone communication and it can also transmit text documents. However, voiceband
is too slow to transmit audio and video data.
• Medium band is not only capable of transmitting high speed data but also capable of
transmitting data over long distances. It is used in special leased lines to connect
midrange computers and mainframe computers.
• Baseband is capable of high-speed transmission, but it can only carry one signal at a time.
It is useful for connecting individual computers that are placed near to each other.
• Broadband is widely used for Internet connections today. Broadband provides high-
speed data transmission, which can transmit a large amount of data at once and can be
accessed at any time. Broadband can be set-up via DSL, cable, fibre-optic and satellite
connections. Because it allows multiple channel connections, broadband is replacing
baseband, the single-channel technology initially used in most computer networks.
Furthermore, with broadband technology, a large number of messages can be transmitted
simultaneously. As a result, several users can use the same broadband at the same time.
A broadband Internet account can move data anywhere from 512 Kbps to 2,000 Kbps or
even more.
Network Protocol
A network protocol is a standard procedure and process for exchanging data or information
between computers through a network. There are many protocols for different kinds of
information and functions.
TCP (Transmission Control Protocol) and IP (Internet Protocol) are two different
procedures that are often associated together.
Each computer on the Internet has its own identification unique number known as an IP
address. An example of an IPv4 address is 195.160.1.2. The function of the Internet protocol
153
is to correctly relay the information between the sending computer and the receiving
computer by their IP addresses. Every information sent will have the sender’s IP address and
destination’s IP address. The information sent may go through several routers before it
reaches its destination. The Internet protocol will ensure that the information will arrive at
the designated destination.
IP address notation is actually derived from a domain name or URL which is a text-based
address. However, to remember the IP address is difficult. Therefore, a system that uses
Domain Name Server (DNS) was developed to convert the text-based URL to numeric IP
address. For example, whenever you enter the URL of IIUM (www.iium.edu.my) the DNS will
convert automatically to 10.1.2.94 before you can see the website on your screen.
Another related protocol to transmit sensitive data securely over the web is HTTPS. HTTPS
is an acronym for Hypertext Transfer Protocol over Secure Socket Layer (SSL), which was first
introduced by Netscape. A Web page using this protocol will have https: at the beginning of
its Web address. For example, of a website with https, see Figure 5-18.
154
Secure Sockets Layer (SSL) is a standard security technology for
initiating an encrypted link between a server and a client—typically
a web server (website) and a browser, or a mail server and a mail
client (e.g., Microsoft Outlook).
Concept Check
What is bandwidth?
What is IP and why it is needed?
Where HTTP is applicable?
Networks
A network is a collection of two or more computers connected to each other via cables or
wireless. A network allows computers to exchange data and information and share resources.
Resources can be software, hardware, files or facilitating any electronic communications.
Network’s setup can be different from one network to another based on the need and
purposes. See Figure 5-19 for a computer network illustration.
155
Figure 5-19 Computer Network
Sharing hardware
Users in the same network may share the same printer, scanner or fax machine. For example,
a department of twenty staff can configure one printer to be shared by everyone. The staff
may send their documents to the printer even though their computers are not connected
directly to the printer. This may save time because a user does not have to bring his/her file
to the computer that is connected directly with a printer. Another advantage is, it can also
save money as there is no need to buy many printers.
Sharing software
Users in the same network may share the same software. Moreover, they not even have to
install or download the software to their own devices. For example, in IIUM, staff and
students are using iTa’leem cloud (Integrated Teaching and Learning Environment System)
wherever they are as long as they are in networks. Furthermore, a group licensing price is
cheaper compared to buying a single license for one computer.
156
Facilitating communications
Network users may communicate with each other by using e-mails and other instant
messaging applications like Skype and WhatsApp. Even though different computers may be
running on different platform, they may still communicate with each other as long as they are
in the networks. For example, a smartphone using iOS can send a WhatsApp message to a
smartphone using Android.
Concept Check
What is a computer network? What are the resources involved?
Define some terms exist in a network such as node, client and server.
List the advantages of having a network.
Network Types
There are several types of network which are classified by the area of their coverage.
A personal area network connects devices that are close to each other or at immediate
surroundings, typically the distance is less than 30 feet. PAN is a wireless system and include
the transmission of data between devices such as smartphones, laptops, tablet computers
etc. For example, PAN may use Bluetooth to connect devices. In this case, PAN may connect
a smartphone to a car entertainment device. The driver may receive a call via the car
entertainment device instead of using his smartphone.
157
Figure 5-20 Personal Area Network
Another example is, PAN may also connect a tablet computer with a smartphone using
the smartphone’s hotspot. By connecting to PAN, a tablet user can access the Internet
through mobile data of the smartphone. (See Figure 5-20).
158
Wireless LAN (WLAN)
A wireless local area network is a LAN
without using cables. A WLAN is an
alternative to a LAN that uses Ethernet
cables. A WLAN is common in an office
or large campuses. In a WLAN
environment, wireless access point is
used. Any node that has a wireless
connection device such as wireless
network card will get into the WLAN by
receiving the broadcast signal from the
Figure 5-22 Wireless LAN (WLAN)
wireless access point.
For security purposes, a WLAN normally will need a strong password. This is to avoid
anyone from using the WLAN without permission.
159
For example, Telekom Malaysia provides Unifi service via fibre optic to users in Shah Alam
to access the Internet and Astro provides a cable television service via satellite for the whole
population in Kuala Lumpur.
Concept Check
What is a LAN?
What is the difference between a LAN, a WLAN and a HAN?
Why a WAN is said the largest Internet in the world?
Network Architecture
Network architecture describes the arrangement of nodes on a network (network
topologies) and how resources are coordinated and shared (network strategies).
Network Topologies
Network topology refers to the physical set-up of all nodes in a network. The arrangement
can be in several ways. The most common network topologies are as follows:
Bus Network
Each node in this network is connected to a
backbone cable or a bus. All communications will
pass through this bus.
160
Ring Network
All nodes in this network are connected to one
another in a circle. Data is passed from one node
to another node in one direction until it reaches
the destination node.
Mesh Network
Every node is connected to one or two other
nodes in the same network (partial mesh) or
every node is connected to every other node (full
mesh). This results in a greatest redundancy. In
the case where one node fails, the network
traffic can still be directed to any other node. A
Mesh network is normally implemented in a
Wireless LAN.
Figure 5-28 Mesh Network
Hybrid Network
In this network, two or more different network
topologies are combined. It includes both wired
and wireless network. This network provides
greater flexibility whereby a lot more computers
are connected to the Internet.
161
Network Strategies
Network strategies refer to how resources are coordinated and shared in a network. There
are two common network strategies, which are Client/Server and Peer-to-Peer (P2P).
Client/Server
In a client/server network, one or more nodes (clients) are connected to a central computer
called a server. The clients request from the server and the server, also known as host
computer, provides resources.
The disadvantages of client/server are the high cost in the implementation and
maintenance purposes.
162
Client/Server strategy implementation commonly exits in LAN,
MAN and WAN environments. In these environments, servers
provide services or information to clients (devices) in the networks;
or clients also can request services from the servers.
Peer-to-Peer (P2P)
In a peer-to-peer network, all nodes have
equal authority. The same node can be a
client and a server. In a P2P, two or more
computers are connected directly with no
centralized server. All computers may share
software and peripheral devices connected to
any computer.
Concept Check
What is a network strategy?
Discuss the advantages of Client/Server network.
Why peer-to-peer (P2P) network is not recommended in a big company?
Organizational Networks
Different organizations have different ways of setting-up their networks including what
operating system and applications are used, how to manage the resources and who can
access the network. The organizational network is sometimes influenced by the type of
businesses that the organizations do. Many organizations set up Internet technologies
163
networks in order to have effective and secure communications internally (within the
organization) and externally (with other organizations).
Internet Technologies
Internet technologies are networks based on IP addresses. Data are sent to a destination
computer based on the IP address of the computer. Two common Internet technologies are
intranet and extranet. They are used by many organizations in order to secure and support
their operations.
Extranet is a private network that connects more than one organization. Basically, the
organizations are connected due to business reasons, for example, between manufacturers
and suppliers, vendors and customers, and business partners. The network connection and
access are highly secured and only limited information is shared. For example, Proton may
share its schedule of the next coming car model to be manufactured with its suppliers of tyres,
paints, engines etc. With the sharing, the suppliers can get ready with their products, and
make the business more efficient.
Network Security
Network security refers to any procedure taken to protect a network from unauthorized
access, misuse, unavailability, threats, data tamper and inaccuracy and so forth.
Implementation of network security can be done through hardware and software. However,
it is really a challenge to an organization to protect its networks especially when the networks
are located at different geographic locations. As such, an organization may require different
methods of protections. The following are three common network securities that can be
applied to protect a network which are firewall, intrusion detection systems (IDS) and virtual
private network (VPN).
164
Please note that the
main difference
between firewall and
IDS is, the former
performs actions such
as blocking or filtering
of traffic, whereas,
the latter detects and
alert a system
administrator to stop
the suspicious attack.
(See Figure 5-32). Figure 5-33 Firewall and Intrusion Detection System (IDS)
activities
A firewall basically monitors and controls the incoming and outgoing network traffic based
on presetting rules. For example, a company may limit the size of an attachment file from an
incoming e-mail. If the size of the file is greater than the set rules, the e-mail will bounce back
to the sender. A firewall can be hardware-based or software-based or both. A firewall should
be placed at the first line of defense in any network. (See Figure 5-33).
An intrusion detection system (IDS) is a software or hardware that analyses all network
traffics. In this case, all devices that connected to the network are being monitor by the
system (IDS). If there is any suspicious activity or abnormal behaviour which not follow the
setting as per configuration, the system will alert the system or the network administrator.
Once receive the alert, the network administrator can take an action such as broadcasting the
warning message to the entire network’s devices (although by right, the network
administrator knows which device (IP) is doing that) or block the activity. If the alert goes to
the central system, the log will be used to investigate either malicious activity is going on or
false alarm. IDS should be placed after the firewall. (See Figure 5-34).
165
Figure 5-35 Intrusion Detection System
The following are suspicious network activities or abnormal behaviour that can capture
by an IDS:
• A desktop is downloading a very big video file during office hours. This mean the
employee involved are doing something else and not focusing to his work.
• Malicious software such as trojan horses attack the network or a node. IDS detects
pattern or number of bytes in the network is not as usual.
• Unauthorized clients and software. For example, an employee cannot access a payroll
system but trying many times by guessing a password to access the system.
These credentials will be encrypted and passed through the immediate network to the
VPN server (NAS) in the organization side to verify the client. If the credentials are valid, the
gateway for the VPN will open, and the client can access the organization’s network as if they
are physically connected.
166
Concept Check
ISLAM AND IT
Allah SWT has given aqal or mind to mankind that allow man to create powerful network
devices for communications in the world. Communications and networks allow human to
keep in touch in order to strengthen the relationship of brotherhood in Islam using various
applications that are available on the Internet.
167
SUMMARY
The concept of computer communications means the process of sharing and transferring data
and information among two computers or more. Communications systems are electronic
systems that exchange data from one location to another location either wired or wireless.
There are four basic elements involved in a communications system including sending and
receiving devices, communications channels, communications devices and data transmission
specifications.
A network is a collection of two or more computers connected to each other via cables or
wireless that allow them to exchange data and information and share resources.
Common types of network are Personal Area Network (PAN), Local Area Network (LAN),
Wireless LAN (WLAN), Home Area Network (HAN), Metropolitan Area Network (MAN) and
Wide Area Network (WAN). Network architecture includes network topologies and network
strategies. Network security is any procedure taken to protect a network and the
implementation can be done through hardware and software.
168
GLOSSARY OF KEY TERMS
Backhaul – A second or subsequent microwave link in WiMAX technology.
Base Transceiver Station (BTS) – telecoms infrastructure used to enable wireless
communication between subscriber mobile and telecoms operator network.
Cell – A network area. Coverage area that allows a mobile to make and receive a call, or have
access to the Internet.
Cellular phone – mobile phone, cell phone, smartphone or sometimes people just call it as a
mobile. This type of phone can be accessed via radio wave technology.
Demodulator – is the device that converts from analog signals to digital signals.
Domain Name Servers (DNS) – are the Internet's equivalent of a phone book. They maintain
a directory of domain names and translate them to Internet Protocol (IP) addresses.
Ethernet cable – twisted-pair cable widely used in networks and to connect a variety of
devices to the system unit.
Handshake – when one device sends a message to another device indicating that it wants to
establish a communications channel. The two devices then send several messages back and
forth that enable them to agree on a communications protocol.
Host computer – A device in client server network that control all resources, hardware and
software on the network. And also, as a centralize storage for files and applications.
IEEE – The Institute of Electrical & Electronics Engineers. It was formed in 1963 in USA.
iTa’leem - iTa'leem stands for Innovative Teaching and Learning Environment System. This is
IIUM e-learning platform. Currently the application is use under Cloud Computing.
Modulator – is the device that converts from digital signals to analog signals.
Network Administrator – is responsible to coordinate and maintain an organization's
computer network up to date and running smoothly. Any organization that uses multiple
computers or software platforms needs a network administrator to coordinate the different
systems.
VPN client software – A software that install or configure on remote employee’s computer,
in order to allow the employee to access the company’s server(s) from a remote location.
169
PRACTICES
Multiple-Choice Questions
B. Two D. Four
2. Which statement below does not mention in this chapter regarding advantages of having
a network?
A. Facilitate communications C. Hardware sharing
B. infrared D. microwave
B. Cable D. Wireless
5. What is the name of a communications device that broadcasts radio signal to other
wireless devices in order to access the Internet?
A. Wireless modem C. Wireless access point
170
6. This device repeats the same messages come to one port and to all other ports in the
same network.
A. Hub C. Switch
B. Router D. Modem
9. Network security is any procedure taken to protect a network from the followings EXCEPT
A. accuracy C. destruction
10. Bus, ring and star are three categories of network __________,
A. nodes C. strategies
B. protocols D. topologies
1. A __________ is a device that connects network. It is use to connect at least two different
networks.
2. This type of cable widely used for cable television network to deliver television signal.
Name this cable: ____________.
171
3. __________ was created based on IEEE 802.16 standard with maximum speed of data
transfer can reach up to 70 Mbps.
Discussions
1. Find any advertisement from any ISP regarding their Internet services. Based on your
knowledge of this topic, discuss about their services from several perspectives like
capacity data transfer or bandwidth, data transfer rate, devices used, price rate per
month, per week and so forth.
2. Discuss three categories of bandwidth which are voice band, medium band and base
band. State the similarities and differences among them and with broadband too.
3. Based on any network type, describe on its network topology and the strategy that it may
use. Include any network security if applicable.
172
57.
58.
59.
60.
61.
62.
63.
64.
65.
PRIVACY, SECURITY,
AND ETHICS
66.
67.
68.
69.
70.
71.
72.
73.
74.
75.
76.
77.
78.
79.
80.
81.
82.
83.
84.
LEARNING OUTCOMES
At the end of this chapter, you should be able to:
• Explain privacy and security issues in using computers
• Describe computer criminals (cyber criminals) and computer crimes (cybercrimes)
• Discuss issues on computer security
• Describe the security measures required
• Understand ethical issues from both general and Islamic perspectives
Introduction
Computers are used extensively for making our life easier and more productive. At present,
the Internet connection becomes so important to complete various tasks that relate to works
and social communications.
Privacy
Have we ever questioned about our privacy while using our computers? Have we ever
questioned about the safety of giving our data to government agencies or other companies?
Sometimes we wonder how we can get offer letters to further our studies in some certain
private colleges. How did these colleges know that we had just finished our SPM and planned
to further our studies?
174
Privacy in this chapter refers to the right of individuals and companies to preserve and
protect their data especially electronic data from the access of third parties. Privacy is
essential. Losing our privacy means losing our personal power. Thus, privacy means the ability
to control when, how, and to whom our personal information is used.
Concerns
There are three main concerns on privacy, which deal with accuracy, property and access.
• Accuracy refers to how accurate and correct the recorded information.
• Property refers to simply about the ownership of the information. Once a person
gives his information to a certain department or agency, can the department or
agency consider that the information belongs to them? Can they share the
information to any other party?
• Access refers to the right of accessing the information. Is there any limitation on who
can access the information?
Figure 6-2 shows a scenario on privacy that deal with accuracy, property, access, and its
consequences.
Data Collection
In the past, data collection is easier to maintain because individuals, organizations or
departments maintained their information. For example, each retail store has its own credit
175
files, a government maintains separate records it owned, and doctors had their own patient
files. No one can access the data without authorization.
Large Databases
Today, these data collections are stored online and centralized for easy access by individuals
or organizations. A department links its data with the data from other departments by using
certain keywords or unique identifiers such as the identification card number or passport
number. The data linkages create large databases including large electronic profiles/digital
profiles. The large databases of electronic profiles include personal details such as age,
address, telephone number, spending habits, personal interests, marital status, number of
dependents, age of dependents, education history, medical history and so on. These personal
data are confidential and accessible by authorized users. However, many individuals and
organizations questioned whether these data are really private.
Information Brokers
Information brokers refer to people who collect and analyze such personal data. They use
data available from large databases or data available publicly to create electronic profiles.
Then, they sell the electronic profiles to advertising and marketing company that actually
expose our privacy. Sometimes, it is annoying to receive a message in the middle of the night
from the ads that we do not need.
176
However, this application also allows other
people to misuse it for committing crimes or
bad things. People could observe their targets
for some time and set plans for bad actions
such as robbing.
Figure 6-4 and figure 6-5 show some pictures taken somewhere in housing areas and
Medical Centre IIUM at Kuantan campus that we can get from Instant Google Street View.
Figure 6-4 A view in a housing area from Instant Google Street View
177
Figure 6-5 A view on a medical centre from Instant Google Street View
Drones
Another popular example on this matter is the use of drones as shown in Figure 6-6. Similar
to Google’s Street View, drones are widely used by some governments and companies to take
pictures, record panoramas, monitor activities on certain areas and then send the data to the
cloud.
Online Identity
Online identity is known as Internet identity. It refers to any data associated with websites
usages. As long as we use the Internet, we will have online identity. Whatever details to
identify us in any Internet communities and websites either within our consent or without
178
our consent are our online identities. It is within our consent when we deliberately filled in
forms to subscribe magazines, returned products’ warranty registration cards, or simply
entering contests. It is without our consent when we do not realize our websites surfing are
somehow expose our online identities that include our interests/hobbies, online transactions,
online shopping, online calendar (schedules/time spent), etc. Companies/other parties that
keep our online identities are able to sell the contents of their database to national marketing
firms and internet advertising firms without our knowledge/consent. This is called spreading
information without consent. Some internet community like Facebook do ask our permission
to allow them to access our emails. Since we need to have Facebook accounts, we do agree
with the terms and conditions. However, the limit they can access our data is still vague. By
right, companies should inform people if they plan to provide personal information to others,
and people should have the rights to deny such use. Many companies today allow people to
specify whether they agree if their personal information is to be distributed.
Therefore, online Identity is the information that people voluntarily post about
themselves online such as in social networking, blogging, and photo and video-sharing sites,
plus the information from any online activities. The intimate details of lives shared between
friends and the online activities could cause future consequences because the archiving and
search features of the web make the information available to anyone who cares to look.
Mistaken Identity
Spreading inaccurate information is known as mistaken identity. Collection of electronic
profiles about someone’s personal data may be mistakenly recorded as belongs to other
people. Pictures of two peoples maybe similar to each other. Names of two people may be
the same. Only the identification card numbers are different. Therefore, a wrong Identity
Card number recorded by a police officer would end up with a wrong person goes to prison.
This is called mistaken identity.
Threats
Privacy issues may lead to threats that often create danger to people. Basically, there are
two kinds of threats in using computers:
• threats from Web
• threats from network.
179
Threats from web
Threats from web are also known as web threats. A web threat is described as any threat that
makes use of the World Wide Web to promote cybercrime. Web threats use various kinds of
malware to get information using http or https protocols and other protocols such as email
addresses. Whenever we access a web site or an email address, cookies and web bugs can
enter our computer system without our knowledge to steal information such as online
banking details which cause money transfers to unknown parties.
Cookies
Cookies are small pieces of information that are stored on users’ computer hard disk from
visited websites. The purposes of cookies are to keep track user preferences, store user
passwords, keep track of items in users’ shopping sites, track how often users visit a site and
the web pages they visit while at the site, and target for advertisements. There are two types
of cookies: first-party cookies and third-party cookies (tracking cookies).
First-party cookies refer to small amount of texts stored in users’ computers created
by the current visiting websites. All web browsers allow first-party cookies unless users
disabled these first-party cookies.
180
Figure 6-7 First-Party Cookie Verses Third-Party Cookie
Web Bugs
Spyware
Spyware is a program placed in a computer without the user’s knowledge which secretly
collects information about the user’s computer activities and sends back the information to
companies. Employee monitoring software and keystroke logger are examples of spyware.
181
Employee Monitoring Software
Employee monitoring software allows employers to observe, record, and review employees’
use of computer, including all kind of communications through e-mail messages, keyboard
activities (used to measure productivity), and web sites visited. See figure 6-8 on how an
employee monitoring software called SONAR Interguard work. This is mainly to help keep the
employees focused on their tasks. With this software, the employer may even get to know
the employees’ personal matters which are not related to the work at all as shown in figure
6-9. This monitoring can also give threats to employees such as making harder for the
employees to get promotions. Table 6-1 presents a list of best employee monitoring software
in 2021.
182
Figure 6-9 Capabilities of SONAR Interguard
Best for sophisticated monitoring needs Best for broad monitoring and tracking
needs
Best for managing remote workers Best for deep monitoring, productivity
tracking, and scoring
Best for monitoring remote workers and Best for SMB tracking and monitoring
analyzing productivity
Best for enterprise users requiring on- Best for monitoring with
premises installs cybersecurity
183
Concept Check
Security
Definition
Security is also known as cyber security or IT (Information Technology) security. In using
computers for jobs and other activities, sometimes we do not alert about the threats and risks
that may do harmful or distractions to our computer system. Surely, we want to protect, to
limit, and to prevent our hardware, software, and files from being accessed by other people
without our knowledge and permission that may cause theft and/or damages.
Threats
We need to be alert about security threats coming from computer criminals. These criminals
are involved in computer crimes and may have access to our data, software and hardware for
their benefits. We also need to be aware about the ongoing computer threats and hazards
due to climate, country’s political condition, and human carelessness.
Computer Criminals
Computer criminals refer to potential people who have or may not have authorized access to
our computer system and can take opportunities for their own benefits or satisfactions. They
include the following categories of people:
Hackers
Hackers are people who gain unauthorized access to our computer system, either for fun or
for vulnerable checking. Normally they do not do any harm to the computer system.
However, it is still violating people’s right for accessing their computer system without
consent.
184
Crackers
Crackers are people who gain unauthorized access to our computer system for bad intentions,
such as to gain profits and to crack a system. Crackers are dangerous compared to hackers.
By standard law, crackers are criminals to be put behind bars.
Employees
Employees are people who work in a company and have access to customers’ and company’s
information. Untrustworthy employees can betray the company by selling information about
customers or the company.
Terrorists
A group of people who get unauthorized access and control of computer systems to achieve
their political aims is referred to as terrorists. Terrorists normally target the countries’ rulers
and the chief police officers. However, their attacks affect deadly to the society and public
properties as shown in Figure 6-10.
Figure 6-10 Houses and area were damaged after terrorist attack
185
Computer Crimes
Computer crimes or also known as cybercrimes are criminal offenses that deal with
computers and networks. In other word, a cybercrime refers to any crime conducted through
the Internet. It has becoming a fast-growing crime type. More and more criminals commit a
diverse range of crimes without border that harm or threat people in all over the world. Here
is a list of some computer crimes.
Viruses are small programs deposited our devices to infect files either to slow down the
processing or to alter the system functionalities. The target is normally on the executable
files but other files may also be infected. Once a virus enters a hosted file, it will only react
when the file is executed. It can also start to react based on a certain condition such as a
specific date.
• Worms are small programs entered our computer to get our computer and other
connected computers stuck and gradually stop working. Unlike viruses, worms do not
infect files. Once worms get into our computers, they will keep duplicating themselves
and spread to other computers through some communication channels such as emails
or instant messaging.
• Trojans or Trojan horses are type of malware, which often seem as legal software.
They can be any malicious program that represents itself as a useful and an interesting
program like antivirus program. Unlike viruses and worms, Trojans do not self-
replicate. By some tricks, Trojans loaded and executed on computer system. They
normally become spies, get data, and gain illegal access to the computer system.
186
often crash, have bounce-back e-mail messages, take longer time to shut down or
restart, receive unexplained error messages, or suddenly close web browsers. Many
zombies become botnets.
Internet Scam-Phishing
Internet scam - phishing is something good offered to trick people into spending their money
or information. Normally, it involves fake online selling from either a fake website or a fake
advertisement on a legal retailer site. This scam is done by scammers who use e-mails, ads,
and/or pop ups. An online dating website can also be a part of scam.
187
Rogue Wi-Fi Hotspots
Rogue Wi-Fi Hotspots are the Wi-Fi Internet connections that look like the connections are
owned by certain shops or restaurants or hotels for their customers’ use. However, these
connections are belonging to some criminals or hackers. Once the user gets into a rogue Wi-
Fi hotspot through Rogue Access Point (AP), these hackers can access the data. AP is the
device that provide Wi-Fi. See figure 6-12.
Data Manipulation
Data manipulation refers to the ability to alter data in applications and databases for some
targets either for profit gain or for fun. Crackers who do not have permissions to access the
data can do alteration of data. Sometimes, data manipulation becomes more dangerous
when the crackers request some ransoms before releasing the original correct data. Even
when the hackers did it for fun, the chaos produced is greatly dangerous to the victims.
188
Cyberbullying
Cyberbullying is a new form bullying in this digital era by using computers, tablets and/or
smartphones. It can humiliate and insult the person throughout days and nights. The
humiliation leaves permanent bad effect to entire life of a person especially a child. Some
children were so stressed that they ended up to committing suicides. Figure 6-13 shows some
example of cyberbullying. Once the humiliations become viral in digital devices, it is hard to
erase. The parents and teachers normally are not aware of this cyberbullying for it is hard to
detect unless the children explain about it. Cyberbullying rate is getting higher as the world
is getting more advanced in information technology.
189
Other Hazards (Natural Hazards, Technological Failures, Human
Errors, Civil Strife)
Other hazards can be disasters due to
“mother nature” or nature stability of a
country. Sometimes, the hazards may
cause by the computer technical failures,
the carelessness of administrators, and civil
strife. Natural hazards happen due to
extreme climates or events such as
earthquakes, flood, thunder and lightning,
fire or huge waves as in Figure 6-14. These Figure 6-14 Flood in Malaysia
events normally have bad effects to the
regions and the people in the form of loss of lives or properties including data, software and
hardware.
Technological failures include damaged cables or failure of electrical supplies that can
lead to the loss of data, software and hardware.
Civil strife refers to a situation of disorder society or disorder government that may
involve riots, sabotage, demonstrations made by certain groups to bring up certain rights and
issues in a country. Sometimes, it ends up with killing of many lives or other crimes.
190
More hazards or disaster causes are listed in Figure 6-15 below.
Security Measures
Despite of all the computer threats, there are various ways for the computer system to be
secured or protected. The protection should cover data, software and hardware, plus
network activities. Preventions also play as important parts of security measures.
Access Restrictions
We can restrict access to our computer by having a password. A strong password normally
consists of combination of letters, symbols, and digits. A password should not represent any
of obvious information about a person or related information to the person. However,
hackers may sometimes be successful in accessing or penetrating a system after thousands of
attempts by using a dictionary attack software to guess a password of a computer or a file.
Other than a password, biometric scanning devices, such as in Figure 6-16, are used to
detect fingerprints, voices, and iris to restrict access to a computer or a data file. Access
restrictions may also include free parental control software available for personal computers
and handheld devices, which are capable of recording keystrokes, being alert on coming
emails, and blocking access to websites and programs.
191
Figure 6-16 Biometric Scanning
192
Encryptions
No matter how hard we try, sometimes hackers and crackers can still get access to our data
in our computer or our activities in the Internet. Another solution to secure our data is to
make the data difficult to understand by having encryptions.
193
using other storage devices, which are located in other safe places. Normally, the other safe
places are about 15 kilometers away from the original locations. This includes the usage of
cloud storage. Figure 6-19 Disaster Recovery Plan
A disaster recovery plans will also train the employees on how they should continue
operating until the disaster is over. An incident of disaster still allows business continuity of
an organization. Overall, a well plan of disaster recovery deals with preparedness, response,
recovery, and mitigation as shown in Figure 6-19.
Computer Ethics
We expose to threats and dangers from computer usages that can cause chaos in our life.
None or less of these may happen if every user knows the ethics in using a computer. Ethics
refer to the standard moral conduct, which will guide a computer user in his communication
that may affect his and other people’s lives. It is an acceptable behavior or acceptable activity
while using a computer. Ethics is not the same as laws. A law is compulsory to be followed
whereas ethics is optional. It is considered as a crime in law when people disobey the imposed
laws whereas it is considered as an immoral conduct in ethics. An example of law protections
is on copyright.
Copyright
Copyright is the right of a person’s Intellectual property that covers patents, trademarks,
industrial designs, writings, recordings, drawings, geographical indications and layout designs.
Refer to Figure 6-20 for copyright activities. There is a law on copyright that protects a
person’s work on literary, musical or
artistic protects throughout his life and 50
years after his death. For sound
recordings, broadcasts and films, the act
protects 50 years after the works
published. The act also has the power to
arrest (including without warrant), enter
premises suspected of having copies,
search, and stop transgressing copies and
projects.
Figure 6-20 Copyright Activities
194
Nowadays, a company must have careful screening into the background of its workers.
The incident of transferring money from customers’ accounts into a bank officer’s account
should be a great lesson for all.
People who practice religions, which encourage people to do good deeds in this world,
may find easier to follow ethics. They are more trusted since they believe that God see them
at all time. Therefore, they will never do things that are not ethical. Is it ethical? Questions
like this will always be in their hearts before they proceed with any action. Sending false
messages to other people or silly jokes in our Facebooks is unethical since we are telling sort
of lies and taking another people’s time. There are three types of unethical actions:
Plagiarism, Software Piracy and Digital Piracy.
Plagiarism
Any act of copying someone’s ideas or writings or works and considered them as our work
without giving any credit to the owner is called plagiarism. For an example, someone’s
writing who simply copied the writing from other person is definitely consider as plagiarism.
Cut and paste information and images from a digital source or a writing is also plagiarism.
Students prone to plagiarize in their writings and presentations. Refer to Figure 6-21. To
avoid plagiarism, one can quote or cite the references from the sources of information.
195
Software Piracy
Any act that involves in downloading or copying, distributing and selling computer software
(SW) are known as software piracy or pirated software. Software piracy allows users to enjoy
using a software for free or small fee without credit to the software owner as shown in figure
6-22.
Digital Piracy
Any act that involves in downloading or copying online copyrighted content such as music,
pictures, videos, movies, games, books or software that belongs to other people or
companies, are known as digital piracy or online piracy. These actions include:
• changing the setting of downloaded software.
• downloading/copying digital content from a friend or internet who bought it either
for free or small token.
• Taking digital content from peer-to-peer networks or file-sharing servers and copying
it.
• Buying digital content from the one who get the content without permission and sell
illegal copies.
You may not see your victims when you download illegal content or share copyrighted
content with others, but digital piracy robs millions of people of their hard-earned money.
Hopefully, this chapter make us realize about the do and do not that we should do or
avoid. The chapter also revealed about the danger that we will face while using the Internet.
Moreover, the Internet makes the relationship among people sometimes turn out to be very
bad since fake news may spread easily. Overall, the good and bad things related to the
Internet are also related to trust especially in God.
“O ye who believe! If a wicked person comes to you with any news ascertain the truth,
lest ye harm people unwittingly and afterwards become full of repentance for what ye
have done.”
“By time, indeed, mankind is in loss, Except for those who have believed and done
righteous deeds and advised each other to truth and advised each other to patience.”
Somehow, it makes us realize about the threats and dangers that we may face in
reality. These scenarios make us feel the existence of Allah swt at all time. For He is watching
us, listening to us, and knowing us, that make us submit to Allah swt in all our actions.
Connected to the Internet may provide chances for other people to know about our data. It
is to the extent that it can do harmful to our computer and our life. This is the difference
between Allah swt and the Internet. The feeling of the existence of Allah swt make us
becoming more and more pious to Allah swt. We may ask Allah swt to help us and we may
have revealed to Allah swt whatever good or bad matters we want to. Nevertheless, the
feeling of insecure when using the Internet makes us be more careful and worry about our
data. None can give us better protection except Allah swt.
197
Surah Al-Asr guides us on how to use our time wisely for greatest rewards from Allah
swt. Long lying chat is not permitted for it is not the truth and a righteous deed.
SUMMARY
This chapter exposed us to privacy, security and ethics when using our computer. We learned
about how our privacy when using the Internet may reveal to other people. We normally
think that nobody knows about whatever we do with our computers. Next, the chapter
explained how to secure our data, hardware and software. Here, we know that password is
not that strongly secure our data and computer systems. There are more ways to secure data.
Lastly, this topic discussed on attitudes or behaviors that we should practice in
communicating and using the computer and the Internet. Islamic moral conduct is one
religious practice that help people to live in harmony and respect others’ works including
intellectual properties.
198
GLOSSARY OF KEY TERMS
Access - The authorized person to use the information
Accuracy - The level of correctness in information records
Civil Strife - a situation of disorder society or disorder governments that may involve riots,
sabotage, demonstrations made by certain groups to bring up certain rights and issues in a
country.
Computer criminals - People who have unauthorized access to our computer system.
Copyright - The right of a person’s Intellectual property that covers patents, trademarks,
industrial designs, writings, recordings, drawings, geographical indications and layout designs.
Cracker - People who gain unauthorized access to our computer system for bad intentions
such as gain profits and crack a system.
Cyberbullying - A new form bullying in this digital era by using computers, tablets and/or
smartphones to humiliate and insult people.
Data Manipulation - The ability to alter data in applications and databases for some targets
either for profit gain or for fun.
Denial of Service Attack - An attempt to prevent legal access to the Internet by making lots
of traffic congestions in computer network
Dictionary attack - Software for guessing a password in a computer or a file.
Digital Piracy - Activities to download digital content such as software, music, movies, e-
books, games to use, to distribute, to share with others people or to sell with low prices.
Drones - Small flying machines with cameras to take pictures, to record panoramas, to
monitor activities on certain areas and then send the data to the cloud
Electronic profiles - Personal information on individuals in computers’ memory
Employee monitoring software - A kind of software that allows employers to observe, record,
and review an employee’s use of computer
First-party cookies - Cookies that provide information to a single site.
Google’s Street View - A web application to view and explore places around the world
Hacker - People who gain unauthorized access to our computer system, either for fun or for
vulnerable checking.
Illusion of anonymity - An assumption that people are safe with his/her computer and no one
know about his/her computer assessing activities.
Information brokers - People whose business is buying and selling online information
Internet Scam / Phishing - Something good offered to trick people into spending money or
information.
199
Keystroke logger/ keylogger - System monitor that keep track of what user keyed-in not only
on computers’ keyboards, but also on smartphones.
Large databases - Collection of huge amount of information
Malicious software - Small programs installed in our computer or our mobile devices without
us knowing about them to crash or control our devices or to keep track our internet activity.
Mistaken identity - The incorrect records of data make someone identity resembles someone
else identity.
Natural hazards - Threats due to extreme climate or events such as earthquakes, flood,
thunder and lightning, or fire.
Online Identity - The information that people voluntarily post about themselves online.
Organized crime group - A group of people who have trainings to get certain valuable
information from computer systems for illegal profit gain.
Plagiarism - Any act of copying someone’s ideas or writings or works and considered them as
our work without giving any credit to the owner.
Privacy - The right of individuals and companies to deny or restrict the collection and the use
of information about them.
Property - The ownership of the information
Snoopware - A monitoring software in mobile applications to observe, record and review a
user’s mobile device.
Spam - The unsolicited mail that is being sent to many recipient and newsgroups at once.
Standard moral conduct - A guide for a computer user to communicate that may
affect his and other people life.
Third-party cookies - Cookies that record your activities across different sites.
Trojans or Trojan horses - A type of malwares, which often seem as legal software loaded and
executed on computer system.
Viruses - Small programs deposited to infect files either to slow down the processing or to
alter the system functionalities of our devices.
Worms - Small programs entered our computer to get our computer and other connected
computers stuck and gradually stop working.
Zombie - A computer controlled by rogue hackers to perform denial of service (DOS) attacks
and to spread email spam and malware.
200
PRACTICES
Multiple-Choice Questions
1. Malware stands for malicious software. They can secretly enter a computer system once
you are connected to the Internet. Their purposes are as follow EXCEPT
A. crash the computer system
B. threat the computer user
C. control the computer devices
D. monitor the computer activities
4. Adam lost his wallet that contains enough information about him for a person who found
it to open a credit account under his name. The above situation is
A. scam
B. fraud
C. forgery
D. identity theft.
201
5. Which of the following is NOT a recommended on-line activity?
A. Phishing
B. Blogging
C. Shopping
D. Webcasting
6. Which of the following is the activity that find entry into someone else computer network
and change the data or leave some strange messages?
A. Hacker
B. Cracker
C. Data manipulation
D. Denial of service attack
8. Which of the following is an ethical conduct while using computer in the lab?
A. downloading movie and songs
B. sharing copyrighted software
C. install open source application
D. viral sensational issues of a friend
9. This type of cookie usually generated when you visit a website. The website uses the
generated cookie to record information about your current activity on the website. This
cookie is
A. first-party cookie
B. second-party cookie
C. third-party cookie
D. tracking cookie
202
10. Which of the following is an ethical conduct while using computer in the lab?
A. downloading movie and songs
B. sharing copyrighted software
C. install open source application
D. viral sensational issues of a friend
1. People always think they really have their privacy in accessing their computers. Actually,
they do not have total privacy. This is called ____________________________________.
2. Unwanted emails coming from unknown people or organizations are called __________.
3. This software does not harm the computer directly. But it is a carrier of other malware.
The software refers to _______________________________.
4. A way for an employer to get to know about the workers’ activities during office working
hours is by using a software called ___________________________________ software.
5. Not all cybercrimes can be solved with the Computer Crime Act in Malaysia. Some
cybercrimes can be addressed by Malaysia civil law called_______________________.
Discussions
1. As a company owner, you really would like to increase the company’s productivity at all
time. You need to make sure about the safety of all company’s asset such as computer
data and hardware. You also emphasize on integrity. You need to decide for the total
security of your company. Discuss on safety actions.
2. A woman found dead in her house after her neighbor called the police. The neighbor saw
the house gate, the car door, and the front door of her house widely open since late
afternoon. After an investigation, the police found out that the woman was a heavy
Facebook user. Her last update in her Facebook about her driving home. The police took
this matter into investigations. Discuss about Facebook issue in privacy and security.
203
3. Biometric scanning is one of popular ways to restrict access to a computer system. People
start to use their fingerprints or voice to activate their computer. Discuss about the
advantages and the disadvantages of biometric scanning. Is it safe? State your reasons for
your answer.
4. When our private data, information, and photographs exposed to public without our
consent, legally, what can we do? Discuss to solve the issue.
204