Application and Implication
Application and Implication
Modern Communication
Smart Phones
Tablets
Many of us are unaware of the movement of data (Data communication) and connection of many
computers that allow us to communicate quickly, at any time, and anywhere.
First! Just as we communicate (talk, interact, share, touch...) in pairs or among several other
people, data communication involves the movement or transmission of data or information
between two computers, or among several computers.
Now when we have many computers connected together to share data, it is called a network.
Why do we want to connect computers? To share data, to send and receive data faster, and to
share peripherals (like printers).
The office buildings in a WAN may be in different countries. For example, the
main branch or headquarters may be located in the USA, while another
branch may a building in Dominica, and a third branch may be in a building
Singapore. The workers in the three buildings will therefore use a WAN to
collaborate with each other. Note that the Internet can also be considered as
a WAN.
Watch this video to understand the difference between a LAN and a Wide
Area Network (WAN)
Metropolitan Area Network (MAN)
This is video explains the LAN, WAN and the Metropolitan Area Network
(MAN)
Network Topologies
Networks can be connected with or without the use of wires. How they are connected is called
a topology.
Name of
Advantages and Disadvantages
Topology
Advantage
Advantage
Star topology
Disadvantage
Advantage
Any data transmitted between two devices must pass through all
intermediate nodes. A central device (server) is not necessary for
Ring topology this topology.
Disadvantage
If a single node in the network fails, then this can cause the entire
network to fail.
The Internet is really a Wide Area Network (WAN). Many text books will describe it as a
network or networks. So it is able to connect all computers all over the world. Let's take a peek
into what some of the networks in rooms, buildings, companies and countries who are connected
to the Internet could possibly involve:
Cable/Wired Media
Three common types of cabled or wired media are used of the data transmission. The type of
wired media used depends on distance and type of network. The three types of wired media that
will be discussed are explained below:
Bluetooth
Bluetooth is a type of radio communication and networking protocol combined that was
developed so that devices close to each other could exchange data, without having a physical
connection. Having a wall between them does not affect the connectivity.
Advantages of Bluetooth:
It only needs a tiny amount of radio power to work. This means it is ideal for battery
operated devices such as mobile phones.
It is completely automatic - once it is active, every Bluetooth enabled device senses the
presence of another device within range. They can do this because they share a 'network
protocol' that allows them to share data.
WIFI
Wi-Fi is a communication technology that uses radio waves in order to connect to a local area
network. So, laptops and smart phones can connect to Internet when they are not close to cables
to connectivity.
Since Wi-Fi based on radio waves it is affected between devices. For example, at home the base
for the Wi-Fi might be downstairs and so the signal upstairs may be very weak.
The most important question of communication channels is "How much digital data can it carry".
Remember that the smallest form of digital data is the BIT and time interval to send these bits is
in Seconds
What is the maximum amount of digital data that can travel along a communications channel in a
given time?
Digital data can travel very quickly or really slow over a communications channel. That is, the
bandwidth varies
Communication Modes:
Simplex
FULL DUPLEX
The Internet
Remember that the Internet is a 'network of networks', so it includes a very large maze of
networks. The Internet can be accessed by the public (everyone, including you!).
'The Internet is the largest computer network system in the world. It consists of many smaller
networks connected together by a global public network. The Internet is often called the
information superhighway or cyberspace.'
The are very few restrictions on users who can access to the Internet, so there can be access
among many organizations and users throughout the world.
Intranets
An intranet is a private network that is only available or accessible to select users within a
specific group. So, an intranet restricts access to only employees within a company or business.
Examples:
A school may have an intranet so that students and teachers and office staff and
administrative staff can work and share files and peripherals within the school
environment. Once they are not logged in at school, they cannot access the intranet.
A company's employees can access the company's intranet to do their work, share files
and peripherals. If you are not an employee, then no access!
An intranet is NOT like the Internet because an intranet restricts public access to that network.
The intranet (network) is limited to that organization.
Extranets
An extranet allows users who are NOT members of the company or business to restricted or
limited access their network.
For example,:
Suppliers can have specifed access to the company's network. That is, they can only
access the system that may tell them about their supplies to that company. They cannot
however, access other areas on the network.
Customers can have limited and restricted access to a company's network to say, place
orders online or check the status of their order.
An extranet is NOT like the Internet, because it restricts or limits outside users from full access
to a company's network.
An extranet is NOT like an intranet because an extranet gives access to specific users who are
not employees of the company or business.
The diagram below illustrates the differences among the Internet, intranet and extranet:
TERMS ASSOCIATED WITH THE INTERNET
Electronic Commerce
E-Learning
E-Learning is web delivered and / or supported teaching and learning using a computer,
multimedia and Internet technologies. E-learning allows you to learn anywhere and usually at any time,
usually through a computer or mobile phone that connects to the Internet.
Podcasting
Podcasting combines blogging and mp3s to make an exciting new way to listen to information on a
computer or personal digital audio player. It allowed anyone with a computer to become a DJ, talk show host
or even a recording artist. Podcasting combines blogging with digital audio technology to create content.
Bulletin Board
These are text discussion groups. Individuals post a message to the bulletin board and then others
can read it and reply if they want to
Hacker culture involves the use of bulletin board systems in order to share information. Learn
more about some of the elements of hacker culture... bulletin board systems (BBS). A hacker
could host a bulletin board system on his or her computer and let people dial into the system to
send messages, share information, play games and download programs. As hackers found one another,
information exchanges increased dramatically.
VoIP
This is a method that allows users to use the Internet in much the same way that a regular
landline telephone uses a phone line. Most IP telephony software requires that each user have a computer,
Internet connection and special software such as speakers, sound card and microphone.
Instant Messaging
Chat - Chat is a conversation between two or more people that takes place in a chat room. The
chat room software allows a group of people to type in messages that are seen by everyone in the
"room."
The WWW is accessed through a web browser to link files together using hyperlinks. The WWW transmits
hypertext documents.
The internet hosts all forms of data, including games, video, telecommunications, files and programs. With
a web browser, the user can view web pages that may contain mainly text, but also images and videos in order
to navigate between them via hyperlinks.
Web browser
Hyperlinks present in resources enable users easily to navigate their browsers to related
resources.
Although browsers are primarily intended to use the World Wide Web, they can also be used to
access information provided by web servers in private networks or files in file systems.
The major web browsers are Google Chrome, Mozilla Firefox, Internet Explorer, Opera,
and Safari.
HTTP
<html>
<head>
<title>...</title>
</head>
<body>...</body>
</html>
HTML5 makes websites fully interactive with the ability to quickly embed videos and interact
with web pages. Over the next few years you'll increasingly see applications moving over to this
new technology
Uniform Resource Locator (URL)
When you use the Web or send an e-mail message, you use a domain name to do it.
A webpage is a document, typically written in plain text by formatted using Hypertext Markup
Language (HTML, XHTML). A webpage may incorporate elements from other websites that
link to them. A web browser displays a web page on a computer monitor or mobile device.
Website
This is a set of related web pages served from a single web domain.
Webserver
The most common use of web servers is to host websites, but there are other uses such as gaming or data
storage
Blogging
A Blog (also known as a weblog) serves as an online journal of a person's thoughts, opinions, visits or
anything that they find interesting including links to other sites and news stories. So there is no particular
sequence to the posts. It is normally a single page of entries written by one person, and is organized with the
most recent entry at the top. A blog is normally public meaning that anyone on the Internet can view its
contents
Concepts associated with the Internet (Continued)
“Electronic Mail”, better known as e-mail or email, is one of the most widely used forms of
communication today.
Email allows a user to write text, send and receive messages that may contain images or other
softcopy files attached to the email. Emails are transmitted through a network to a specified
computer user or group of users.
An email message is stored on a server or the user's computer and can be read at any time. Web-
based email can be accessed simply by going to the appropriate website and entering a username
and password.
Popular email hosts are hotmail.com, yahoo.com, and gmail.com
Email addresses:
An email address comprises three parts. Here are some examples of email addresses:
[email protected] [email protected]
[email protected] [email protected]
The first part of all e-mail addresses is the alias, user, group, or department of a company. In our
above examples, user, help, my.name, and support is the username of the email address.
The @ symbol separates the username from the domain name of the company. It is used as a
divider in the e-mail address and is required for many e-mail addresses.
The last part of the email address is the domain name of the email host where the user belongs. The
domain names in the examples above are furniture.com, notesmaster.com, hotmail.com, and
acompany.com
Newsgroups
Chat - Chat is a conversation between two or more people that takes place in a chat room. The
chat room software allows a group of people to type in messages that are seen by everyone in the
"room."
Chat is useful:
You need an immediate answer from another user who is also online and can accept a chat.
You want to communicate with more than one user who is also online.
You can communicate in brief messages the information you need to know or wish to
provide.
You want to meet new users.
Telnet
Telnet is one of the famous network protocol widely used to manage network and other equipment.
File Transfer Protocol (FTP) is a standard network protocol used to copy one or more files from one
host to another over a TCP-based network, such as the Internet.
Upload refers to the transfer of data from a computer system to a remote system such as a server
which usually stores a copy of the data being transferred.
Download refers to receiving data from a remote system such as a server to a local system.
DESCRIBE MEASURES TO SECURE DATA AND MAINTAIN DATA
INTEGRITY
This involves physically making the building with the computers, the computer rooms or the
computer itself difficult to access. This can be achieved by blocking unauthorised access to the
building and computer room thus keeping those computers in secure areas.
Sometimes it is best to prevent unauthorized users from getting near to your data and computer
systems than to try to remove them once they have gained access. Let us discuss some ways
to protect computer equipment from intentional theft or vandalism, also from accidental damage
by person who should not be using them
Guards
Locks
Biometric Systems
Users and businesses can use software to help protect their systems.
- Data encryption
- Virus Protection
- Firewalls
- Access rights
User identification (user ID) along with a password can control access to a computer's operating system, or
the network that the computer is connected to or especially the computer itself.
Each user must enter a unique username and a password to log on. Since the username is unique, each user
can be identified and their user's access to the system can be logged.
A password is a combination of letters, numbers or symbols that is private to each user. The password is
given to each user so that only the genuine user is logging on. This prevents hackers and unauthorized users
from logging on with someone else's user ID.
To maintain the integrity of access to the system, passwords should be changed about every 90 days
(3 months). The longer a user keeps the same password, the more likely the password will be
discovered and breached. If a password is wrongly entered three times, then the user is automatically
locked out. This may prevent a hacker repeatedly trying to guess a password.
Encryption
It is useful to encrypt data that is transferred over wireless networks since it is easy to
intercept. E-commerce web sites also use encryption to protect the personal and financial details
of their customers because their credit card and other information is transferred over the Internet.
If anyone intercepted the information it would be unreadable.
jkd2f*hlj86ik7$171kjfh7d1h4djkd2f*86ik7$171k
An authorized user would have the correct key code to translate the document and produce the
original document.
Virus Protection
Since a virus is a program that can attach copies of itself to system files or programs, it can cause
damage by altering or destroying programs, files and even operating systems of computers.
Anti-virus software can detect and destroy viruses by scanning computer files for any viruses
which it then removes and alerts the user. Since there are so many viruses, the anti-virus software
need to be updated regularly.
Firewall
Computers that use ADSL and other permanent connections to the Internet need software called
a 'firewall' to prevent unauthorised access to the system. A firewall allows mainly one way
access, so that you can access web sites and search the Internet, but the firewall checks all data
and information coming TO your computer system against a set of rules. If the data accessing
your system is from an unauthorized source, then it is blocked unless you specifically grant
permission for it to be accessed on your computer.
Access Rights
User Identification (user ID) controls who has access to which files and even parts of files or settings
on the computer or network. Controlling access levels can restrict users from installing software accessing
some files or changing the computer setup.
Some users will only have READ access to files while others may have READ and COPY and yet another set
of users may have DELETE access.
Keeping your Data
Many times you have so much data that you need to create space for the incoming data and move
the older data that you are not using as often to another location. This is called Data Archiving.
Other times you will need to store your current data somewhere else just in case it becomes
corrupted or lost. We make backups of our data in this case. Let's discuss these in more detail:
Data Archiving
As you create more and more data, some of it becomes old as the
new data is created. Old data can range from a day old to years old - it all depends on what the
data is used for.
Data archiving is the process of moving that data that is old or data that we are no longer actively
using, to a separate location or storage device. At any time we can retrieve this data for use, so it
must be stored and kept in an environment that will not let it get destroyed or corrupted or lost.
This also means that the data should be stored and organized in a way that it can be located and
presented easily. It is also important to keep this data, as some laws insist that the data and files
be kept for a certain period of time before they can be destroyed.
We can archive our email, physical files, files on our
computer memory sticks, CD...once data is stored, it
can be archived.
In many organizations, data is copied at regular intervals. In case the current data is corrupted or
lost, the last set of saved data can be used and then the lost or corrupted data can be re-entered.
When you backup our data, you create a copy of it. You continue to
add data using the original storage device as if you did not create a backup. However in case the
data on the current storage device becomes corrupted, destroyed or lost, you can use the last set
of data that was backed up and re-enter the most recent data that was not included in the backup.
Data loss can be a common experience of computer users. You can backup your data so that it
can be recovered if it is loss, whether through accidental or deliberate data deletion or corruption.
Your data is usually located on a storage device or media, such as a hard
drive, CD, or USB Flash Drive. If the storage device becomes damaged, or you cannot access
your data from the device or media, then you should extract your data. This process of getting
your data from this damaged device or media is called data recovery.
Backup your data - Create a copy of current data which can be used easily in case the original
data becomes corrupted
Archive your data - Data that you do not use often. It is not archived because it was corrupted,
but for historical purposes, just in case it is needed
B: Applications And Implications
The Internet is not only used by innocent members of the public, but also by fraudulent traders,
software pirates, hackers and con-artists, to name but a few.
Violation of privacy
Users have passwords to keep their data private and secure it from being stolen or modified. Some
computer users such as hackers use software to decipher codes and passwords to gain
unauthorised access to computer systems for their own illegal purposes. This violation of privacy
resulted in the creation of the Computer Misuse Act of 1990, where users if found guilty
were punishable by fines or imprisonment.
Propaganda
This is a form of communication through email, online articles, websites and other electronic
methods, to bias users' attitudes toward supporting a cause. The information shared is usually
partially true. This information is bombarded using many electronic methods to create the chosen
result in users' attitudes.
Computer Fraud
This is a criminal activity where someone uses a computer to defraud an individual or organisation of
money or goods. Computer fraud can be difficult to detect because the user committing the crime is
very skilled, discreet and difficult to locate since they are accessing the computer through the
Internet from another user's computer.
Electronic eavesdropping
This is a method of using a computer system to record the keystrokes such as passwords and
websites that a user accesses. These details are then transferred over the internet to the illegal user
for fraudulent use.
Surveillance
This is where users' activity on the computer is monitored and observed secretly to detect illegal
activity. That is, a user can be illegally monitored to see when they perform an illegal activity!
This is when a user pretends to be another user by assuming that person's identity, usually to
access credit card information in order to use the funds on the credit card without permission.
Using Appropriate hardware and software
Business
The first applications of ICT within banking were the use of mainframes, and later minicomputers, to process
data such as customer accounts, bank inventories, personnel records, and accounting packages.
Software: Payment for goods or services by debit and credit cards through the EFTPOS
A - Expert Systems
Inputs:
Technology impacts many aspects of our lives with no sign of slowing. Here are some current
and emerging technology trends:
Robots
Games:
Control software:
Examples:
Advantages.
The doctor saves time since the patient has already describes his or her symptoms.
The doctor is given possible diagnoses to consider.
The database can easily be updated.
Disadvantages
This type of program could help diagnose what is causing problems with software or hardware. The
system would ask a series of questions and give instructions on possible actions to try out. If the
actions were successful the program would end but if not then it would ask further questions and
suggest further tasks to try.
Advantages.
The system goes through a logical series of steps that are likely to solve common
problems.
The system can connect to and directly access areas of the software such as printer
or network management screens to help diagnose the problem
The computer can access data on a wide range of common computer problems to
see if a similar problem has been solved.
As new problems and solutions are entered into the system, the database can easily
be updated.
Disadvantages
The user may not have technical knowledge to answer the questions.
It lacks the 'human touch' of having the problem explained in sounds or use of hands
to explain the problem.
This type of expert systems can help to diagnose faults and assist with regular maintenance of a car.
The mechanic can answer questions on specific areas to help diagnose problems or it could be
automated where there sensors and connections to a direct interface between the expert system
and the computer system built into the car. The system would then run its diagnostic tests. The
mechanic would get a list of any issues or even make automatic adjustments needed on the car.
Advantages.
Saves time because the mechanic is taken through a logical series of things to try
out that are likely to solve common problems.
The system can directly access computer systems built into many modern cars.
Can be used as training for new mechanics.
Disadvantages
Most jobs today require that employees use or have access to some sort of technology. It seems to be the norm
that employees have email addresses of the company in order to send and receive messages among customers
and colleagues alike.
Reports can now be distributed via softcopy with graphs and tables. The size of the reports can be compressed
(zipped) and even password protected.
Meetings can be conducted online using video, audio, and chat features, including the option to share
documents
Loss of jobs
The introduction of Information Technology has influenced the automation of many tasks. This has made the
jobs of many employees redundant such as:
Typing pools: Secretaries were located in a central area typing documents using typewriters. Documents could
not be saved and had to retyped if they were to be distributed to many people. The introduction of the word
processor allowed documents to be saved and reduced the time spent retyping documents. The use of mail
merge also simplified sending one document personalised to many people.
Accounting tasks: Gone are the days of clerks assigned to manually calculate and count out wages.
Accounting programs now calculate the wages and in some cases employers deposit wages directly on the
employees' bank accounts.
Technology drives much of business these days and so most companies want workers with the basic skills to
use it - typing for example or having the ability to use email. The use of these basic skills in the workplace is
as important as reading and writing.
Many people have found that their job has been changed because of the introduction of computers. Sometimes
employees can perform the same tasks but by using a computer.
Training has become a major money earner based on the many people who need to keep up to date with
technology to maintain their jobs.
Telecommuting
Information Technology has changed how we work in a major way. Some business have disappeared, new
ones have been created because of IT, while others have adapt to meet the challenges of new technologies.
Office employees
Computer rooms
Medical Personnel
Movie industry
Shopping
Passport Security
Computer Provides on-site support for clients, or internal support for computer maintenance. Can
Technician
also install and update various software packages.
Database Designs, implements, maintains and repairs an organisation’s database. It can also include
Administrator
monitoring and improving database performance and capacity as well as securing the database
from intruders.
File Librarian Keeps track of the tapes, CDs, disks and other storage devices that are stored and logged out
for use
IT Manager Since technology tends to evolve rather quickly, the IT manager should periodically review
and evaluate how current systems and applications are meeting the needs of the company or
organization.
Multi-media Artist Uses a wide range of media such as visual art involving sound, moving images and other
media to create an art piece or product.
Network Responsible for support and management of computer networks (intranets and extranets, and
Administrator
aspects of the Internet) to ensure they run efficiently.
Programmer Write, test, and maintain programs. Must be good at problem solving and work with a team to
develop systems solutions.
Software Engineer The software engineer is responsible for the complete life cycle of a new or modified software
package, from research and design to implementation, training and support.
Software Tester Run tests, using various customer scenarios, stress testing, and performance testing. The
ultimate goal is to iron out any bugs and improve the quality of the finished product.
Software Trainer A specialist who teaches persons how to use computer applications such as spreadsheets,
word processors, desktop publishing programs, or computer network systems software.
Requires expert knowledge of computer software programs and strong communication skills.
Systems Analyst Identifies and specifies software requirements and specifications as well as manages the
and Designer
program design and development. A systems analyst may supervise a team of programmers in
the development of a system solution.
Systems Installs, customizes, and maintains the operating system as well as installs or upgrades
Programmer
applications that run on the operating system.
Web-Developer Specializes in the development of applications for the Internet, or distributed network
applications that use HTTP from a web server to be displayed on a web browser.
Webmaster Responsible for maintaining one or more websites; may include ensuring that the web servers,
as well as the computer hardware and software are operating correctly, designing websites,
generating and revising web pages