CTE 111 - Introduction to Computers & Information Technology
CTE 111 - Introduction to Computers & Information Technology
NOVEMBER 9, 2023
best solution polytechnic, akure, ondo state
KM 12, Ondo Road, Akure, Nigeria
Week 1: Understand the history, classification and impact of computers
Introduction
The computer is fast becoming the universal machine of the twenty-first century.
Early computers were large in size and too expensive to be owned by
individuals. Thus they were confined to the laboratories and few research
institutes. They could only be programmed by computer engineers. The basic
applications were confined to undertaking complex calculations in science and
engineering. Today, the computer is no longer confined to the laboratory.
Computers, and indeed, computing have become embedded in almost every item
we use. Computing is fast becoming ubiquitous. Its application in engineering,
communication, space science, aviation, financial institutions, social sciences,
humanities, the military, transportation, manufacturing, the extractive industries to
mention but a few.
Definitions
Computer is an advanced electronic device that takes raw data as input from the
user and processes these data under the control of set of instructions (called
program) and gives the result (output) and saves output for the future use. It can
process both numerical and non-numerical (arithmetic and logical) calculations.
Also Computer can be defined as an electronic machine which accept data as
inform of input and process it as informs of out and store or keep it for future use.
Computer is a GIGO Machine (Garbage IN, Garbage OUT).
The term computer is obtained from the word compute. A computer is an electronic
device that inputs (takes in) facts (known as data), and then processes (does something to
or with) it. Afterwards it outputs, or displays, the results for you to see.
Data is all kinds of facts, including, pictures, letters, numbers, and sounds.
There are two main parts of computers, hardware and software. Hardware is all of the
parts of the computer you can see and touch. Software is the instructions that a computer
uses to do what you ask it to. Pieces of software are often called programs. The basic
function performed by a computer is the execution of a program.
A personal computer is not a single unit. A typical computer consists of several basic
parts or components that work together. To perform any computer task you need two
major components: the hardware and the software.
[1] The hardware is the physical components of a computer system. Generally,
you can think of the hardware as any part of the computer that you can see or
touch. Although the hardware of a computer is capable of performing
marvelous tasks, it cannot accomplish any of them without the vital
instructions that the software provides.
[2] The software is a set of instructions that tells the hardware what to do. You
can’t see or touch the software, although you can see packages that contain
the software. It is typically distributed on CD-ROM disc and is installed on
the computer hard drive.
Hardware Components
The major hardware components of the personal computer consist of the following:
[1] Input Devices: Input devices are the computer hardware that accepts data and
instructions from a user. Input devices have been built in many forms to help in
communicating with the computer. The most common input devices are the
keyboard and the mouse.
i. The Keyboard: The keyboard of the personal computer comes in a
number of styles. The various models may differ in size and shape, but
except for a few special purpose keys, MDS keyboards are laid out
almost identifiably. The most common keyboard used today was
established by IBM. The computer keyboard is more than just a
typewriter. It contains all of the keys required for typing letters,
numbers, plus the keys for entering commands and moving around on
the screen. There are 101 keys arranged in groups: Alphanumeric,
Numeric, Function and Arrow/Cursor movement keys, and Computer
keys.
ii. A mouse is a pointing device that enables you to quickly move around
on the screen, and to select commands from menus rather than type the
commands. A mouse is useful because it enables the user to point at
items on the screen and clicks a button to select the item. It is
convenient for entering certain data.
iii. Track Balls: A trackball is an input device that works like an upside-
down mouse. You rest your hand on the exposed ball and the fingers on
the button. To move the cursor around the screen, you roll the ball
with your thumb. Trackballs are much popular with notebook
computers. They require less desk space than the mouse.
iv. The Joystick: This is a pointing device commonly used for games. It is
not used for business applications.
v. The Pen: It is an input device that allows a user to write on or point at
a special pad on the screen of a pen-based computer, such as a personal
digital assistant (PDAS).
vi. The Touch Screen: A computer screen that accepts input directly into
the monitor; users touch electronic buttons displayed on the screen. It is
appropriate in environment where dirt or weather would render
keyboards and pointing devices useless.
vii. The Scanner: This is an input device used to copy images into a
computer memory without manual keying. It works by converting any
image into electronic form by shinning light on the image and sensing
the intensity of reflection at every point. There are several kinds of
scanners. These includes: hand held, flatbed, and sheet- feds.
viii. The Bar-Code Reader: This is one of the most commonly used input
devices after the keyboard and mouse. It is commonly found in
supermarkets and department stores. This device converts a pattern of
printed bars on products into a product number by emitting a beam of
light frequently from a laser that reflects off the bar code image. A light
sensitive detector identifies the bar-code image by special bars at both
ends of the image. Once it has identified the barcode, it converts the
individual bar patterns into numeric digits.
Input Devices
[5] Storage Devices: Among the most important part of a computer system are the
devices that allow you to save data or information. The physical components or
materials on which data are stored are called storage media. A storage device is a
piece of hardware that permanently stores information. Unlike electronic memory, a
storage device retains information when electric power is turned off. There are
several storage devices and primary among them are:
a. The Floppy Disk: The floppy disk is a circular flat piece of plastic made of a flexible
(or floppy) magnetic material on which data are recorded. Floppy disk drives store
data on both sides of the disks. Earlier computers stored data on only a single side of
the floppy disk.
b. The Hard Disk: The hard disk is generally not visible because hard disks are usually
enclosed within the system unit. The hard disk is a stack of metal platters that spin on
one spindle like a stack of rigid floppy disks. Unlike floppy disks where the disk and
drive are separate, the hard-disk drive, or hard drive is the whole unit. Generally you
cannot remove the hard disk from its drive; however some manufacturers make
removable hard disks that plug into a separate drive unit.
c. The CD-ROM: CD-ROM disks are hard, plastic, silver – a colored disk. CD-ROM is
an acronym for Compact Disc Read – Only Memory. This implies that the disk can
only be read. You cannot change or overwrite the contents of a CD-ROM disk.
d. Tape Drives: A tape drive is a device that reads and writes data to the surface of a
magnetic tape, generally used for backing up or restoring the data of an entire hard
disk.
e. The Zip Drive: Zip drives are an alternative to tape backup units or tape drives. A
zip drive can be internal or external. Zip drives have
removable cartridges or disk. A zip drive holds about 100MB to 250 MB of Data.
Storage Devices
[6] Output Devices: Output devices return processed data, that is, information back to
the user. In other words, output devices allow the computer >talk? to us. The most
common output devices are the monitor and the printer. Others include modems and
speakers.
a. The Monitor: The monitor is an output device that enables the computer to display
to the user what is going on. It has a screen like that of a television. It is commonly
referred to as the screen or display. It is the main source for output of information
from the computer. As data is entered through an input device, the monitor changes
to show the effects of the command. Messages displayed on the screen allow the user
to know if the command is correct.
b. The Printer: The printer is an output device that produces on hard copy or a print out
on a paper i.e. it takes data from its electronic form and prints it out on paper. There
are three principal types of printers; Laser, Inkjet and Dot – Matrix.
c. The Sound Card: Sound Cards, otherwise known as sound boards, is a hard ware
board. It is a device that produces audio sounds and usually provides ports in the back
of a computer for external speakers. It is installed in one of the expansion slot inside
the system unit?s motherboard.
d. The Modem: The modem is a device that allows a computer to communicate with
another computer through a telephone line. Both computers need compatible modem.
With a modem, a computer and required software, you can connect with other
computers all over the world.
Output Devices
Software Components
Software is a set of instructions that operate a computer, manipulate the data and execute
particular functions or tasks. In other words, it is a programs, routines, and symbolic
languages that control the function of the hardware.
For software (the instructions) to perform various functions, it must be programmed.
That is, the instructions need to be written in a programming language that the computer
can understand. Without a program, a computer is useless.
[2] Systems Software: includes the operating system and all the utilities that enable the
computer to function. The most important program that runs on a computer is the
operating system. Every general-purpose computer
[3] must have an operating system in order to run other programs. This includes
controlling functions such as the coordination of the hardware and applications
software, allocating storage facilities, controlling the input and output devices and
managing time sharing for linked or networked computers.
There are two types of multitasking operating systems cooperative and preemptive.
• Cooperative Multitasking: This requires cooperation between the OS and
application programs. In this case the programs are written in such a way that they
periodically check with the OS to see whether any other program needs the CPU. If
a program needs the CPU, they relinquish control of the CPU to the next program.
Cooperative multitasking is common with Macintosh OS and DOS computers
running Microsoft Windows.
• Preemptive Multitasking: Under this scheme, the OS maintain a list of processes
(programs) that are running. Each process on the list is assigned a priority by the
OS when it is started. At any time, the OS can intervene and modify the priority
list. The OS also retains control of the amount of time that it spends with any
process before going to the next process. UNIX, OS/2 and Windows NT employ
preemptive multitasking.
2. Multi-user Operating Systems: A multi-user OS allows more than a single user
access to a computer at the same time. Of course, to accomplish this, a multi-user
OS must also be capable of multitasking. Only UNIX OS and Windows NT are
capable of supporting multiple users. UNIX provides three ways to let people use
the same PC at the same time.
• The first way to connect to a PC running UNIX is from another computer
with a modem. The remote user can log in and run
programs, list files, send e-mails read the news and otherwise do
everything they could do if they were physically in front of the UNIX computer.
• The second way to connect to a UNIX computer is by attaching terminals to the
PC. Terminals are inexpensive devices that consist of a keyboard, and a monitor.
• The third way to tap into a UNIX computer multi-user capabilities is with a network.
3. Multiprocessing Operating Systems: A special type of OS is required to use a
computer equipped with more than one CPU. In other words, multiprocessing
requires an OS capable of using and managing a series of CPUs. There are two
types:
• With asymmetrical multiprocessing one main CPU retains the overall control of
the computer as well as that of the other microprocessor.
• On the other hand in symmetrical multiprocessing there is no single controlling
CPU. This arrangement provides a linear increase in system capacity for each
processor added to the system.
• Some extensions of UNIX supports asymmetric multiprocessing while Windows
NT supports symmetric multiprocessing.
Ancient Times
Roman Empire
After the census Hollerith turned to using his tabulating machines for business and in
1896 organized the Tabulating Machine Company which later merged with other
companies to become IBM. His contribution to the computer then is the use of punched
card data storage. BTW: The punched cards in computers were made the same size as
those of Hollerith’s machine. And, Hollerith chose the size he did because that was the
same size as the one dollar bill at that time and therefore he could find plenty of boxes
just the right size to hold the cards.
1943 – Colossus I
The important contribution of this machine was that it was programmed by means of a
punched paper tape, and the instructions could be altered. In many ways, the Mark I was
the realization of Babbage’s dream.
It was Howard Aiken, in 1947, who made the rather short-sighted comment to the effect
that the computer is a wonderful machine, but I can see that six such machines would
be enough to satisfy all the computing needs of the entire United States.
1951 – UNIVAC
In 1954 the first electronic computer for business was installed at General Electric
Appliance Park in Louisville, Kentucky. This year also saw the beginning of operation of
the IBM 650 in Boston. This comparatively inexpensive computer gave IBM the lead in
the computer market. Over 1000 650s were sold.
1965 - PDP-8
In 1965 the first integrated circuit computer, the PDP-8 from Digital
Equipment Corporation appeared. (PDP stands for Programmable
Data Processor) After this the real revolution in computer cost and
size began.
By the early 70s the state of the art in computer technology allowed for
1000 components per chip. To get an idea of just how much the size of
electronic components had shrunk by this time look at the image on the
right. The woman is peering through a microscope at a 16K RAM
memory integrated circuit. The stand she has her microscopy sitting on
is a 16K vacuum tube memory curcuit from about 20 years previous.
1971
1984-1989
1990s
Compared to ENIAC, microcomputers of the 90s:
Were 36,000 times faster (450 Megahertz was the average speed)
Had a memory capacity 1000 to 5000 times larger (average was between 4 and
20 Megabytes)
Were 1/30,000 the size
Cost 1/30,000 as much in comparable dollars (A PC still cost around $1500 the
equivalent of about $2500 in 2008 dollars)
Early 2000s
Compared to ENIAC, microcomputers of the early 2000s:
Are 180,000 times faster (2.5+ Gigahertz is the average speed)
Have a memory capacity 25,000 times larger (average 1+ Gigabytes of RAM)
Are 1/30,000 the size
Cost 1/60,000 as much in comparable dollars (A PC can cost from $700 to
$1500)
Data Storage
Data storage has also grown in capacity and shrunk in size as dramatically as have
computers. Today a single data DVD will hold around 4.8 gigabytes. It would take
90,000,000 punch cards to hold the same amount of data. And, there is talk of a new high
density video disk (HVD) that will be able to hold fifty times that much data. That's more
than 240 gigabytes.
Just how much data is that
8 bits = 1 byte
1024 bytes = 1 kilobyte
1024 K = 1 Megabyte = 1,048,576 bytes
1024 Mb = 1 Gigabyte = 10,73,741,824 bytes
1024 Gb = 1 Terabyte = 1,099,511,627,776 bytes
1024 Tb = 1 Petabyte = 1,125,899,906,842,624 bytes
1024 Pb = 1 Exabyte = 1,152,921,504,606,846,976 bytes
1024 Eb = 1 Zettabyte = 1,180,591,620,717,411,303,424 bytes
1024 Zb = 1 Yottabyte = 1,208,925,819,614,629,174,706,176 bytes
1.4 Classify computers according to generations from 1st – 5th generation
Users interacted with the third generation computers through an operating system, which
allowed the device to run many different applications at one time with a central program
that monitored the memory. Computers for the first time became accessible to a mass
audience because.
Quantum computation, molecular and nanotechnology will radically change the face
of computers in years to come.
These are computers that operate on discrete values. That is, values that occur at a point
in time. E.g. 0,1,2,3… The output from digital computers is usually in the form of
discrete values. This class of computers is commonly found in the business
environments, and they include Desk Calculators, adding machines, and most of the
computers we have around, that is, the personal computers.
b. Analog computer
In general, analog computers are limited by real, non-ideal effects. These are examples
of analog computers that have been constructed or practically used:
differential analyzer
Kerrison Predictor
mechanical integrator
MONIAC Computer (hydraulic model of UK economy)
operational amplifier
planimeter
Range keeper
slide rule
thermostat
Torpedo Data Computer
Water integrator
Mechanical computer
c. Hybrid computer
In general, analog computers are extraordinarily fast, since they can solve
most complex equations at the rate at which a signal traverses
the circuit, which is generally an appreciable fraction of the speed of light.
On the other hand, the precision of analog computers is not good; they are
limited to three, or at most, four digits of precision.
(a) Dedicated or Special purpose computers: These are computers that are
designed to carry out only specified task. The series of instructions that these
types of computer follow to carry out its operation is in-built and cannot be
modified. E.g. word processor, robots used in car manufacturing plants.
(b) General Purpose Computers: These are computers designed to perform a wide
variety of operations. They can be programmed to carry out scientific oriented
applications or business oriented ones just by changing the series of
instructions in its memory.
Classification by Size
Using physical size as a factor, the following types of computers can be identified:
(a) Micro-Computers: These are computers that are small in size which can be placed
on the desk or lap or palm.
(b) Mini Computers: These are large computers that support multi users. Their speed
of operations is high compared to micros.
(c) Mainframe Computers: These are very large computers that support multi users.
Their speed of operations and memory capacity is larger than that of a mini
computer.
Ever since the first IBM PC was sold in 1981 and the bundling of Microsoft's Windows
Operating System on subsequent easy-to-use PCs, computers have revolutionized the
way individuals, students and enterprises work, communicate, live, educate and entertain.
Computers are now integral to virtually every possible human and non-human activity.
The benefits of computers to society are manifold.
Work
Computers are now used in every domain, field and sector and across industries. They are
used for a variety of tasks, applications and activities and to enhance productivity on all
fronts.
Communication
The advent of the Internet and its proliferation have force-multiplied the usage of
computers. People all over the world are able to communicate, engage and interact with
each other using IM, email, blogs, online forums, social media and other options.
Jobs Influence
The widespread use and application of computers has created multiple industries, derived
sectors and professions and facilitated job opportunities for millions of people.
Entertainment
High-end desktops and full-featured notebook PCs have become all-in-one entertainment
systems for millions of users as they watch movies, sports events and news programs,
shop, socialize, download videos and play games.
Education
Computers have simplified and streamlined the process of education for millions of
young teens, college going students and post-graduates. The use of computers has
democratized the influence, reach and penetration of education and knowledge to
students in far-flung and geographically remote regions.
As major new technologies for recording and processing information were invented over
the millennia, new capabilities appeared, and people became empowered. The invention
of the printing press by Johannes Gutenberg in the mid-15th century and the invention of
a mechanical calculator by Blaise Pascal in the 17th century are but two examples. These
inventions led to a profound revolution in the ability to record, process, disseminate, and
reach for information and knowledge. This led, in turn, to even deeper changes in
individual lives, business organization, and human governance.
The first large-scale mechanical information system was Herman Hollerith’s census
tabulator. Invented in time to process the 1890 U.S. census, Hollerith’s machine
represented a major step in automation, as well as an inspiration to develop computerized
information systems.
One of the first computers used for such information processing was the UNIVAC I,
installed at the U.S. Bureau of the Census in 1951 for administrative use and at General
Electric in 1954 for commercial use. Beginning in the late 1970s, personal
computers brought some of the advantages of information systems to small businesses
and to individuals. Early in the same decade the Internet began its expansion as the global
network of networks. In 1991 the World Wide Web, invented by Tim Berners-Lee as a
means to access the interlinked information stored in the globally dispersed computers
connected by the Internet, began operation and became the principal service delivered on
the network. The global penetration of the Internet and the Web has enabled access to
information and other resources and facilitated the forming of relationships among people
and organizations on an unprecedented scale. The progress of electronic commerce over
the Internet has resulted in a dramatic growth in digital interpersonal communications
(via e-mail and social networks), distribution of products (software, music, e-books, and
movies), and business transactions (buying, selling, and advertising on the Web). With
the worldwide spread of smartphones, tablets, laptops, and other computer-based mobile
devices, all of which are connected by wireless communication networks, information
systems have been extended to support mobility as the natural human condition.
As information systems enabled more diverse human activities, they exerted a profound
influence over society. These systems quickened the pace of daily activities, enabled
people to develop and maintain new and often more-rewarding relationships, affected the
structure and mix of organizations, changed the type of products bought, and influenced
the nature of work. Information and knowledge became vital economic resources. Yet,
along with new opportunities, the dependence on information systems brought new
threats. Intensive industry innovation and academic research continually develop new
opportunities while aiming to contain the threats.
According to the ITIL Foundation Course Glossary, IT Infrastructure can also be termed
as “All of the hardware, software, networks, facilities, etc., that are required to develop,
test, deliver, monitor, control or support IT services. The term IT infrastructure includes
all of the Information Technology but not the associated People, Processes and
documentation.”
With modern cloud infrastructure, applications and data are accessible from anywhere.
Thus, it includes a mix of cloud environments, on-premise data centers and edge
computing devices all connected by enterprise networks. This flexibility requires a
dynamic infrastructure engineering discipline that integrates innovation, automation and
optimization.
Hardware– these are the devices like the monitor, processor, printer and keyboard,
all of which work together to accept, process, show data and information.
Software– are the programs that allow the hardware to process the data.
Databases– are the gathering of associated files or tables containing related data.
Networks– are a connecting system that allows diverse computers to distribute
resources.
Procedures– are the commands for combining the components above to process
information and produce the preferred output.
The first four components (hardware, software, database and network) make up what
is known as the information technology platform. Information technology workers could
then use these components to create information systems that watch over safety
measures, risk and the management of data. These actions are known as information
technology services.
Hardware: The term hardware refers to machinery. This category includes the
computer itself, which is often referred to as the central processing unit (CPU), and
all of its support equipment’s. Among the support equipment’s are input and output
devices, storage devices and communications devices.
Software: The term software refers to computer programs and the manuals (if any)
that support them. Computer programs are machine-readable instructions that direct
the circuitry within the hardware parts of the Computer Based Information System
(CBIS) to function in ways that produce useful information from data. Programs are
generally stored on some input / output medium-often a disk or tape.
Data: Data are facts that are used by program to produce useful information. Like
programs, data are generally stored in machine-readable from on disk or tape until the
computer needs them.
Procedures: Procedures are the policies that govern the operation of
a computer system. “Procedures are to people what software is to hardware” is a
common analogy that is used to illustrate the role of procedures in a CBIS.
People: Every Computer Based Information System (CBIS) needs people if it is to be
useful. Often the most over-looked element of the CBIS is the people: probably the
components that most influence the success or failure of information system.
CBIS is a data processing system into a high-quality information and can be used as tools
that support decision-making, coordination and control as well as visualization and
analysis.
But this is true that all organisations process transactions as a major part of their daily
business activities. The most successful organisations perform this work of transaction
processing in a very systematic way. Transaction processing systems provide speed and
accuracy and can be programmed to follow routines without any variance.
Data processing by computers has been extremely effective because of several reasons.
The main reason being that huge amount of data relating to accounts and other
transactions can be processed very quickly. Earlier most of the computer applications
were concerned with record keeping and the automation of routine clerical processes.
However, in recent years, increasing attention has been focused on computer applications
providing information for policy making, management planning and control
It is an information system that offers the kind of information that may not be predictable,
the kind that business professionals may need only once. These systems do not produce
regularly scheduled management reports. Instead, they are designed to respond to a wide
range of requests. It is true that all the decisions in an organisation are not of a recurring
nature. Decision support systems assist managers who must make decisions that are not
highly structured, often called unstructured or semi-structured decisions. A decision is
considered unstructured if there are no clear procedures for making the decision and if
not all the factors to be considered in the decision can be readily identified in advance.
Judgement of the manager plays a vital role in decision making where the problem is not
structured. The decision support system supports, but does not replace, judgement of
manager.
Office automation systems are among the newest and most rapidly expanding computer
based information systems. They are being developed with the hopes and expectations
that they will increase the efficiency and productivity of office workers-typists,
secretaries, administrative assistants, staff professionals, managers and the like. Many
organisations have taken the First step toward automating their offices. Often this step
involves the use of word processing equipment to facilitate the typing, storing, revising
and printing of textual materials. Another development is a computer based
communications system such as electronic mail which allows people to communicate in
an electronic mode through computer terminals. An office automation system can be
described as a multi-function, integrated computer based system that allows many office
activities to be performed in an electronic mode.
Categories of different information systems with their characteristics have been described
briefly in table below.
Data are the raw alphanumeric values obtained through different acquisition methods.
Data in their simplest form consist of raw alphanumeric values.
Information is created when data are processed, organized, or structured to provide
context and meaning. Information is essentially processed data.
Knowledge is what we know. Knowledge is unique to each individual and is the
accumulation of past experience and insight that shapes the lens by which we interpret,
and assign meaning to, information. For knowledge to result in action, an individual must
have the authority and capacity to make and implement a decision. Knowledge (and
authority) are needed to produce actionable information that can lead to impact.
The flow and characteristics of these terms are illustrated in Figure 1 and Table 1. Table
2 provides examples of data, information, and knowledge for water data.
The flow from data to information and knowledge is not uni-directional. The knowledge
gained may reveal redundancies or gaps in the data collected. As a result, an actionable
insight may be to change the data collected, or how those data are converted into
information, to better meet user needs.
Table 1: Characteristics of data, information, and knowledge (adopted from de Vries
2018).
Should be
Is objective Is subjective
objective
meaning
Is
Is processed Is processed and understood
unprocessed
Is Is quantifiable,
quantifiable, there can be Is not quantifiable, there is no knowledge
there can be information overload
data overload overload
Table 2: Examples of transforming water data to information to knowledge that leads to action.
Convert gage
height to stream
flow estimates to Restrict withdraws because
Stream gage height
provide summary streamflow is below 7Q10
stats for last 10
years
increasing,
decreasing, or precipitation over last 20 years
staying the same
Combine lead
level, customer,
Alert customers with lead levels
Amount of lead in and drinking
exceeding safe drinking water
water samples water standards
standards
data to locate
violations
Correlate volume
of treated water Continue investing in the low flush
Volume of treated
with number of toilet rebate program give large
water
low-flush toilets water savings
installed over time
An example is an online air ticket booking system, that collects data from users and
generates an airline ticket and a bill. Typical organizational departments that use
transaction processing systems are sales, account, finance, plant, engineering, human
resource, and marketing. Data can be generated from sales order, cash receipts,
accounting, inventory management, depreciation accounting, etc.
CRSs track customer activities, purchasing trends, customer inquiries etc. They allow
customers to interact with companies for service, product feedback, and problem
resolutions.
Decision support systems are used by managers to provide solutions to problems that are
dynamic in nature. This kind of system uses data from internal systems like TPS and MIS
to find the best possible choice or alternative to a given problem. They find answers
through statistical analysis and mathematical models.
OAS is useful to improve the efficiency of employees who are required to perform
repetitive tasks of data processing. Office functions such as mailing, fax, typing, records
management all fall under this category.
They predict future sales patterns, summarize current costs and forecast revenues
KMS analyze, organize and share knowledge with organization members for innovation
and improved performance
ECS stress on team effort or collaboration across different functional teams by enabling
collaborative effort and improving communication and sharing of data
A web-based system is an application that is accessed via HTTP. The term web-based is
usually used to describe applications that run in a web browser. It can, though, also be
used to describe applications that have a very small component of the solution loaded on
the client’s PC. The host server for a web-based system could be a local server, or it
could be accessed via the internet.
A web-based application runs in a web browser. That means that a single, responsive web
application can be used across multiple device types. Although web apps will need to be
tested on different browsers, there is no need to test them on different operating systems.
This makes development and testing much easier. It cuts development costs and reduces
development time.
Easy Installation and Maintenance
Unlike traditional software that is loaded on each device, web applications run from a
host server. There is no installation on local machines. Software upgrades are all
completed centrally. That reduces the costs of installing and upgrading software. It also
ensures that all users are always using the same version of the software.
Accessible Anywhere
Users can access a web-based system anywhere. So long as they have an internet
connection, a web browser, and the appropriate login details. This means that users can
access the data they need when they are away from the office. It also brings the
possibility of staff working from home.
Easy Data Sharing and Collaboration
The sharing of data and collaborating on projects is made much easier with web-based
systems. Data is stored in one central location, so users can share data and work together
on projects. It is also easier to integrate web-based systems than isolated desktop
applications.
Centralized Security
Web-based systems can eliminate the need for powerful client PCs. Processing is carried
out on the host server. The host server can be engineered to efficiently service
simultaneous, peak demand. So, the storage, processor, and memory requirements for
client PCs can be reduced. Taken across an entire organization, this can represent a large
cost saving for some businesses.
Increased Efficiency
Web-based systems make it easier to provide access to real-time information. The paper
reports that might take days to prepare and distribute can be replaced with online reports
and digital dashboards. That can improve the quality and the speed of decision-making,
right across an organization.
Web-based custom software development can provide businesses with significant cost
savings and productivity improvements. Now that internet access is almost universally
available and internet speeds have significantly improved, applications that previously
had to be client-based can now be deployed on the web.
Although this is the case in developed Western countries, it is not the case worldwide. In
some countries, internet access is unreliable. So, major deployment of web-based
applications may still not be possible. International organizations with overseas offices
may not yet be able to take full advantage of web-based solutions.
For domestic organizations, though, web-based systems have a promising future. From
web-based office applications, like content management systems and productivity
applications, to custom web-based software developed specifically for your organization,
the foundation of many future software solutions is likely to be web-based.
There are six main elements that make up a computer system. They all interact with each
other and perform the task at hand. Let us take a look at all of them.
1] Hardware
These are all the physical aspects of a computer system. They are tangible, i.e. you can see
and touch them. Hardware components are the electronic or mechanical instruments, like
keyboard, monitor, printer etc. They help the users interface with the software, and also
display the result of the tasks being performed.
Hardware can actually be of four types, depending on which function they perform. The
four types of hardware are,
Input Hardware: For users to input data into the computer system. Examples:
Keyboard, mouse, Scanner
Output Hardware: To translate and display the result of the data processing =.
Example: Monitor Screen, Printer etc
Processing and Memory Hardware: Where data and information are processed and
manipulated to perform the task at hand. It is also the workspace of the computer,
where it temporarily stores data. Examples: Central Processing Unit (CPU), Read
Only Memory (RAM)
Secondary Storage Hardware: Where the computer system stores data permanently.
Example: Harddisk, Pendrive etc
2] Software
Software is nothing but a set of programmes (computer instructions), which helps the user
to do a set of specific tasks. It helps the user interact with the computer system with the help
of hardware. Software, as you can imagine, is the intangible aspect of the computer system.
Basically, there are six main types of software, which are as follows,
Utility Software: Like operating systems, it is a system software. It helps maintain and
protect the computer system. For example, Anti-virus software is a utility software.
System Software: This types of software control the hardware, the reading of the data
and other such internal functions.
Connectivity Software: The special software that facilitates the connection between
the computer system and the server. This allows the computer to share information
and communicate with each other.
3] People
The people interacting with the computer system are also an element of it. We call this
element the Liveware. They are the ultimate “users” of the computer systems. There are
three types of people that interact with the system, namely
Programmers: Professionals who write the computer programs that allow users to
interact with the computer. They must have technical knowledge of computers
and computer languages.
System Analyst: They mainly design data processing systems, and solve problems that
arise in data processing
End-Users: Also known as operators, they are the people who interact with the
computer system.
4] Procedures
These are a set of instructions, written in code, to instruct a computer on how to perform a
task, run a software, do calculations etc. There are three types of procedures in a computer
They are,
Internal Procedures: Directs the flow of information and sequences the data
5] Data
Data is essentially the raw facts and figures that we input in the computer. The data gets
processed via the computer system and becomes information, which is processed and
organized data. Information can then be used for decision-making purposes.
The measurement of data is done in terms of “bytes”. One kilobyte (KB) is approximately
1000 bytes, 1 megabyte (MB) is 1 million bytes and finally, 1 gigabyte (GB) is
approximately 1 billion bytes.
6] Connectivity
This is when the computers are linked to a network. It facilitates sharing of information,
files, and other facilities. Computers can connect to a network via LAN cables, Bluetooth,
Wi-Fi, satellites etc. The internet is the most obvious example of connectivity in a computer
system.
3.3 Three major components of computer hardware (input, processing and output).
While there are other components as well, these three are primarily responsible for
making a computer function. They must work in complete synergy because that will
ensure smooth overall functioning. Hence, we can even call them building blocks of a
computer system.
Input Unit
These components help users enter data and commands into a computer system. Data can
be in the form of numbers, words, actions, commands, etc. The main function of input
devices is to direct commands and data into computers. Computers then use their CPU to
process this data and produce output.
For example, a laptop’s keyboard is an input unit that enters numbers and characters.
Similarly, even a mouse can be an input unit for entering directions and commands. Other
examples include barcode readers, Magnetic Ink Character Readers (MICR), Optical
Character Readers (OCR), etc.
Another example of input devices is touch-screens. Users can simply touch these screens
without using any other device to enter commands. From smartphones to ATM machines,
these input devices are becoming very popular these days.
After receiving data and commands from users, a computer system now has to process it
according to the instructions provided. Here, it has to rely on a component called the central
processing unit. The CPU further uses these three elements:
a) Memory Unit
Once a user enters data using input devices, the computer system stores this data in its
memory unit. This data will now remain here until other components of CPU process it.
The memory unit uses a set of pre-programmed instructions to further transmit this data to
other parts of the CPU.
This part of the CPU performs arithmetic operations. It does basic mathematical
calculations like addition, subtraction, division, multiplication, etc. Further, it can even
perform logical functions like the comparison of data.
c) Control Unit
This unit is the backbone of computers. It is responsible for coordinating tasks between all
components of a computer system. The control unit collects data from input units and sends
it to processing units depending on its nature. Finally, it also further transmits processed
data to output units for users.
Output Unit
The third and final component of a computer system is the output unit. After processing of
data, it is converted into a format which humans can understand. After conversion, the
output units displays this data to users. Examples of output devices include monitors,
screens, printers and speakers. Thus, output units basically reproduce the data formatted by
the computer for users’ benefit.
A peripheral device is a device that either enters information into a computer system or
receives information from the computer system. The normal workflow of a computer
system is the following.
It receives data and commands from the user, processes the data according to the given
commands, presents the processed data to the user, and stores or prints the processed data
if the user gives a command to save or print.
Except for the components that process the given data, all other components of a
computer system are known as peripheral devices.
In simple words, if a hardware component is not part of the core components and is used
either to put information into the computer system or to get information from the
A computer system can function without peripheral devices but it cannot function without
core components. Examples of core components are CPU, motherboard, power supply,
RAM, and ROM. Keyboard, mouse, monitor, printer, scanner, and USB drive are
examples of peripheral devices.
Peripheral devices are classified into three types. These types are input devices, output
devices, and input/output devices.
An input device inserts data or commands into the computer system. A keyboard, mouse,
scanner, barcode reader, digital pen, webcam, microphone are some examples of input
devices.
An output device receives the processed data from the computer system and presents
that data to the user. A monitor, printer, speaker, headphone, and projector are some
examples of output devices.
An input/output device can perform both input and output functions. A hard drive, USB
drive, memory card, tape drive, and NIC are some examples of input/output devices.
So far we have discussed what a peripheral device is and how many types of peripheral
device are. Now, let's discuss some most common peripheral devices and their functions.
Keyboard
A keyboard is the most common and important input device. It allows the user to enter
letters, numbers, and symbols. When a user presses a key on a keyboard, the keyboard
sends a unique signal to the computer. The processing unit of the computer receives the
signal and translates the signal to know which key is pressed.
Mouse
Webcam
A webcam is a popular input device. It captures live videos and photos. Usually, it is
inbuilt on laptops and tablets. Mostly, it is used for video calls and live presentations.
Scanner
Monitor
A monitor is one of the most important output devices. It receives output from the
processing unit and displays that output. The output displayed on the monitor is
temporary. Because of this, the output displayed on the monitor is called the soft copy of
the output. To make it permanent, you have to store it on other output devices.
Printer
A printer is another important output device. It prints the given output. After printing, the
output is permanently stored on the paper. Because of this, the output printed on the
paper is called the hard copy of the output. There are mainly three types of printers: dot-
matrix, inkjet, and laser. A dot printer uses pins and an ink-coated ribbon for printing. An
inkjet printer uses liquid ink for printing while a laser printer uses a laser toner for
printing.
Speaker
A speaker is a popular output device. It plays the audio output signals. Laptops and
tablets have inbuilt speakers. On desktop computers, they can be attached via ports.
Hard disk
A hard disk is the most important input/output device. It provides both input and output
functionalities. When a computer reads data from the hard disk, the hard disk provides
input functionality. When the computer stores data on the hard disk, the hard disk
provides output functionality.
USB drive
USB drives are another popular input/output device. They are compact and small. They
are mostly used to transfer data between computers that are not connected. When you
transfer data from a computer to the USB drive, the USB drive provides output
functionality. When you transfer data from a USB drive to the computer, the USB drive
provides input functionality.
NIC
NIC stands for the network interface card. A NIC is an input/output device. A computer
uses a NIC to connect the network. When the computer sends data to the network, it uses
the output function of the NIC. When the computer receives data from the network, it
uses the input function of the NIC.
The CPU is the brain of a computer, containing all the circuitry needed to process input,
store data, and output results. The CPU is constantly following instructions of computer
programs that tell it which data to process and how to process it. Without a CPU, we
could not run programs on a computer.
Micro Computers
The microcomputer is also recognized as a personal computer; these are comparatively
economical. Microcomputers are small computers incorporating a microprocessor,
Central Processing Unit (CPU), memory, storage area, an input unit, and an output unit.
It is a general-purpose computer that is outlined for personal use. Such computers are
made with minimum circuitry mounting over a single circuit board. They are fit for
personal work that may be making an assignment, at the office for office work, watching
a movie, etc. Examples include Desktop, Laptop, tablets, smartphones, etc.
Minicomputers are digital and multi-user computer systems with the connection of more
than one CPU. Thus, multiple users can work on these computers simultaneously. Mini-
frame computers are employed in institutes and work units for tasks such as billing,
accounting, and record management.
Mainframe Computer
Computers utilized by large organisations to manage bulk data are designated as
Mainframe computers. Mainframe computers are multi-programming, high-performance
and multi-user computers, which implies they can manage the workload of more than 100
users at a time on the computer.
The storage capability of the mainframe is enormous, with a high-speed data process as
well. The main purposes of such a type of computer include managing customer
statistics, census, and other heavy data in a single device.
Supercomputer
Supercomputers come under the biggest, fastest, powerful, and most expensive type of
computer for processing data type; they are designed to process an immense amount of
data. A supercomputer can treat trillions of instructions/directions in a second. It has
thousands of interconnected processors.
Examples: IBM Roadburner, INTEL ASIC RED. PARAM-1000, BM Blue Gene, and
CRAY-XMP-14.
Assignment
Software is a set of instructions, data or programs used to operate computers and execute
specific tasks. It is the opposite of hardware, which describes the physical aspects of a
computer. Software is a generic term used to refer to applications, scripts and programs
that run on a device. It can be thought of as the variable part of a computer, while
hardware is the invariable part.
The two main categories of software are application software and system software. An
application is software that fulfills a specific need or performs tasks. System software is
designed to run a computer's hardware and provides a platform for applications to run on
top of.
Other types of software include programming software, which provides the programming
tools software developers need; middleware, which sits between system software and
applications; and driver software, which operates computer devices and peripherals.
Early software was written for specific computers and sold with the hardware it ran on. In
the 1980s, software began to be sold on floppy disks, and later on CDs and DVDs.
Today, most software is purchased and directly downloaded over the internet. Software
can be found on vendor websites or application service provider websites.
Among the various categories of software, the most common types include the following:
Driver software. Also known as device drivers, this software is often considered a
type of system software. Device drivers control the devices and peripherals connected
to a computer, enabling them to perform their specific tasks. Every device that is
connected to a computer needs at least one device driver to function. Examples
include software that comes with any nonstandard hardware, including special game
controllers, as well as the software that enables standard hardware, such as USB
storage devices, keyboards, headphones and printers.
that has one kind of OS, to an application in a computer with a different OS. It also
enables newer applications to work with legacy ones.
4.2 Distinguish between the machine level, low – level and high – level languages
Both of these are types of programming languages that provide a set of instructions to a
system for performing certain tasks. Though both of these have specific purposes, they
vary in various ways. In this section, we will discuss the difference between high-level
and low-level languages. But before that, let us first know more about programming
languages and their purpose.
Programming languages define and compile a set of instructions for the CPU (Central
Processing Unit) for performing any specific task. Every programming language has a set
of keywords along with syntax- that it uses for creating instructions.
Till now, thousands of programming languages have come into form. All of them have
their own specific purposes. All of these languages have a variation in terms of the level
of abstraction that they all provide from the hardware. A few of these languages provide
less or no abstraction at all, while the others provide a very high abstraction. On the basis
of this level of abstraction, there are two types of programming languages:
Low-level language
High-level language
The primary difference between low and high-level languages is that any programmer
can understand, compile, and interpret a high-level language feasibly as compared to the
machine. The machines, on the other hand, are capable of understanding the low-level
language more feasibly compared to human beings.
One can easily interpret and combine these languages as compared to the low-level
languages.
They are very easy to understand.
Such languages are programmer-friendly.
Debugging is not very difficult.
They come with easy maintenance and are thus simple and manageable.
One can easily run them on different platforms.
They require a compiler/interpreter for translation into a machine code.
A user can port them from one location to another.
Such languages have a low efficiency of memory. So it consumes more memory
than the low-level languages.
They are very widely used and popular in today’s times.
Java, C, C++, Python, etc., are a few examples of high-level languages.
Ease of Execution These are very easy to execute. These are very difficult to
execute.
Efficiency of These languages have a very low These languages have a very
Memory memory efficiency. It means that high memory efficiency. It
they consume more memory than means that they consume less
any low-level language. energy as compared to any high-
level language.
Portability These are portable from any one A user cannot port these from
device to another. one device to another.
Speed of Execution High-level languages take more The translation speed of low-
time for execution as compared to level languages is very high.
low-level languages because these
require a translation program.
Need of Hardware One does not require a knowledge Having knowledge of hardware
of hardware for writing programs. is a prerequisite to writing
programs.
1. Compiler
The language processor that reads the complete source program written in high-level
language as a whole in one go and translates it into an equivalent program in machine
language is called a Compiler. Example: C, C++, C#.
In a compiler, the source code is translated to object code successfully if it is free of
errors. The compiler specifies the errors at the end of the compilation with line numbers
when there are any errors in the source code. The errors must be removed before the
compiler can successfully recompile the source code again the object program can be
executed number of times without translating it again.
2. Assembler
The Assembler is used to translate the program written in Assembly language into
machine code. The source program is an input of an assembler that contains assembly
language instructions. The output generated by the assembler is the object code or
machine code understandable by the computer. Assembler is basically the 1st interface
that is able to communicate humans with the machine. We need an assembler to fill the
gap between human and machine so that they can communicate with each other. code
written in assembly language is some sort of mnemonics(instructions) like ADD, MUL,
MUX, SUB, DIV, MOV and so on. and the assembler is basically able to convert these
mnemonics in binary code. Here, these mnemonics also depend upon the architecture of
the machine.
For example, the architecture of intel 8085 and intel 8086 are different.
3. Interpreter
The translation of a single statement of the source program into machine code is done
by a language processor and executes immediately before moving on to the next line is
called an interpreter. If there is an error in the statement, the interpreter terminates its
translating process at that statement and displays an error message. The interpreter
moves on to the next line for execution only after the removal of the error. An
Interpreter directly executes instructions written in a programming or scripting
language without previously converting them to an object code or machine code. An
interpreter translates one line at a time and then executes it.
Example: Perl, Python and Matlab.
Assignment
Its semantics are quite tough. Its semantics are very simple.
Iterative loops and Recursive calls both are Recursive calls are used in Non-
used in the Procedural languages. Procedural languages.
Computer security refers to measures and controls that ensure the confidentiality,
integrity and availability of the information processed and stored by a computer. This
includes everything from protecting physical information assets, to data security and
computer safety practices.
1. Data theft
Most personal and enterprise computer systems are enticing targets for hackers. Data
theft involves accessing secured, private data assets for the purpose of stealing the data
itself or gaining ongoing access to databases for the purpose of corporate espionage.
Denial of Service (DoS) attacks aim to shut down a machine or network with a flood of
traffic to make service unavailable for targeted users. Along the same line, Distributed
Denial of Service (DDoS) attacks are another common cybersecurity threat in which
multiple systems orchestrate an attack on a single target. These cyber threats are very
common and can be used to take down servers or render services inaccessible.
3. Malware
Short for malicious software, malware is a class of computer software designed to disrupt
a computer system in order to gain access to, take control over, steal or damage digital
assets. This cyber threat includes computer viruses, worms, trojan horses, ransomware
and many other malicious programs. These types of computer threats require ongoing
vigilance on the part of computer security professionals to keep systems safe, and to
adjust as new types of malware constitute new computer security threats.
4. Backdoors
No computer system is perfect, and many pieces of software contain backdoors (i.e.,
unintentional vulnerabilities that can give bad actors access to a system without going
through normal security procedures). Backdoors can be added for legitimate reasons, or
they can be the result of poor development or configuration practices — either way, they
constitute a cybersecurity threat that must be addressed. Finding, detecting and
Computer security is often considered an “arms race,” in that computer security experts
develop tools and procedures to combat the top cybersecurity threats in the field, while
bad actors come up with new ways to exploit computer systems. Anyone interested in
working in cybersecurity needs to stay up-to-date on the latest types of computer security
threats and how to defend against them, making the field a great fit for anyone who loves
a challenge.
room outages. Many such incidents are the result of accidents that could be avoided by
following some simple IT rules for safety.
The University of Kansus, or KU, indicates that data center doors must be secured 24/7
in accordance with ISO 27001 standards. Unauthorized or unsupervised visitors are a
danger in the computer room, both to the equipment and to themselves. Unfamiliarity
with a data center environment and natural curiosity sometimes leads visitors to push
buttons or squeeze into tight places where they should not go. Either situation can result
in a loss of power, electrical shock or other injury. IT room rules should state that
visitors allowed to enter the IT room must be screened, and they need to be
accompanied by data center personnel at all times during the visit.
Computer rooms consume large amounts of electricity at high voltages. Most computer
rooms also house uninterruptible power supplies and power distribution units, both of
which handle high-voltage electricity. Add to these the many power cables that supply
the electricity to the servers and other equipment and you have an accident waiting to
happen. Computer room managers should mark all high-voltage equipment accordingly
and allow only qualified technicians to open those boxes.
temperature falls below 50 degrees, servers can fail. Even a small computer room can
get very hot without an adequate air conditioning system, humidity control and air ducts
that maintain a consistent temperature throughout the area.
Job Instructions
Each computer room employee should know the IT room rules that apply to his job, and
supervisors should periodically observe employees to ensure that they are following
proper procedures. Something as seemingly harmless as tossing a ball during a slow
time could hit a sprinkler valve, causing a torrent of water on running equipment – a
dangerous electrical shock hazard.
Assignment
5.4 Malware infections and prevention e.g. virus and worms, Trojan horses, and
spyware
Almost everyone is familiar with the term computer virus, but only a few might have
heard about the term malware. A computer virus is a type of malware. Malware
includes computer viruses, worms, Trojan horses, spyware, ransomware and many
others. In this post, we analyse the different types of malware including the
Wannacry, which is a form of ransomware.
What is a Malware?
Evolution of Malware
WE BELIEVE HARDWORK PLUS SACRIFICE FUEL SUCCESS. Page 55
CTE 111 INTRODUCTION TO COMPUTER & INFORMATION TECHNOL
Computer-enabled fraud and service theft evolved in parallel with the information
technology that enabled it.
The term malware was first used by computer scientist and security
research YisraelRadai in 1990.
Before the term malware, malicious software was referred to as computer viruses.
One of the first known examples of malware was the Creeper virus in 1971, which
was created as an experiment by BBN Technologies engineer Robert Thomas.
1. To steal information that can be readily monetized, such as login credentials, credit
card and bank account numbers,
2. And intellectual property such as computer software, financial algorithms, and trade
secrets.
3. To ransom money in Bitcoin, for example, Wannacry Ransomware.
4. Spy on computer users for an extended period without their knowledge, for
example, Reign Malware.
5. It may be designed to cause harm, often as sabotage for example Stuxnet.
6. Extort payment for example Cryptolocker.
Adware: The least dangerous and most lucrative Malware. Adware displays ads on
your computer.
Spyware: Spyware is software that spies on you, tracking your internet activities in
order to send advertising (Adware) back to your system.
Virus: A virus is a contagious program or code that attaches itself to another piece
of software, and then reproduces itself when that software is run. Most often this is
spread by sharing software or files between computers.
Spam: Spamming is a method of flooding the Internet with copies of the same
message. Most spams are commercial advertisements which are sent as an unwanted
email to users. Spams are also known as Electronic junk emails or junk newsgroup
postings. These spam emails are very annoying as it keeps coming every day and
keeps your mailbox full.
Worm: A program that replicates itself and destroys data and files on the computer.
Worms work to “eat” the system operating files and data files until the drive is
empty.
Trojan: A Trojan horse or Trojan is a type of malware that is often disguised as
legitimate software. Trojans are written with the purpose of discovering your
financial information, taking over your computer’s system resources, and in larger
systems creating a “denial-of-service attack” which is making a machine or network
resource unavailable to those attempting to reach it. Example: Google, AOL, Yahoo
or your business network becoming unavailable.
Backdoors: Backdoors are much the same as Trojans or worms, except that they
open a “backdoor” on a computer, providing a network connection for hackers or
other Malware to enter or for viruses or SPAM to be sent.
Rootkit: This one is likened to the burglar hiding in the attic, waiting to take from
you while you are not home. It is the hardest of all Malware to detect and therefore
to remove; many experts recommend completely wiping your hard drive and
reinstalling everything from scratch. It is designed to permit the other information
gathering Malware in to get the identity information from your computer without
you realising anything is going on.
Keyloggers: Records everything you type on your PC in order to glean your log-in
names, passwords, and other sensitive information, and send it on to the source of
the keylogging program. Many times keyloggers are used by corporations and
parents to acquire computer usage information.
Rogue security software: This one deceives or misleads users. It pretends to be a
good program to remove Malware infections, but all the while it is the Malware.
Often it will turn off the real Anti-Virus software.
Ransomware: If you see this screen that warns you that you have been locked out
of your computer until you pay for your cybercrimes. Your system is severely
infected with a form of Malware called Ransomware. Even if you pay to unlock the
system, the system is unlocked, but you are not free of it locking you out again.
Browser Hijacker: When your homepage changes to one that looks like those in
the images inserted next, you may have been infected with one form or another of a
Browser Hijacker. This dangerous Malware will redirect your normal search activity
and give you the results the developers want you to see. Its intention is to make
money off your web surfing. Using this homepage and not removing the Malware
lets the source developers capture your surfing interests.
Email: Cybercriminals are notorious for including malicious attachments and links
in emails that appear to come from friends, reputable organisations, or other trusted
sources. Some malicious emails can even infect your computer from the email
client’s preview pane, without your opening or be downloading an attachment or a
link.
The Internet: Surfing the Web may feel like a private activity, but in fact, you’re
exposing your computer to unwanted contact with anyone else who has a computer
and Internet access.
Outdated software: Malwares can crawl the Internet, looking for vulnerabilities of
outmoded software to spread its influence over computer systems.
Local Area Networks (LANs): A LAN is a group of locally connected computers
that can share information over a private network. If one computer becomes infected
with malware, all other computers in the LAN may quickly become infected as well.
Instant messaging (IM) and peer-to-peer (P2P) file-sharing systems: If one is
using a client for these online activities, malware may spread to your computer.
Social networks: Malware authors take advantage of many popular social
networks, infecting the massive user-data networks with worms. If a social website
account is infected with a worm, just about anyone who visits a poster’s profile page
could “catch” the worm on her system.
Pop-ups: Some of the most sophisticated malware spreads through well-disguised
screen pop-ups that look like genuine alerts or messages. One particularly devious
and widespread “hoax pop-up” claims to have scanned your computer and detected
malware. If you attempt to remove the malware as urged, you’ll actually install the
malware.
Computer storage media: Malware can be easily spread if you share computer
storage media with others, such as USB drives, DVDs, and CDs. While it may seem
safe to open a CD of photos from a colleague, it’s always best to scan unfamiliar
files first for possible corruptions or security risks before you copy or open them.
Mobile devices: Mobile malware threats have become increasingly prevalent, as
more people use their smartphones and tablets as mini-computers, helping malware
problems proliferate across additional platforms.
What is WannaCry?
According to some statistics, hackers extorted business and institutions for more
than $209 million in Ransomware payments in the first three months of 2016. The
business of Ransomware is on pace to be a $1 billion a year crime.
Shadow Brokers: People (Hackers) behind these attacks call themselves by this
term.
Severely affected:
It is said by Wikileaks that National Security Agency (NSA) of USA had these
methods to have monitored over subjects.
This loophole was recently leaked by WikiLeaks.
The same vulnerability of Windows Operating system was used by ransomware.
However, Microsoft had released the security patches for the same earlier.
Regular Data Backup: This helps restore the last saved data and minimise data
loss. Ransomware also attacks servers; hence it is important to have a backup on a
disconnected hard drive or external device on the pre-defined regular basis.
Prevention: To prevent infiltration of malware, having password protected tools to
identify and filter certain file extensions like “.exe” or “. Zip”, are essential. Emails
that appear suspicious should also be filtered at the exchange level. There are also
some tools that detect the entry of such malware with features of zero days’
protection which work on threat emulation and threat extraction techniques. Users
and businesses also need to ensure that hidden file extension is displayed since it
becomes easier to filter them.
User awareness: Awareness among users needs to be created to avoid opening the
unsolicited attachment. Malware is typically designed to mimic identities of people
that users interact with on a regular basis either on a personal or professional level.
WE BELIEVE HARDWORK PLUS SACRIFICE FUEL SUCCESS. Page 62
CTE 111 INTRODUCTION TO COMPUTER & INFORMATION TECHNOL
Rules in IPS: It’s necessary to create rules in the Intrusion Prevention Software
(IPS) to discard or disallow the opening of files with extension “.exe” from local
App data folders or AppData.
Regular patch and upgrades: To prevent leaks or vulnerabilities in software,
ensure to regularly update the software versions and apply patches released by the
vendor. These patches and version are often released to wrestle with known or
newly discovered exploits and can prevent known signatures of these malware,
Trojans or ransomware to enter the system.
Install and run anti-malware and firewall software. When selecting software,
choose a program that offers tools for detecting, quarantining, and removing
multiple types of malware.
The combination of anti-malware software and a firewall will ensure that all
incoming and existing data gets scanned for malware and that malware can be safely
removed once detected.
Keep software and operating systems up to date with current vulnerability
patches. These patches are often released to patch bugs or other security flaws that
could be exploited by attackers.
Be vigilant when downloading files, programs, attachments, etc. Downloads that
seem strange or are from an unfamiliar source often contain malware.
National Cyber Security Policy 2013: Indian Government already have a National
Cyber Security Policy in place. The National Cyber Security Policy document
outlines a roadmap to create a framework for comprehensive, collaborative and
collective response to deal with the issue of cyber security at all levels within the
country.
Computer Emergency Response Team (CERT-In) has been designated to act as a
nodal agency for coordination of crisis management efforts. CERT-In will also act
as an umbrella organisation for coordination actions and operationalization of
sectoral CERTs. CERT-in will also issue early warnings.
Cyber Swachhta Kendra: The “Cyber Swachhta Kendra” is a Botnet Cleaning and
Malware Analysis Centre (BCMAC), operated by the Indian Computer Emergency
Response Team (CERT-In) as part of the Government of India’s Digital India
initiative under the Ministry of Electronics and Information Technology (MeitY). Its
goal is to create a secure cyberspace by detecting botnet infections in India and to
notify, enable cleaning and securing systems of end users so as to prevent further
infections.
Antivirus programs help prevent viruses and spyware from infecting a computer and
therefore are one of the essential programs each computer should have running at all
times. There are thousands of viruses and spyware on the Internet, and any one of them
can cause damage to personal files or the computer's operating system.
If your computer does not have an antivirus program installed and running, we highly
recommend you install one today. Follow the steps below for help on how to install and
update an antivirus program on your computer.
Tip
All new versions of Microsoft Windows now include Windows Defender to help protect
your computer from viruses.
file, unzip the file to extract and access the installation files. Look for a file
named setup.exe, install.exe, or something similar, then double-click that
file. The installation process should start, with a window opening to help
guide you through the install process.
3. In the installation process window, follow the steps provided to install the
antivirus program. The install process provides recommended options so
the antivirus program will function properly, which in most cases can be
accepted as is. The one exception is if the install process recommends to
install any toolbars for Internet browsers or other helpful programs for
your computer. If prompted to install other software with the antivirus
program, uncheck all boxes or decline the install of those extra programs.
No additional programs should be needed for the antivirus program to
install and run successfully on your computer.
4. When the install process is complete, close out of the install window.
The antivirus program is now installed and ready to use. While it may not be required, we
recommend restarting your computer so that any modified settings in the operating
system can take effect correctly.
Out of the box, antivirus programs are not up-to-date and are missing the latest virus and
spyware definitions. Without the latest definitions, the antivirus program will not know
about the most recently created viruses and spyware, making your computer vulnerable to
an infection.
After installing the antivirus program, we highly recommend you update it with the latest
virus and spyware definitions. The updates allow the antivirus program to protect your
computer from all viruses and spyware.
In many cases, the antivirus program automatically checks for and installs the latest
updates. If prompted to do so, select Yes to update the antivirus program. If it does not
prompt you to update immediately.
By default, most antivirus programs enable the automatic update feature. We strongly
recommend automatic updates be enabled to keep the antivirus program up-to-date at all
times.
To check if automatic updates are enabled in your antivirus program, follow the general
steps below.
4. For the automatic updates option, check the box for that option, if not
already checked.
Assignment
5.9 Explain system vulnerabilities, attacks, and how to mitigate against them
Alternatively called human factors, ergonomics is the study and design of products that
reduce stress and improve comfort to the user, helping increase the users' productivity.
The picture below is an example of an ergonomic keyboard or Natural
Keyboard from Microsoft that helps relieve carpal tunnel syndrome.
There are many potential health risks of working at a computer frequently. Your
computer set up is one element of office work or home working that should be considered
when preventing injury. Following the correct computer ergonomics can minimise your
risk of computer vision syndrome and other injuries.
Placing your computer monitor so it is not level with your eyeline is a common cause of
computer vision syndrome and back and neck injury. To avoid health issues and screen
glare, position computer monitors and display screens so they are:
around an arm’s length away from your body to prevent computer vision syndrome
If you struggle to place your computer in the right position for your eyeline, you may
benefit from an adjustable monitor arm. Using an adjustable monitor arm can help
promote and enhance comfort and performance, minimising health risks.
RECOMMENDED PRODUCT
To prevent headaches and computer vision syndrome, you should ensure you adjust your
monitor so that its brightness is approximately equal to the area behind it. If you find
yourself experiencing computer vision frequently, it may be time to adjust your computer
screen brightness.
If you still experience screen glare, you can cover your computer with an anti-glare filter
and wear anti-glare glasses.
The mouse should be positioned so it keeps your arms at or below a 90-degree angle.
Your wrists should not be straining, nor should they feel uncomfortable during use. The
image below demonstrates how a hand should be placed comfortably on the mouse:
If you still uncomfortable holding the mouse, you can invest in a wrist rest.
Ergonomic experts recommend placing a keyboard just below elbow level. Your
keyboard should be flat on the desk, or gently sloping away from you. You should
position your keyboard so your elbows and arms remain as close to your sides as
possible. Your arms should sit at or below a 90-degree angle.
If you struggle to maintain the correct keyboard placement and work comfortably, an
ergonomic keyboard should be used to achieve a negative tilt. This means the keyboard
will be sloping down and away from you, so your arms and hand follow the downward
slope of your thighs.
You should organise your ergonomic computer workstation so that key objects are close
to you. This could include your phone, notebook, water bottle and any other essential
items. This will prevent unnecessary reaching and straining.
Using a hands-free headset can prevent strains from placing our hands in the same
position frequently when we answer the phone. It can also prevent shoulder pain if we
avoid tucking the phone between our shoulders and ears, which is a common mistake.
You can check your desk is at the right height by resting your arms at your sides in your
seating position at your desk. Keep your elbow at a 90-degree angle and your upper arms
in line with your torso. Your hands should be rested comfortably on your desk if your
desk is at the right height
Ergonomic lighting is often ignored in an office, leaving employees to work under harsh,
bright lighting. Poor lighting can contribute to headaches, eye pain, tiredness, and un-
productivity. Computer desk lighting ergonomics ensures a person is working under
lighting that is adequate and not too bright or faulty.
Standing can reduce back and neck pain as it provides the chance to stretch your
muscles
Combining standing and sitting throughout the day can reduce the risk of leg aches and
cramps
With the current COVID 19 pandemic, many of us are now working from home and
unable to go into our offices. When working from home, it can be hard to know the best
position to work in and the right equipment placement.
If you can, avoid working from a laptop. Working from a laptop often means you are
looking down and are therefore at risk of neck and back pain. The smaller screen of a
laptop often also means we are tempted to place it closer to our eyes than necessary.
When working from home, it can be tempting to be more relaxed about the placement of
your monitor. However, try and work in the same way as you would in the office. Follow
our guidance on the correct monitor placement to reduce the risk of injury and health
issues.
Not only can working away from a proper desk reduce your motivation and productivity;
it can also be a cause of back and neck pain. When you are working in your bed or on the
sofa, your neck is not fully supported by an effective ergonomic office chair. Working
away from your desk also means your monitor or laptop is not positioned so it meets your
eye line, increasing the risk of injuries and computer vision syndrome.
Networks are systems that are formed by links. For example, roads that connect groups of
people together create a physical network. Connections with your friends create your
personal network. Websites that allow individuals to link to each other’s pages are called
social networking sites.
Computer networking refers to the practice of connecting computers and other digital
devices together to share resources and exchange information. It involves the use of
hardware and software technologies that enable communication between computers and
other devices, whether they are located in the same physical location or are
geographically dispersed.
A computer network allows for the sharing of resources such as printers, files, and
data storage, as well as the ability to communicate with other computers and access the
internet. Networking also enables collaboration between individuals and groups, and
supports the transfer of data and information across a variety of platforms and devices.
There are several types of computer networks, including local area networks (LANs),
wide area networks (WANs), metropolitan area networks (MANs), and wireless
networks. Each type of network has its own characteristics and benefits, and can be
used in different settings depending on the needs of the users.
Computer networking has become an essential component of modern society, and plays
a critical role in the functioning of businesses, governments, and individuals alike. As
technology continues to advance, computer networking will continue to evolve and play
an increasingly important role in our daily lives.
In today’s world computer has become an integral part of the business sector for
professional activities not only for professional activities but for personal activities also.
As technologies have evolved networking came into the picture and slowly from initial
wired network technology we moved to this wireless network technology. Now if we
will think then we can know that networking impacts everything. Computer Network is
an interconnection between computers or we can say computer network is group of
computers linked to each other which enables one computer to communicate with
another computer. It acts as basis of communication in Information Technology (IT). It
is system of connected computing devices and shares information and resources
between them. The devices in network are connected by communication links
(wired/wireless) and share data by Data Communication System. There are several
types of computer networks are there, typical differences in between different types of
computer networks lies in the geographical areas they serve and their core purpose. An
example of computer network includes let us think about classroom and in class, two
friends are there with their own laptops, but communication between two processes is
established even if the two laptops are physically separated means they are in computer
network. Another example may be to let us think about our college office suppose there
are four computers and each computer generates some print jobs daily. Without
networking four computers needs four separate printers, one printer for each computer
to meet print requirement. But actually it is not if we will see all four computers are
connected to only one printer with the help of networking. Let us keep word computer
network away for some time and think about Internet then only we can know what is the
need of internet nowadays and how much important it is for our life. Starting from day
to the end of the day everyone uses Internet for their work and this internet is nothing
WE BELIEVE HARDWORK PLUS SACRIFICE FUEL SUCCESS. Page 77
CTE 111 INTRODUCTION TO COMPUTER & INFORMATION TECHNOL
but vast network that connects computers all over the world. So now I think we have
understood importance of computer networks in our daily life. Computer networking
has its various functionalities, goals, and advantages and disadvantages with it but
importance of it is truly unique. Let us go into little bit detail and know about
importance of computer networks to great extent.
Network gaming.
Voice over IP (VoIP).
Media Center Server.
Centralize network administration, meaning less IT support.
Flexibility.
Allowing information sharing.
Supporting distributed processing.
User communication.
Overcoming geographic separation.
Computer networking has also played a crucial role in the development of new
technologies like cloud computing, big data analytics, and the Internet of Things have
all benefited greatly from computer networking (IoT). Businesses are now able to
gather and analyse enormous volumes of data, automate their procedures, and make
better choices faster thanks to these technologies.
4. Internet access: Computer networks provide access to the internet, which is essential
for many businesses and individuals. This allows users to browse websites, access
online resources, and communicate with others around the world.
5. Data sharing: Networks allow for the sharing of data and information, whether
between users in the same organization or between different organizations. This can be
valuable for data analysis, research, and other applications that require access to large
amounts of information.
6.2 Different types of network topologies such as star, ring and bus
In Computer Network ,there are various ways through which different components are
connected to one another. Network Topology is the way that defines the structure, and
how these components are connected to each other.
Types of Network Topology
The arrangement of a network that comprises nodes and connecting lines via sender and
receiver is referred to as Network Topology. The various network topologies are:
Point to Point Topology
Mesh Topology
Star Topology
Bus Topology
Ring Topology
Tree Topology
Hybrid Topology
Mesh Topology
Mesh Topology
Figure 1: Every device is connected to another via dedicated channels. These channels
are known as links.
Suppose, the N number of devices are connected with each other in a mesh topology,
the total number of ports that are required by each device is N-1. In Figure 1, there
are 5 devices connected to each other, hence the total number of ports required by
each device is 4. The total number of ports required = N * (N-1).
Suppose, N number of devices are connected with each other in a mesh topology,
then the total number of dedicated links required to connect them is NC2 i.e.
N(N-1)/2. In Figure 1, there are 5 devices connected to each other, hence the total
number of links required is 5*4/2 = 10.
Advantages of Mesh Topology
Star Topology
In Star Topology, all the devices are connected to a single hub through a cable. This
hub is the central node and all other nodes are connected to the central node. The hub
can be passive in nature i.e., not an intelligent hub such as broadcasting devices, at the
same time the hub can be intelligent known as an active hub. Active hubs have repeaters
in them. Coaxial cables or RJ-45 cables are used to connect the computers. In Star
Topology, many popular Ethernet LAN protocols are used as CD(Collision Detection),
CSMA (Carrier Sense Multiple Access), etc.
Star Topology
Figure 2: A star topology having four systems connected to a single point of connection
i.e. hub.
Advantages of Star Topology
If N devices are connected to each other in a star topology, then the number of
cables required to connect them is N. So, it is easy to set up.
Each device requires only 1 port i.e. to connect to the hub, therefore the total number
of ports required is N.
It is Robust. If one link fails only that link will affect and not other than that.
Easy to fault identification and fault isolation.
Star topology is cost-effective as it uses inexpensive coaxial cable.
Drawbacks of Star Topology
If the concentrator (hub) on which the whole topology relies fails, the whole system
will crash down.
The cost of installation is high.
Performance is based on the single concentrator i.e. hub.
A common example of star topology is a local area network (LAN) in an office where
all computers are connected to a central hub. This topology is also used in wireless
networks where all devices are connected to a wireless access point.
Bus Topology
Bus Topology is a network type in which every computer and network device is
connected to a single cable. It is bi-directional. It is a multi-point connection and a non-
robust topology because if the backbone fails the topology crashes. In Bus Topology,
various MAC (Media Access Control) protocols are followed by LAN ethernet
connections like TDMA, Pure Aloha, CDMA, Slotted Aloha, etc.
Bus Topology
Figure 3: A bus topology with shared backbone cable. The nodes are connected to the
channel via drop lines.
Advantages of Bus Topology
If N devices are connected to each other in a bus topology, then the number of cables
required to connect them is 1, known as backbone cable, and N drop lines are
required.
Coaxial or twisted pair cables are mainly used in bus-based networks that support up
to 10 Mbps.
WE BELIEVE HARDWORK PLUS SACRIFICE FUEL SUCCESS. Page 86
CTE 111 INTRODUCTION TO COMPUTER & INFORMATION TECHNOL
The cost of the cable is less compared to other topologies, but it is used to build
small networks.
Bus topology is familiar technology as installation and troubleshooting techniques
are well known.
CSMA is the most common method for this type of topology.
Drawbacks of Bus Topology
A bus topology is quite simpler, but still, it requires a lot of cabling.
If the common cable fails, then the whole system will crash down.
If the network traffic is heavy, it increases collisions in the network. To avoid this,
various protocols are used in the MAC layer known as Pure Aloha, Slotted Aloha,
CSMA/CD, etc.
Adding new devices to the network would slow down networks.
Security is very low.
A common example of bus topology is the Ethernet LAN, where all devices are
connected to a single coaxial cable or twisted pair cable. This topology is also used in
cable television networks.
Ring Topology
In a Ring Topology, it forms a ring connecting devices with exactly two neighboring
devices. A number of repeaters are used for Ring topology with a large number of
nodes, because if someone wants to send some data to the last node in the ring topology
with 100 nodes, then the data will have to pass through 99 nodes to reach the 100th
node. Hence to prevent data loss repeaters are used in the network.
The data flows in one direction, i.e. it is unidirectional, but it can be made bidirectional
by having 2 connections between each Network Node, it is called Dual Ring Topology.
In-Ring Topology, the Token Ring Passing protocol is used by the workstations to
transmit the data.
Ring Topology
Figure 4: A ring topology comprises 4 stations connected with each forming a ring.
3. When no station is transmitting the data, then the token will circulate in the ring.
4. There are two types of token release techniques: Early token release releases the
token just after transmitting the data and Delayed token release releases the token
after the acknowledgment is received from the receiver.
Advantages of Ring Topology
The data transmission is high-speed.
The possibility of collision is minimum in this type of topology.
Cheap to install and expand.
It is less costly than a star topology.
Drawbacks of Ring Topology
The failure of a single node in the network can cause the entire network to fail.
Troubleshooting is difficult in this topology.
The addition of stations in between or the removal of stations can disturb the whole
topology.
Less secure.
Tree Topology
This topology is the variation of the Star topology. This topology has a hierarchical
flow of data. In Tree Topology, protocols like DHCP and SAC (Standard Automatic
Configuration ) are used.
Tree Topology
Figure 5: In this, the various secondary hubs are connected to the central hub which
contains the repeater. This data flow from top to bottom i.e. from the central hub to the
secondary and then to the devices or from bottom to top i.e. devices to the secondary
hub and then to the central hub. It is a multi-point connection and a non-robust topology
because if the backbone fails the topology crashes.
Advantages of Tree Topology
It allows more devices to be attached to a single central hub thus it decreases the
distance that is traveled by the signal to come to the devices.
It allows the network to get isolated and also prioritize from different computers.
We can add new devices to the existing network.
Error detection and error correction are very easy in a tree topology.
Drawbacks of Tree Topology
If the central hub gets fails the entire system fails.
The cost is high because of the cabling.
If new devices are added, it becomes difficult to reconfigure.
Hybrid Topology
This topological technology is the combination of all the various types of topologies we
have studied above. Hybrid Topology is used when the nodes are free to take any form.
It means these can be individuals such as Ring or Star topology or can be a combination
of various types of topologies seen above. Each individual topology uses the protocol
that has been discussed earlier.
Hybrid Topology
Figure 6: The above figure shows the structure of the Hybrid topology. As seen it
contains a combination of all different types of networks.
All three of these are similar yet different in various aspects- the significant difference
being their geographical locations coverage. WAN covers the largest area, MAN
comprises more area than LAN, and LAN only covers a small area.
What is LAN?
The rate of data transmission is very high because it links to a very limited number of
computers. These connections exhibit a higher speed and require relatively inexpensive
hardware (for example, network adapters, hubs, Ethernet cables, etc.). A LAN covers a
very small area of about a few kilometers, and people own them privately for home,
office buildings, schools, hospitals, etc. It is very easy for people to design a LAN and
maintain it. The communication medium that it uses has coaxial cables and twisted-pair
cables. It also has minimal noise and error due to its short distance coverage.
Data rates in early LAN ranged from 4 Mbps to 16 Mbps. This speed extends to approx
100-1000 Mbps today. The LAN has a very short propagation delay. It relies typically on
wired connections (to attain better security and speed), but it may also comprise wireless
connections. The smallest of LANs may make use of just two computers, and the larger
ones may accommodate thousands of them. Users experience high fault tolerance and
low congestion in a LAN network (like a few students playing together in the same
room).
What is MAN?
It is an abbreviation for Metropolitan Area Network. It covers a smaller area than that of
WAN and a larger area as compared to a LAN. A MAN basically connects two devices
(or more) that reside apart but in the same or different cities. It may also serve as an
Internet Service Provider (ISP), and it basically covers a larger geographical area.
Customers who need a better speed and higher-quality connectivity opt for MAN. They
are very hard to maintain and design, and their speeds range in terms of Megabytes Per
Second (Mbps).
MAN shows lesser fault tolerance and more congestion in the network. It also exhibits a
moderate rate of data transfer and propagation delay. A single organization may or may
not own a MAN, as it is very costly. It makes use of devices like Cable/Wire and Modem
for data transmission. A significant example of a MAN is those telephone company
networks that are capable of providing high-speed lines (DSL) to a cable TV network or
customers in any given city.
What is WAN?
It stands for Wide Area Network. It basically extends over large areas, but it might stay
confined within a state or a country’s boundaries. A connection of various LANs may
also constitute a WAN. They may connect to each other using radio waves and telephone
lines. A WAN typically may stay limited to any enterprise (an organization or a
corporation) or may even be accessible to the general public. It comes with a technology
that is very expensive and relatively high-speed.
WANs are basically of two types: Point-to-Point WAN and Switched WAN. It is also
very difficult to maintain as well as design a WAN. The fault tolerance is also very less,
just like MAN, and it brings more congestion in a network. The communication medium
deployed for WAN is the Satellite Link or Public Switched Telephone Network (PSTN).
The usual long-distance transmission leads to a higher error and voice in a WAN.
The data rate concerning a WAN is comparatively slower than LAN- about a tenth of its
speed. It is because of the higher distance that it covers and more number of terminals,
servers, etc. The speed of transmission may range in a WAN from a few Kbps (Kilobits
per second) to Mbps (Megabits per second). One of the biggest issues that WAN faces is
the propagation delay. A few devices that help in data transmission via WAN are:
Satellites, Microwaves, and Optic wires. One example of a Point-to-Point WAN is the
dial-up line connecting any home computer to the Internet. One example of a Switched
WAN is the ATM (Asynchronous Transfer Mode) Network.
Full Form LAN is an acronym for MAN is an acronym WAN is an acronym for
Local Area Network. for Metropolitan Area
Network The LAN is private. The MAN can be The WAN can also be
Ownership Hospitals, homes, both private or both private or public.
schools, offices, etc., public. Many
may own it. organizations and
telecom operators
may own them.
Maintenance and Very easy to design and Comparatively Very difficult to design
Designing maintain. difficult to design and and maintain.
maintain.
Speed LAN offers a very high MAN offers a WAN offers a low
Internet speed. moderate Internet Internet speed.
speed.
Faulty Tolerance The LAN exhibits a The MAN exhibits a The WAN also exhibits
better fault tolerance lesser fault tolerance. a lesser fault tolerance.
than the rest of the
networks.
The main components of a Local Area Network (LAN) are computers, network devices,
cables, switches, routers, and a server.
A Local Area Network (LAN) is a group of computers and other devices that share a
common communications line or wireless link and typically share the resources of a
single processor or server within a small geographic area. The main components of a
LAN are computers, network devices, cables, switches, routers, and a server.
Computers are the primary component of a LAN. They are the devices that utilise the
network to share resources and communicate with each other. These can be desktop
computers, laptops, or even mobile devices like smartphones and tablets. Each computer
on the network is considered a node.
Network devices are essential for communication between computers. These include
Network Interface Cards (NICs), which are hardware devices that handle an interface
to a network and allow a network-capable device to connect to the network. They convert
data packets between the computer and the network data format.
Cables are used to connect the devices on the network. The most common types of
network cables used in a LAN are Ethernet cables, which are used to connect devices like
computers, routers, and switches within a local area network.
Switches are another crucial component of a LAN. They are networking devices that
connect devices on a computer network by using packet switching to receive and forward
data to the destination device. Switches allow different devices on a network to
communicate efficiently.
Routers are used to connect multiple networks and route network traffic between them.
In a LAN, a router will typically connect the local network to the internet, allowing
devices on the LAN to access the internet.
Week 9-11: Understand the principles and uses of the internet technologies
The Internet commonly referred to as the “Net?” is better described than defined, as a
global network of computers. It is often described as a network of networks because it
first began through the linking of the existing local computer networks used by
universities and governmental organizations. The Internet is a constellation of computers
around the world that speak the same language so information travels seamlessly from
one computer to another. Globally, the Internet connects scientific research, educational,
government, commercial and business networks. When you connect to the Internet, your
computer becomes part of the global network of computers. The Internet is more than a
technological marvel. The peace is quick, with messages and information racing round
the world in a few seconds. It has ushered in an era of sweeping changes in networking
and communication that has left no business, agency, organization or government
untouched.
The Internet is a globally connected network system that facilitates communication and
data services through a vast collection of private, public, business, academic, and
government networks.
The Internet is decentralized, which means there is no central authority governing its
operations. To enable communication between devices, the internet relies
on protocols and standards that govern how small units of data are formatted, addressed,
and transmitted.
The terms internet and World Wide Web (WWW) are often used as synonyms, but
technically they are not the same thing. The Internet is a global network of interconnected
computers and networks. The World Wide Web is a service that uses the Internet’s
infrastructure to provide digital devices and applications with access to websites. Popular
internet services include email, VoIP (Voice over IP), and SMS (Short Message Service).
The Internet is the foremost important tool and the prominent resource that is being
used by almost every person across the globe. It connects millions of computers,
webpages, websites, and servers. Using the internet, we can send emails, photos, videos,
and messages to our loved ones. Or in other words, the Internet is a widespread
interconnected network of computers and electronic devices (that support Internet). It
creates a communication medium to share and get information online. If your device is
connected to the Internet then only you will be able to access all the applications,
websites, social media apps, and many more services. The Internet nowadays is
considered the fastest medium for sending and receiving information.
The Internet came in the year 1960 with the creation of the first working model
called ARPANET (Advanced Research Projects Agency). It allowed multiple
computers to work on a single network which was their biggest achievement at that
time. ARPANET uses packet switching to communicate multiple computer systems
under a single network. In October 1969, using ARPANET first message was
transferred from one computer to another. After that technology continues to grow.
search bar of the browser the request will be sent to the server and that server will try to
find the IP address from the Domain name because it cannot understand the domain
name. After getting the IP address the server will try to search the IP address of the
Domain name in a Huge phone directory that in networking is known as a DNS server
(Domain Name Server). For example, if we have the name of a person and we can
easily find the Aadhaar number of him/her from the long directory as simple as that.
So after getting the IP address, the browser will pass on the further request to the
respective server and now the server will process the request to display the content of
the website which the client wants. If you are using a wireless medium of Internet like
3G and 4G or other mobile data then the data will start flowing from the optical cables
and will first reach towers from there the signals will reach your cell phones and PCs
through electromagnetic waves and if you are using routers then optical fiber
connecting to your router will help in connecting those light-induced signals to
electrical signals and with the help of ethernet cables internet reaches your computers
and hence the required information.
What is an IP Address?
IP Address stands for Internet Protocol Address. Every PC/Local machine is having an
IP address and that IP address is provided by the Internet Service Providers (ISPs).
These are some sets of rules which govern the flow of data whenever a device is
connected to the Internet. It differentiates computers, websites, and routers. Just like
human identification cards like Aadhaar cards, Pan cards, or any other unique
identification documents. Every laptop and desktop has its own unique IP address for
identification. It’s an important part of Internet technology. An IP address is displayed
as a set of four-digit like 192.154.3.29. Here each number on the set ranges from 0 to
255. Hence, the total IP address range from 0.0.0.0 to 255.255.255.255.
You can check the IP address of your Laptop or desktop by clicking on the Windows
start menu -> then right-click and go to network -> in that go to status and then
Properties you can see the IP address. There are four different types of IP addresses are
available:
1. Static IP Address
2. Dynamic IP Address
3. Private IP Address
4. Public IP Address
World Wide Web (WWW)
The world wide web is a collection of all the web pages, and web documents that you
can see on the Internet by searching their URLs (Uniform Resource Locator) on the
Internet. For example, www.geeksforgeeks.org is the URL of the GFG website, and all
the content of this site like webpages and all the web documents are stored on the world
wide Web. Or in other words, the world wide web is an information retrieval service of
the web. It provides users with a huge array of documents that are connected to each
other by means of hypertext or hypermedia links. Here, hyperlinks are known as
electronic connections that link the related data so that users can easily access the
related information hypertext allows the user to pick a word or phrase from text, and
using this keyword or word or phrase can access other documents that contain
additional information related to that word or keyword or phrase. World wide web is a
project which is created by Timothy Berner’s Lee in 1989, for researchers to work
together effectively at CERN. It is an organization, named World Wide Web
Consortium (W3C), which was developed for further development in the web.
The world wide web is a subset of The Internet is the superset of the world wide web.
the Internet.
The world wide web uses HTTP. The Internet uses IP Addresses.
The world wide web can be The Internet can be considered a Library.
considered as a book from the
different topics inside a Library.
Online Businesses (E-commerce): Online shopping websites have made our life
easier, e-commerce sites like Amazon, Flipkart, and Myntra are providing very
spectacular services with just one click and this is a great use of the Internet.
Cashless Transactions: All the merchandising companies are offering services to
their customers to pay the bills of the products online via various digital payment
apps like Paytm, Google Pay, etc. UPI payment gateway is also increasing day by
day. Digital payment industries are growing at a rate of 50% every year too because
of the INTERNET.
Education: It is the internet facility that provides a whole bunch of educational
material to everyone through any server across the web. Those who are unable to
attend physical classes can choose any course from the internet and can have point-
to-point knowledge of it just by sitting at home. High-class faculties are teaching
online on digital platforms and providing quality education to students with the help
of the Internet.
Social Networking: The purpose of social networking sites and apps is to connect
people all over the world. With the help of social networking sites, we can talk, and
share videos, and images with our loved ones when they are far away from us. Also,
we can create groups for discussion or for meetings.
Entertainment: The Internet is also used for entertainment. There are numerous
entertainment options available on the internet like watching movies, playing games,
listening to music, etc. You can also download movies, games, songs, TV Serial,
etc., easily from the internet.
Security and the Internet
Very huge amount of data is managed across the Internet almost the time, which leads
to the risk of data breaching and many other security issues. Both Hackers and
Crackers can lead to disrupting the network and can steal important information like
Login Credentials, Banking Credentials, etc.
keeping our data anonymous, that helps in protecting user security, and helps in
reducing cybercrime.
Social Impact of the Internet
The social impact of the Internet can be seen in both ways. Some say it has a positive
impact as it helps in gaining civic engagement, etc. whereas some say it has a negative
impact as it increased the risk of getting fooled by someone over the internet, getting
withdrawal from society, etc.
Whatever the impact of Social Media, one thing is that it changed the way of connecting
and interacting with others in society. The number of people increasing day by day on
social media platforms which helps in constructing new relationships over social media,
new communities are made on social media in the interest of the people. Social Media
platforms like Facebook, Instagram, LinkedIn, etc are the most used social media
platform for both individual and business purposes where we can communicate with
them and perform our tasks.
New Job Roles: The Internet has given us access to social media, and digital
products so we are having numerous new job opportunities like digital marketing
and social media marketing online businesses are earning huge amounts of money
just because the Internet is the medium to help us to do so.
Best Communication Medium: The communication barrier has been removed from
the Internet. You can send messages via email, Whatsapp, and Facebook. Voice
chatting and video conferencing are also available to help you to do important
meetings online.
Comfort to humans: Without putting any physical effort you can do so many things
like shopping online it can be anything from stationeries to clothes, books to
personal items, etc. You can books train and plane tickets online.
GPS Tracking and google maps: Yet another advantage of the internet is that you
are able to find any road in any direction, and areas with less traffic with the help of
GPS on your mobile.
Disadvantages of the Internet
Time Wastage: Wasting too much time on the internet surfing social media apps
and doing nothing decreases your productivity rather than wasting time on scrolling
social media apps one should utilize that time in doing something skillful and even
more productive.
Bad Impacts on Health: Spending too much time on the internet causes bad impacts
on your health physical body needs some outdoor games exercise and many more
things. Looking at the screen for a longer duration causes serious impacts on the
eyes.
Cyber Crimes: Cyberbullying, spam, viruses, hacking, and stealing data are some
of the crimes which are on the verge these days. Your system which contains all the
confidential data can be easily hacked by cybercriminals.
Effects on Children: Small children are heavily addicted to the Internet watching
movies, and games all the time is not good for their overall personality as well as
social development.
Bullying and Spreading Negativity: The Internet has given a free tool in the form
of social media apps to all those people who always try to spread negativity with
very revolting and shameful messages and try to bully each other which is wrong.
7.2 The processes involved in browsing, searching the internet for information
Google is the most popular search engine in the world. It's so popular that the
word "Googling" is often used in place of "searching the web." Google also has
special image and video search features that make it easy to find all sorts of
media.
Bing is Microsoft's answer to Google, and the second most popular search engine.
Many of Google's functions, like image and video searching, are also available on
Bing.
Yahoo used to be the largest search engine in the world. These days, it's powered
by Bing and delivers similar results.
2. Type what you're looking for into the search bar. You'll find the search bar at the
top of most search engines. You can enter a single word, a sentence, a phrase, some
numbers, or anything else you wish.
2. Press the ↵ Enter or ⏎ Return key to run your search. This displays your
search results in a list. If you're using a smartphone or tablet, you may have to
tap Search or Go instead. If you have a KaiOS-based phone, press the center
button to run your search.
4 Click or tap a result to view it. If you've found a website that looks like what you
want, click or tap it to open in your browser. To go back to the search results, click or tap
your browser's back button.
The results display differently depending on what you're looking for. For
example, if you searched for the word "weather" in Google or Bing, you'll see a
weather chart with the local conditions at the top of your results. If you scroll
down a little, you'll probably see some news articles about the weather, as well as
links to popular weather websites. If you search for an address or location, you'll
usually see a map and/or information about the business or landmark.
If you scroll down through the first page and don't find what you're looking for,
click or tap the next page number or Next at the bottom to view the next set of
results.
The best results are often on the first page, but sometimes you'll need to dig a little
deeper to find that magic result.
7.3 The concepts of Electronic Mail (email), World Wide Web (www), Uniform
Resource Locator (URL) etc.
Electronic Mail (e-mail): This is the most popular and most utilized Internet service
especially in the developing countries of the world. A conservative estimate puts the
number of people using the e-mail worldwide at more than 90 million people. E-mail is
message sent from one person to another via a computer network. The same e-mail can
be sent easily to one address or many addresses. Commercial electronic mail is used for
the same purposes as the organization wide mail system. But instead of being limited to
members of one organization, the service is made available to the public on subscription
bases.
E-mail messages are exchanged between customers, suppliers, friends and business
partners. E-mail service has cut down on the cost of mailing or sending information thus
saving time and money. E-mail is used as a marketing tool, for example, a company,
Dealaday.com uses e-mail to prospect for customers and sends group e-mail to 10,000
user names all customers who have indicated they would like to receive e-mails. With e-
mail they receive a 7%, 8% and sometimes 10% response, unlike 1% or 2% response in
normal direct marketing.
The World Wide Web (WWW): The World Wide Web or the web is one of the
Internet?s most popular applications and it was launched in 1991. It is a graphical, easy–
to-use way to organize and present information, including texts, images, movies, sounds
and more. The World Wide Web has generated tremendous popular interest in the
Internet. The www is unique for two reasons. Firstly it is highly interactive media
bringing documents in graphics, audio and video. Secondly, it uses hyperlink, which
provides connections between different resources. It allows users to jump from one page
to another. A file in www is called the home page and usually contains a multimedia clip.
A page can link you to other web pages and Internet resources with clicks of a mouse.
You can view and download any information you need on any home page with the aid of
software known as the web browser.
URL: stands for Uniform Resource Locator. A URL is nothing more than the address of
a given unique resource on the Web. In theory, each valid URL points to a unique
resource. Such resources can be an HTML page, a CSS document, an image, etc.
File Transfer Protocol (ftp): File transfer protocol (ftp) is an Internet tool used to
transfer files between computers and it is the most common method of transferring files
on the Internet. Without viewing them as they are transferred the ftp enables you to
access file on a remote location on the Internet once you log on to an ftp site, and you are
WE BELIEVE HARDWORK PLUS SACRIFICE FUEL SUCCESS. Page 113
CTE 111 INTRODUCTION TO COMPUTER & INFORMATION TECHNOL
able to access all files on sites and download them if you so desire. It is fairly easy to
publish information on the Internet. Many institutions maintain publicly accessible
archive of information that they want to share with others.
Assignment
For a modem to bring information, it must have a number to dial. This is where an
Internet service provider (ISP) comes in. The ISP is the organization that gives a
subscriber access to the information super highway. So to be connected to the Internet
you need to subscribe to an ISP. There are several ISPs scattered all over the world; some
of the popular ones are American Online (AOL), UK Line and CompuServe. Here in
Nigeria, some of the common ones are Hyperia, Infoweb, Cyberspace, Linkserv, Nigeria
Online, MTN, GLO, 9moble, Smile, Spectranet, Nigeria Net, Nitel, Nova, Prodigy, etc.
The choice of an ISP depends mostly on the effectiveness in the transmission of
information, that is, speed of service is an important criterion for selecting an ISP. The
efficiency of an ISP, in terms of speed of transmission of information, can be determined
by the bandwidth it can support. A bandwidth is a measure of the amount of data line,
satellite link etc. The bandwidth available determines the total capacity of an ISP to move
data anywhere in the world
Mobile computing is a technology that frees people from being bound to a certain physical
location so they can access and communicate data and information from a portable device
Mobile computing is the use of compact, lightweight, and portable computer devices that
can connect to wireless networks and access information and services from different
locations. These devices are adaptable tools for a variety of applications since they come
with CPUs, memory, storage, and communication capabilities.
Real-time communication is made possible by mobile computing through apps for instant
messaging, emails, texts, and phone conversations. It has made it simpler and easier to
keep in touch with loved ones, friends, and coworkers.
Online shopping, website browsing, and keeping up with social media are all possible for
those who have mobile device access to the internet.
Mobile devices frequently have GPS capabilities, making them crucial tools for
navigation and location-based services. GPS and navigation. They include location-
sharing tools, turn-by-turn instructions, and data on nearby businesses.
Productivity: Mobile apps are created to increase productivity. On their mobile devices,
users may create, edit, and share documents, spreadsheets, and presentations. Users can
keep organized by using calendars and task management tools.
Paying bills, transferring money, and checking account balances are all possible using
mobile banking apps. Online and in-store transactions are easy and secure with the help of
mobile payment services like Apple Pay and Google Pay.
Healthcare: Telemedicine apps that allow for remote consultations, health tracking apps,
and electronic health records that are available to both patients and healthcare practitioners
have all been made possible by mobile computing.
A wireless LAN (WLAN) is a wireless computer network that links two or more devices
using wireless communication to form a local area network (LAN) within a limited area
such as a home, school, computer laboratory, campus, or office building. This gives users
the ability to move around within the area and remain connected to the network. Through
a gateway, a WLAN can also provide a connection to the wider Internet.
Wi-Fi: Wi-Fi is a wireless networking technology that allows devices such as computers
(laptops and desktops), mobile devices (smart phones and wearables), and other
equipment (printers and video cameras) to interface with the Internet. It allows these
devices--and many more--to exchange information with one another, creating a network.
Internet connectivity occurs through a wireless router. When you access Wi-Fi, you are
connecting to a wireless router that allows your Wi-Fi-compatible devices to interface
with the Internet.
Voice portal: Voice portals are the voice equivalent of web portals, giving access to
information through spoken commands and voice responses. Ideally a voice portal could
be an access point for any type of information, services, or transactions found on the
Internet. Common uses include movie time listings and stock trading. In
telecommunications circles, voice portals may be referred to as interactive voice response
(IVR) systems, but this term also includes DTMF services. With the emergence of
conversational assistants such as Apple's Siri, Amazon Alexa, Google Assistant,
Microsoft Cortana, and Samsung's Bixby, Voice Portals can now be accessed through
mobile devices and Far Field voice smart speakers such as the Amazon Echo and Google
Home.
1. Modulation:
o Modulation is the process of varying a carrier signal's properties (such as
amplitude, frequency, or phase) to encode information.
WE BELIEVE HARDWORK PLUS SACRIFICE FUEL SUCCESS. Page 118
CTE 111 INTRODUCTION TO COMPUTER & INFORMATION TECHNOL
Thomas Zimmerman and other researchers at M.I.T.’s Media Lab first developed the
concept of PAN. It is very useful in the home, offices, and small network areas due to
its high performance in terms of flexibility and efficiency.
Types of Personal Area Network (PAN) : Personal Area Network can be of 2 types
depending upon its connection i.e., Wireless PAN, and Wired PAN.
Examples of PAN :
Body Area Network – It is a mobile network that moves with a persona range for
example when a person connects his smartphone to the Bluetooth headphone and
moves in the market that refers to a body area network.
Offline Network – In this multiple devices are connected through Bluetooth or Wi-
Fi. The devices attached to your computer including printers, mouse, speakers, and
other appliances are integrated using a Personal Area Network (PAN) and do not use
the internet. So a communication network is formed between the devices used in a
small single space for example home.
Home Office – In Home Office set up a separate smaller network is set up for work
purposes which is separate from the network used by other home appliances. This
network works as a separate body with multiple other devices connected for office
work purposes.
Applications of PAN –
Home and Offices
Organizations and the Business sector
Medical and Hospital
School and College Education
Military and Defense
Assignment
8.5 Explain Global System for Mobile Communication (GSM) and next generations
of mobile phone network.
8.9 Explain mapping technologies and tracking tools in the digital age.
Information Technology specifies to the components that are used to store, fetch and
manipulate the information at the minimum level with the server having an operating
system. Information Technology have a wide area of applications in education,
business, health, industries, banking sector and scientific research at a large level. With
the leading advancement in information technology, it is necessary to have the
knowledge of security issues, privacy issues and main negative impacts of IT. To deal
with these issues in IT society it is important to find out the ethical issues. Some of the
major ethical issues faced by Information Technology (IT) are:
1. Personal Privacy
2. Access Right
3. Harmful Actions
4. Patents
5. Copyright
6. Trade Secrets
7. Liability
8. Piracy
These are explained with their affects as following below:
1. Personal Privacy: It is an important aspect of ethical issues in information
technology. IT facilitates the users having their own hardware, operating system and
software tools to access the servers that are connected to each other and to the users
by a network. Due to the distribution of the network on a large scale, data or
information transfer in a big amount takes place which leads to the hidden chances
WE BELIEVE HARDWORK PLUS SACRIFICE FUEL SUCCESS. Page 125
CTE 111 INTRODUCTION TO COMPUTER & INFORMATION TECHNOL
3. Harmful Actions: Harmful actions in the computer ethics refers to the damage or
negative consequences to the IT such as loss of important information, loss of
property, loss of ownership, destruction of property and undesirable substantial
impacts. This principle of ethical conduct restricts any outsiders from the use of
information technology in manner which leads to any loss to any of the users,
employees, employers and the general public. Typically, these actions comprises of
the intentional destruction or alteration of files and program which drives a serious
loss of resources. To recover from the harmful actions extra time and efforts are
required to remove the viruses from the computer systems.
4. Patents: It is more difficult to deal with these types of ethical issues. A patent can
preserve the unique and secret aspect of an idea. Obtaining a patent is very difficult
as compared with obtaining a copyright. A thorough disclosure is required with the
software. The patent holder has to reveal the full details of a program to a proficient
programmer for building a program.
7. Liability: One should be aware of the liability issue in making ethical decisions.
Software developer makes promises and assertions to the user about the nature and
quality of the product that can be restricted as an express warranty. Programmers or
retailers possess the legitimate to determine the express warranties. Thus they have
to be practical when they define any claims and predictions about the capacities,
quality and nature of their software or hardware. Every word they say about their
product may be as legally valid as stated in written. All agreements should be in
writing to protect against liability. A disclaimer of express warranties can free a
supplier from being held responsible of informal, speculative statements or
forecasting made during the agreement stages.
8. Piracy: Piracy is an activity in which the creation of illegal copy of the software is
made. It is entirely up to the owner of the software as to whether or not users can
make backup copies of their software. As laws made for copyright protection are
evolving, also legislation that would stop unauthorized duplication of software is in
consideration. The software industry is prepared to do encounter against software
piracy. The courts are dealing with an increasing number of actions concerning the
protection of software.
Assignment
9.8 Explain online networking tools, their potential and their limitations
9.10 Explain the following terms: - Virtual Communities - Virtual Work and
Telecommuting - Virtual learning - Virtual Reality