Module1 Eng
Module1 Eng
Concepts
of
Information
Technology
David Varley
IMPORTANT NOTICE
All candidates who follow an ICDL/ECDL course must have an official CDL/ECDL
Skills Log Book or Skills Card. Without such a Log Book or Skills Card no tests can
be taken and the candidate will not be able to obtain an International Computer
Driving Licence, nor any other form of certificate or recognition for the course.
Log Books/Skills Cards are obtainable from ICDL/ECDL Training and Testing Centres
(see www.icdl.org.za) or directly from the ICDL Foundation of South Africa.
([email protected], phone +27-21-671-1070)
Table of Contents
Module 1: Concepts of Information Technology (IT)
1.1
1.1.1
1.1.1.1
1.1.2
1.1.2.1
1.1.3
1.1.3.1
1.1.4
1.1.4.1
1.2
1.2.1
1.2.1.1
1.2.2
1.2.2.1
1.2.2.2
1.2.3
1.2.3.1
1.2.4
1.2.4.1
1.2.5
1.2.5.1
1.2.6
1.2.6.1
1.2.6.2
1.3
1.3.1
1.3.1.1
1.3.2
1.3.2.1
1.3.3
1.3.3.1
SYLLABUS ITEM
General Concepts
Hardware, Software, Information Technology
1.8
Understand the terms hardware, software, Information Technology (IT).
Types of Computer
1.8
Understand and distinguish between mainframe computer, network computer,
personal computer, laptop, personal digital assistant (PDA) in terms of capacity,
speed, cost, and typical users.
Main Parts of a Personal Computer
1.9
Know the main parts of a personal computer such as: central processing unit
(CPU), hard disk, common input and output devices, types of memory.
Understand the term peripheral device.
Computer Performance
1.10
Know some of the factors that impact on a computers performance such as:
CPU speed, RAM size, the number of applications running.
Hardware
Central Processing Unit
Understand some of the functions of the CPU in terms of calculations, logic
control, immediate access memory. Know that the speed of the CPU is
measured in megahertz (MHz) or gigahertz (GHz).
Memory
Understand different types of computer memory such as: RAM
(random-access memory), ROM (read-only memory) and distinguish between
them.
Know how computer memory is measured: bit, byte, KB, MB, GB,
TB. Relate computer memory measurements to characters,
files and directories/folders.
Input Devices
Identify some of the main devices for inputting data into a computer such as:
mouse, keyboard, trackball, scanner, touchpad, lightpen, joystick, digital
camera, microphone.
Output Devices
Identify common output devices for displaying the results of processing
carried out by a computer, such as: monitors, screens, printers, plotters,
speakers. Know where these devices are used.
Input/Output Devices
Understand some devices are both input/output devices such as:
touchscreens.
Storage Devices
Compare the main types of memory storage devices in terms of speed,
cost and capacity such as: diskette, Zip disk, data cartridges, CD-ROM,
internal, external hard disk.
Understand the purpose of formatting a disk.
1.15
1.15
1.17
1.19
1.21
1.21
Software
Types of Software
1.26
Distinguish between operating systems software and applications
software. Understand the reasons for software versions.
Operating System Software
1.26
Describe the main functions of an operating system and name some
common operating systems.
Applications Software
1.27
List some common software applications such as: word processing, spreadsheet,
database, Web browsing, desktop publishing, accounting, together with
their uses.
1.3.4
1.3.4.1
1.3.5
1.3.5.1
1.4
1.4.1
1.4.1.1
Information Networks
LAN, WAN
Understand the terms, local area network (LAN), wide area network
(WAN). Understand the term client/server.
List some of the advantages associated with group working such as:
sharing printers, applications, and files across a network.
Intranet, Extranet
Understand what an intranet is and understand the distinction between the
Internet and an intranet.
Understand what an extranet is and understand the distinction between an
intranet and an extranet.
The Internet
Understand what the Internet is and know some of its main uses.
Understand what the World Wide Web (WWW) is and distinguish it
from the Internet.
The Telephone Network in Computing
Understand the use of the telephone network in computing. Understand
the terms Public Switched Telephone Network (PSTN), Integrated Services
Digital Network (ISDN),
Asymetric Digital Subscriber Line (ADSL).
Understand the terms analogue, digital, modem, transfer rate, (measured
in bps bits per second)
1.4.1.2
1.4.2
1.4.2.1
1.4.2.2
1.4.3
1.4.3.1
1.4.3.2
1.4.4
1.4.4.1
1.4.4.2
1.5
1.5.1
1.5.1.1
1.5.1.2
1.5.1.3
1.5.1.4
1.5.1.5
1.5.1.6
1.5.2
1.5.2.1
1.5.2.2
1.5.2.3
1.27
1.29
1.31
1.32
1.33
1.34
1.38
1.43
services online such as: choosing from a virtual store, no human contact,
risk of insecure payment methods
1.6
1.6.1
1.6.1.1
1.6.2
1.6.2.1
1.6.3
1.6.3.1
1.6.4
1.6.4.1
1.6.4.2
1.7
1.7.I
1.7.1.1
1.7.1.2
1.7.1.3
1.7.1.4
1.7.2
1.7.2.1
1.7.2.2
1.7.2.3
1.8
1.8.1
1.8.1.1
1.8.1.2
1.47
1.48
1.48
Security
Information Security
1.51
Understand the term information security and the benefits to an organisation
of being proactive in dealing with security risks such as: adopting an
information security policy with respect to handling sensitive data,
having procedures for reporting security incidents, making staff members
aware of their responsibilities with respect to information security.
Know about privacy issues associated with computers, such as adopting
good password policies. Understand what is meant by user ID and
differentiate between user ID and password. Understand the term access rights
and know why access rights are important.
Know about the purpose and value of backing up data, software to a
removable storage device.
Be aware of possible implications of theft of a laptop computer, PDA, mobile
phone such as: possible misuse of confidential files, loss of files, loss of
important contact details if not available on a separate source, possible misuse
of telephone numbers.
Computer Viruses
1.55
Understand the term virus when used in computing and understand that there
are different types of virus. Be aware when and how viruses can enter a
computer system.
Know about anti-virus measures and what to do when a virus infects a
computer. Be aware of the limitations of anti-virus software. Understand
what disinfecting files means.
Understand good practice when downloading files, accessing file attachments,
such as: use of virus scanning software, not opening unrecognised
e-mail messages, not opening attachments contained within unrecognised
e-mail messages.
Copyright and the Law
Copyright
Understand the concept of copyright when applied to software, and also to
files such as: graphics, text, audio, video. Understand copyright issues
involved in downloading information from the Internet.
Understand copyright issues associated with using and distributing materials
stored on removable media such as CDs, Zip disks, diskettes.
1.58
1.8.1.3
1.8.2
1.8.2.1
Know how to check the Product ID number for a software product. Understand
the terms shareware, freeware, end-user license agreement.
Data Protection Legislation
1.60
Know about data protection legislation or conventions in your country.
Understand the implications of data protection legislation for data subjects and
data holders. Describe some of the uses of personal data.
Module 1:
Concepts of Information
Technology (IT)
Section 1: General Concepts
_________________________________
IMPORTANT NOTICE
All candidates who follow an ICDL/ECDL course must have an official CDL/ECDL
Skills Log Book or Skills Card. Without such a Log Book or Skills Card no tests can
be taken and the candidate will not be able to obtain an International Computer
Driving Licence, nor any other form of certificate or recognition for the course.
Log Books/Skills Cards are obtainable from ICDL/ECDL Training and Testing Centres
(see www.icdl.org.za) or directly from the ICDL Foundation of South Africa.
([email protected], phone +27-21-671-1070)
1.1.1
1.1.2
Types of Computer
personal computer to the mainframe. In effect, networking creates one large system comprising
all
the
different
computers
linked
together.
Capacity and speed: Mainframes have the largest capacity in terms of data storage and
processing speed. The capacity of a modern mainframe can be hundreds or even thousands of
times that of a modern personal computer.
Cost: Mainframes are also the most expensive machines in terms of both initial cost and
maintenance. A mainframe can cost millions of Rands.
Typical users: Because the mainframe provides services to all sectors of a large corporation or
institution, users can include systems analysts, programmers, database administrators, data
capturers, accountants, accounts administrators
Network computer
Network computers are also sometimes known as thin clients or dumb terminals. They
provide access to a mainframe via a network and have little, if any, computing capacity of their
own. Network computers provide remote access to a mainframe. They allow the user to input
data or commands and receive output. The actual processing would be done on the mainframe.
Capacity and speed: Network computers do not have any processing capacity of their own.
Their speed will depend on i: the speed and capacity of the mainframe; ii: the speed of the
network to which they are attached; iii: the number of users accessing the mainframe. Thus in
periods of low demand, they will appear to function very quickly but would appear to slow down
when the demand on the system is high.
Cost: Network computers are relatively simple devices, hence they are fairly cheap.
Typical users: These would generally be the end-users of the system such as managers,
accountants, receptionists, accounts clerks and data capturers.
Personal computers
Personal computers or PCs for short are the type of computer that most users are familiar
with. Because they are usually found on users desks, they are also sometimes called desktop
computers. Operating systems such as Linux and Windows were designed specifically for
personal computers. The same applies to the thousands of application packages that are
available including OpenOffice.org and Microsoft Office. A typical PC consists of a main unit
housing the CPU and disk drives, a VDU (Video Display Unit), a keyboard and a mouse. PCs are
self contained computing systems that can be used for thousands of different tasks from creating
a simple document to controlling a large industrial machine.
Capacity and speed: Because of the rapid advances in technology, the PC of today is more
powerful than many mainframes of a few years ago. There is little sign that the rate of
development is slowing down. Typically, a modern PC can store the equivalent of a few million
pages of printed text and carry out millions of instructions in a second. What complicates the
_____________________________________________________________________________
Page 9
issue of speed in talking about PCs is the use of graphics. Most applications make intensive use
of graphics. This demands enormous computing power. Computers, which would otherwise
appear to be very fast, can appear to be quite slow because of the demands placed on them by
the graphics used in an application. Other components, such as the graphics card, also play a
role in the speed of a PC.
Cost: There has been a steady decline in the cost of computing power. Although the cost of PCs
has been fairly steady, the computing power that has been supplied has increased drastically.
The cost of a personal computer is greater than that of a network computer or PDA but less than
that of a laptop and a very small fraction of the price of a mainframe.
Typical users: Everyone is a potential user of a personal computer since there is virtually no
sphere of human activity that does not make use of information technology. The list could include
scientists, researchers, mathematicians, statisticians, technologists, engineers, students,
teachers, accountants, actuaries, managers, doctors, librarians, receptionists, book-keepers,
writers, and journalists. These are just a very few.
Laptop
Laptops are similar to personal computers except that they comprise an integrated unit. Instead
of a separate monitor, the lid contains a screen. The keyboard is built into the base. Usually they
make use of a touchpad instead of a mouse. The term notebook computer is often used instead
of laptop computer.
The main feature of a laptop is its portability. This is possible, not only because of the reduced
size and weight, but also through the use of a built-in battery which is able to power the
computer for a few hours without being connected to a mains power supply. Laptops are also
designed around low power and smaller devices. For example, laptops use small 2 hard drives
as opposed to the 3 drives of desktops. In addition, these drives have special components
built-in to protect them against movement.
Capacity and speed: These are the same as for personal computers.
Cost: Because of the more expensive components and the smaller market for laptops, these are
usually quite a bit more expensive than personal computers. Increased volumes and
improvements in manufacturing techniques will bring the price of laptops down in the future.
Typical users: Although the users could be any of those mentioned under personal computers,
cost tends to limit the users to those who need portability or who can afford the cost. You would
find them most commonly used by people such as managers and journalists. It is quite common
to see a laptop and the desk of senior members of staff and personal computers on the desk of
staff. This is not always a matter of status but often due to the fact that managers tend to take
work home with them.
PDA / Personal Digital Assistant
The PDA is the smallest of all computers. Their main task is to maintain a diary and keep contact
lists. On many you are able to make use of a word processor or spreadsheet, but, because of
physical constraints, the amount that can be done is far more limited than on a PC. PDAs vary
considerably in the features they contain. Top of the range cell phones now contain a PDA.
Usually, all the components of a PDA are solid state they do not contain any moving parts.
Some of the larger PDAs, often called subnotebooks, may contain a miniature 1 hard drive.
One feature that distinguishes a PDA from a subnotebook is that the latter has a built-in
keyboard whereas the PDA makes use of a light pen and character recognition for data input.
Most PDAs are able to connect to a personal computer so that data can be exchanged. A common
_____________________________________________________________________________
Page 10
feature is synchronisation where software on the PC automatically updates both the PC and
PDA at the same time by using the most up-to-date data on each.
Capacity and speed: PDAs have much less storage capacity and are slower than personal
computers. They were designed with convenience and low power requirements in mind rather
than power.
Cost: Usually a PDA is less expensive than a personal computer, but top of the range PDAs can
actually be more expensive than an average personal computer.
Typical users: Typical users are those with high mobility who need to keep track of their
agendas. These would include managers, representatives and doctors.
Cost comparisons
The cost of a computer depends on a range of factors including the components, labour and
demand. As a result, any price that is quoted will be out of date within weeks. Further, as
demand increases for one type of computer and decreases for another, their relative prices will
change.
The following table attempts to give a graphical representation of the relative prices of different
types of computer:
Most expensive
Least expensive
Mainframe
Laptop computer
Personal computer
Network computer
PDA
1.1.3
1.1.3.1 Know the main parts of a personal computer such as: central
processing unit (CPU), hard disk, common input and output devices,
types of memory. Understand the term peripheral device.
Central Processing Unit
The Central Processing Unit or CPU can be thought of as the
brain of the computer. The function of the CPU is to execute the
instructions in the programs. At the heart of its operations are
arithmetic and logical operations.
The CPU is made up of millions of electronic components called
transistors, capacitors and resistors. Transistors are the active
components of the CPU. Modern CPUs contain millions of
transistors.
_____________________________________________________________________________
Page 11
memory.
RAM or Random Access Memory holds the current running program and its associated data.
ROM or Read Only Memory contains certain key routines (small programs). One example, is
the set of start-up routines. These take control of the computer when you switch on and ensure
that the computer boots-up. Booting-up is the process of starting the computer up so that it is
able to load and run computer programs.
Cache memory is very high speed memory that is used by the CPU in executing the individual
instructions of the program. It is used to hold items such as instructions that are next in line to
be executed and data that is likely to be needed by the CPU.
All of these concepts will be dealt with in more detail in the next chapter.
1.1.4
Computer Performance
_____________________________________________________________________________
Page 13
Module 1:
Concepts of Information
Technology (IT)
Section 2: Hardware
_________________________________
1.2.1
1.2.2
Memory
_____________________________________________________________________________
Page 15
RAM
ROM
Function
Volatility
Changeable
1.2.2.2 Know how computer memory is measured: bit, byte, KB, MB, GB, TB.
Relate computer memory measurements to characters, files and
directories/folders.
Bits
In all the components of a computer, data and instructions are stored as patters of ones and
zeros. These individual ones and zeros are called bits.
In electronic components the one is stored by switching an electronic switch on and a zero by
switching it off. On a magnetic material, such as the surface of a hard disk, the one may be
stored with a clockwise magnetic field and a zero with a counter-clockwise field.
The reason for the use of only ones and zeros stems directly from the fact that modern circuitry
makes use of electronic switches and these can only be on or off. The term for circuitry based on
switches is digital. Arithmetic based on the use of only ones and zeros is called binary
arithmetic.
Bytes
Bits are grouped together into sets of eight. A set of eight bits is called a byte.
ASCII or American Standard Code for Information Interchange was a system of
representing all the characters of the western alphabet and certain special characters in a single
byte. You can think of the byte as the amount of memory required to store a single character.
As there are only 256 possible variations within eight bits, this is not sufficient to represent other
alphabets. As a result a new system, called uni-code, has been developed to represent all the
alphabets of the world. This makes use of two bytes or sixteen bits. With two bytes, 65536
different characters and symbols can be represented.
Units of memory
Because we use very large numbers of bytes for storage, abbreviations are used for large
numbers. These are based on powers of two and are set out in the following table.
kB
kilobyte
10
= 1 024 bytes
Mb
Megabyte
20
Gb
Gigabyte
30
bytes
Tb
Terabyte
40
bytes
_____________________________________________________________________________
Page 16
The capacity of hard drives is measured in bytes. A modern hard drive has a capacity of 40 Gb or
more.
When files are stored on disk, the amount of space they occupy is measured in bytes. The
following screen shows a partial listing of files in a directory. Notice the fourth column which
contains the size of the file in bytes. (Don't be concerned with the detail of this screen it is
shown purely for illustrative purposes.)
When we work with files and directories, we often need to know how large the files are or how
much space a directory and its files occupies.
One byte is one character which is a number, letter or symbol. It consists of eight bits
(binary digits) and is the smallest unit of information a computer can process.
One kilobyte is 1,024 characters and is approximately equal to one page of text in doublespacing.
One megabyte is 1,048,576 characters and is approximately equal to one book.
One gigabyte is 1,073,741,824 characters and is approximately equal to 1000 books.
One terabyte is 1,099,511,627,776 characters and is approximately equal to a whole library.
1.2.3
Input Devices
1.2.3.1 Identify some of the main devices for inputting data into a computer
such as: mouse, keyboard, trackball, scanner, touchpad, lightpen,
joystick, digital camera, microphone.
Any device which allows us to send data or instructions to the computer can be regarded as an
input device. We can use any mechanical movement, sound, light, heat or electronic signals to
input data and instructions.
Keyboard
The most familiar input device is the keyboard.
Users type the text directly into the computer.
There are a number of layouts of the keyboard.
The most important are the language
variations. For example, the US and UK
keyboards are quite similar but are very
different from the French keyboard.
_____________________________________________________________________________
Page 17
Mouse
The mouse is a point and click device. As you move the mouse
across a surface, it senses this movement either mechanically or
optically. This is translated into the movement of a pointer on the
screen. Functions are represented as icons on the screen. When
you click on these using a mouse button, the function is executed.
_____________________________________________________________________________
Page 18
Touchpad
A touchpad is a device that senses pressure to guide the pointer on the computer screen. It is
generally a small square area below the keyboard. As the user moves his/her finger across the
touchpad, the pointer moves on the screen. Next to the pad are two buttons used for clicking in
exactly the same way as those on a mouse.
Trackball
A trackball acts as a type of overturned mouse. The ball is on the
top side of the object. By rolling the ball you can move the
pointer across the screen. Some keyboards have an in-built
trackball.
The trackball has been superseded by the touchpad.
Lightpen
A light pen is a device which is sensitive to variations in patterns on a surface.
Light pens act like a miniature scanner and can read text as they are dragged
across the printed page. This can be transferred directly to the current open
document.
Bar code reader
A bar code is a pattern of vertical lines in which the spacing and thickness can
be used to represent data. A bar code reader is a device that can read and
interpret bar codes and input the data into the computer.
Joystick
A joystick is a device that is familiar for use in games to move objects on the
screen. However, it is also used to control the movements in computerised
industrial machines such as lathes. It consists of a small vertical lever which
can move in any direction. These movements are translated to the computer
which in turn uses them to control the movements of machinery.
Digital camera
Instead of film, a digital camera uses a light sensitive screen at the back of the camera. A small
computer inside the camera converts the pattern on the screen into a standard graphics file
which can then be transferred to a computer.
Microphone
A microphone translates speech into an electronic signal. Modern speech recognition software is
able to translate this into either commands or data. This enables the user to use a microphone as
an alternative to the keyboard.
_____________________________________________________________________________
Page 19
Scanner
A scanner is similar to a photocopier, except that instead of
producing a paper copy of the document you place on it, you get an
electronic copy which appears on your computer screen.
Text recognition software can be used with a scanner. This
software is able to recognise the individual letters in the image.
Instead of creating a single image of the document, the software
inserts actual text into your application which can then be edited.
1.2.4
Output Devices
_____________________________________________________________________________
Page 20
Dot matrix
Inkjet
Laser
Initial cost
Low
Medium
High
Low
High
Medium
Speed
Low
Medium
High
No
No
Yes
Noise level
High
Low
Low
Print quality
Low
Medium
High
Print graphics
No
Yes
Yes
Print in colour
No
Some
Some
Ink ribbon
Ink
Toner powder
High volumes
Print source
Plotters
A plotter consists of a device that can move paper
both backwards and forwards. On the top of the
device one or more pens are able to move
horizontally across the paper. The combined
movement of the pens horizontally across the
paper and the vertical movement of the paper
allows complex continuous diagrams to be drawn.
Some plotters allow different colour pens to be
used to create diagrams in multiple colours.
In other types of plotters, the paper lies on a flat
bed. The mechanics of the plotter are so designed
that the pens can move both across and down the
paper to create the diagram.
Plotters are usually used in conjunction with CAD (Computer Assisted Design) programs. These
are used in everything from the design of ships and machines to buildings.
Speakers
Modern computers using the appropriate software can turn text in a document into audible
speech. This is known as speech synthesis. Other types of software allow music and other
sounds to be created and played back.
The line between the computer and a home entertainment system is becoming blurred.
Computers are able to play music directly from a CD or play a film from a DVD. You can even fit
your computer with a radio or TV card to add these functions.
In all cases, the sound is transmitted through a speaker in the same way it is in a sound system
or radio.
_____________________________________________________________________________
Page 21
1.2.5
1.2.5.1
Input/Output Devices
Understand some devices are both input/output devices such as: touchscreens.
1.2.6
Storage Devices
1.2.6.1 Compare the main types of memory storage devices in terms of speed,
cost and capacity such as: diskette, Zip disk, data cartridges, CD-ROM,
internal, external hard disk.
Diskette
A diskette comprises a plastic flexible disk enclosed inside a
tough plastic cover. At one end is a window. When the diskette
is placed inside a diskette drive, the window is pushed to the
side. The read-record head inside the drive makes contact with
the magnetic disk.
Diskettes are slow and have a low capacity (1,44 Mb). Since they are cheap, they still tend to be
commonly used for storing small amounts of data. Another advantage is that they can be used
over and over again. Unfortunately, many are not very good quality and data can become
corrupted and unusable. Because of this they are not suited to backup purposes. The disks can
become corrupt through many causes including disk, heat, magnetism or moisture.
Zip disk
A zip disk is a removable magnetic disk which fits into a special zip drive. The surface is coated
with a special scratch resistant material which makes a zip disk a very robust storage device. It
comes in a number of capacities: 100, 250 and 750 Mb. The speed of a zip drive is faster than all
but the very fastest of CD drives. Its robustness and speed make it an excellent backup device.
However, its capacity is much less than that of hard drives and tape drives which limits its use
for very large amounts of data.
Data cartridge
A data cartridge is a tape very similar to that found in a tape recorder, only much higher quality.
These are used in a device called a tape streamer to record data. Data cartridges, especially if
good quality, are reliable and cheap devices for creating backups of large quantities of data. They
_____________________________________________________________________________
Page 22
are, however, rather slow. Data cartridges are sequential devices which means that to access
an item of data on them, all the preceding data reads to be read first. They are tending to
become obsolete as newer faster and more reliable technologies are available. A single tape can
stored many Gb of data.
CD ROM
A CD ROM uses optical technology. When data is written, small pits are burned into the surface
using a highly focussed laser beam. These are read by another laser beam.
There are two types of CD ROM used for storage. The CD-W disks can only be written to once.
Once data has been written to part of the surface, this part can no longer be used. CD-RW disks
are designed so that one set of data can overwrite another. This allows the disks to be re-used
many times.
CD ROM provides a reliable and storage medium for backing up and storing data. The speed is
greater than that of a diskette but slower than that of a hard drive. Writing to a CD ROM is a
much slower process than reading it. The capacity of a CD ROM is 640 Mb. It is sometimes
possible to store about 700 Mb on a disk.
CD ROM technology is improving all the time with continued improvements in quality and speed.
DVD
The Digital Versatile Disk is a development of the storage technology of the CD ROM. Using
newer storage methods and higher quality media, a DVD can store about 4 Gb of data. This is
enough to store a full length film.
Hard disk drive
A hard disk drive can be internal or external. An internal drive is housed inside the main unit
and is connected directly to the motherboard of the computer. An external drive is housed inside
a special caddy which connects to the computer through one of its ports. Most now use the USB
or firewire ports to achieve maximum performance.
An external hard drive is a good backup medium and allows large quantities of data to be stored.
Since the same drive can be connected at different times to different computers, these drives
provide a useful way of transferring data between computers that are not connected through a
network. As they are electromechanical devices, they are subject to mechanical failure if not
handled with care. The small 2 drives used in laptops make excellent external hard drives
since they are constructed to be moved around.
Modern hard drives have capacities from 40 Mb to 120 Mb. They are also relatively cheap in
terms of the storage capacity they offer.
Because they contain moving parts, they do eventually fail. When a hard drive fails is quite
unpredictable. Any suspicious noise coming from a hard drive should be viewed with great
caution and the data it contains should backed up immediately. The expected life span of a hard
drive is measured as the mean time between failures. This is a very rough average of the
working life. Figures of 250 000 hours are often quoted but these should be viewed with caution.
Numerous systems have been developed to protect data on hard disks. One of these is mirroring
where the data is stored simultaneous on two disks. The one disk becomes the mirror image of
the other. If one fails, the data is still one the other. In this case, the first disk is replaced, the
system creates a mirror image of the first disk automatically and the system continues.
There are a number of measures of performance of a hard disk. One is the speed at which the
_____________________________________________________________________________
Page 23
platters turn. Typically this is somewhere between 4800 and 7200 rpm. There are faster, more
expensive disks. Another is the access time. This is the time it takes the disk to access an item of
data. A good figure here would be around 10 ms. An ms or millisecond is one thousandth of a
second. Disks are also sometimes compared in terms of their data transfer rates. This is a
measure of how many bytes can be read or written per second.
Flash memory and memory sticks
A new type of external memory is the flash disk or memory stick. This is a solid state device (no
moving parts) that connects to the computer via the USB port. It provides a very fast and reliable
method of storing data externally.
They are at the moment fairly expensive, especially the larger capacity devices. They tend to be
limited to a maximum of about 2 Gb. This figure can be expected to increase quite dramatically
over time.
Relative cost of storage
As in the case of computers, the cost of memory is continually changing. The price varies from
country to country as well as according to international demand. In order to compare the cost of
memory, a common measure is to calculate the cost per Mb. The following table compares the
cost per Mb of the different media.
Medium
Relative
cost
per Mb
Hard disk
CD
Data
cartridge
Zip disk
Flash disk
Floppy disk
0.04
0.15
0.3
0.3
This table tells you that it is about 100 times as expensive to store a Mb of data on a floppy disk
as it is on a hard drive.
Use this table with caution. Treat the values as very approximate relative values. In other words
use them as comparative values, not as monetary values.
There are different file systems available, but in all cases the disk needs to be prepared with the
index area, tracks and sectors through formatting.
As mentioned previously, disk can be reformatted. In this process everything on the disk is
erased and the disk is formatted as if it was a new disk.
The following diagram represents the tracks (green) and sectors (red triangular area) that are
created when the disk is formatted and ready to store data.
_____________________________________________________________________________
Page 25
Module 1:
Concepts of Information
Technology (IT)
Section 3: Software
_________________________________
1.3.1
Types of Software
1.3.2
1.3.2.1 Describe the main functions of an operating system and name some
common operating systems.
As mentioned above, it is the operating system that actually makes the computer function. The
following is a list of some of the functions of the operating system:
Boot-up the computer.
Control the hard drives: This includes such features as formatting and defragmenting disks as
well as saving files to and retrieving files from disk.
Control input devices such as keyboards, mice and scanners.
Control output devices such as the video display and printer.
Control the external ports: Ports are the external connections that enable peripheral devices to
be connected to a computer. Common types of ports are serial, parallel, usb and firewire. Of
these the USB ports are the most important.
Provide the functionality for computers to be linked in a network.
Provide the foundation for application software to be launched.
Enable application software to access and use the hardware.
The following list names some operating systems. They are grouped according to similarity.
Unix; Linux; Free BSD
Windows 95; Windows 98; Windows Me
Windows NT4 Workstation / Server; Windows 2000 Workstation / Server; Windows XP; Windows
2003 Server.
_____________________________________________________________________________
Page 27
1.3.3
Applications Software
1.3.3.1 List some common software applications such as: word processing,
spreadsheet,
database,
Web
browsing,
desktop
publishing,
accounting, together with their uses.
The following table lists some types of application software, brand names and function.
Application
Brand names
Function
Word processor
OpenOffice.org Writer
StarWriter, KWord
Microsoft Word
Lotus Ami Pro
Corel WordPerfect
Spreadsheet
OpenOffice.org Calc
StarCalc, KSpread
Microsoft Excel
Quattro Pro
Lotus 123
Presentation
OpenOffice.org Impress
StarImpress
KPresenter
Microsoft PowerPoint
Database
Sybase, MySQL
Microsoft Access
Email client
Evolution, KMail
Microsoft Outlook
Web browser
Mozilla, Netscape
Microsoft Internet Explorer
Desktop publishing
DTP
Microsoft Publisher
Page Maker
Accounting
GnuCash
Pastel Accounting
Web development
Dreamweaver
Microsoft FrontPage
1.3.4
_____________________________________________________________________________
Page 28
Windows:
In each case, clicking on an icon will either execute a function or display another set of icons
containing the function.
_____________________________________________________________________________
Page 29
1.3.5
Systems Development
Description
Analysis
The problem or task is analysed and clarified. This involves analysis of the
way the task is currently being done and consultation with end users.
The project is set out in broad outline. The work of this stage is performed
by systems analysts.
Design
The project is broken down into smaller sections. These too may be further
broken down until there are units. The method of programming each unit is
then specified in great detail. The most suitable programming language for
each unit is then chosen. The complete specification is the final design. The
work of this stage is also performed by systems analysts.
Programming
The design is handed over to programmers who code the design into
programming languages such as C or Java. The work of this stage is carried
out by computer programmers.
Testing
Since programs are long and complex, they may contain errors called bugs.
These may be syntactical errors, in which the programmer made a mistake
in the structure of the command, or logical errors. In these the program
appears to work, but works incorrectly. The process of testing is designed to
find and eliminate bugs. This stage involves end users to try out the
program, programmers to fix syntactical mistakes and systems analysts to
fix errors in the logic of the program.
The following are often also included as part of the development cycle.
Implementation Once the systems analysts are satisfied that the system is operating
correctly, it is installed and implemented. Usually this is done using a pilot
group. In this implementation, the system is implemented on a limited
scale to start with. If any further bugs are found, these can be eliminated
before full scale implementation.
Further
development
Once the system has been in use for a while, further problems, limitations or
performance problems may become apparent. The system will then be
modified and new versions released with the changes.
_____________________________________________________________________________
Page 30
Module 1:
Concepts of Information
Technology (IT)
Section 4: Information Networks
_________________________________
1.4.1
LAN, WAN
1.4.1.1 Understand the terms, local area network (LAN), wide area network
(WAN). Understand the term client/server.
Networks
A set of computers connected together so that they can communicate is called a computer
network. This involves installing network cards in each computer. Each computer is then
connected through cabling to a central device called a hub. Operating systems contain
components that are dedicated to the task of enabling computers to communicate over a
network. This software makes use of special rules of communication called protocols. There are
many different types of protocols used for a variety of purposes. The most commonly used
protocol for establishing and maintaining communication across a network is called TCP/IP or
Transmission Control Protocol / Internet Protocol.
Client-server and peer-to-peer networks
Networks on which all computers have equal status are called peer-to-peer networks.
On most networks, certain computers have special dedicated tasks. Since these machines provide
services to other computers, the are called servers. The computers that make use of the
services or servers are called clients or workstations. A network such as this is called a clientserver network.
A server which is used for the central storage of files is called a file server. Using a file server,
users can access their work from anywhere on the network. They can also make these files
available to users on other computers. File servers also enable users to co-operate on a task by
centralising the results of their work.
A computer attached to a printer which users can access is called a print server. Having a single
printer rather than a printer attached to each computer obviously saves capital.
An increasingly important type of server is an applications server. In the case of applications
servers, application packages are not installed on the workstations but on the applications server.
A communications server is a computer dedicated to connecting a network to the outside
world. These are often called proxy servers.
As the case of print servers illustrates, one of the values of having a network is that it enables
resources to be shared.
LAN
A LAN or Local Area Network is a group of computers within the same building, or within a
group of buildings that are in close proximity, that are connected together.
WAN
A WAN or Wide Area Network is a group of widely dispersed computers that are connected
together. These could be across the same town, or across a country or even across the world.
Apart from distance, the other feature that distinguishes as WAN from a LAN is that the WAN
would make use of a range of communication technologies such as telephone, microwave and
satellite links.
_____________________________________________________________________________
Page 32
1.4.1.2 List some of the advantages associated with group working such as:
sharing printers, applications, and files across a network.
Advantages of sharing printers and files
A peer-to-peer network is where two or more computers are linked together in order to share
information and hardware.
It is a major advantage to be able to share printers, plotters and scanners. When computers are
networked together, there can be many pc's sharing a printer as opposed to each one having to
have it's own printer which is much more costly.
It is also possible to share data files across the network by creating a share on the harddrive and
allowing other people access to that information.
If you want to share applications you would need to investigate a client/server network solution
and some of the advantages are listed below.
Advantages of file servers
Users can access their work from any workstation connected to the network.
Users can easily exchange work with colleagues.
Users can easily co-operate on tasks.
Backing up is centralised and can be placed under the control of experts who will follow the
correct procedures.
1.4.2
Intranet, Extranet
1.4.3
The Internet
1.4.3.1 Understand what the Internet is and know some of its main uses.
The Internet was described in section 1.4.2.1.
Some of its main uses are to:
_____________________________________________________________________________
Page 34
1.4.3.2 Understand what the World Wide Web (WWW) is and distinguish it
from the Internet.
World Wide Web
The World Wide Web or WWW is a part of the Internet. The WWW consists of all the sites that
can be accessed using a web browser such as Mozilla, Netscape, Internet Explorer or Opera. In
order for a browser to access a web site, the web site must contain files that have a particular
format constructed using HyperText Markup Language or HTML. These sites are developed
using special web development applications. It is possible to create simple web sites using a word
processor by saving the document in HTML format.
The HTML documents are stored as web pages on special servers known as web servers. These
run special web server software such as Apache Web Server or Internet Information
Services.
The WWW enables the free flow of information across the world. Developments in technology
have made access easier and faster. As a result the WWW also became known as the
Information Superhighway.
Most of the activities listed under the Internet in the previous section are now actually carried out
using the Internet. In other words, the sites are created in HTML, or a similar format, are
installed on web servers and are accessed by web browsers.
1.4.4
_____________________________________________________________________________
Page 35
modem,
transfer
rate,
Analogue signals
Analogue signals are used on the PSTN as well as for normal AM and FM radio transmissions. An
analogue signal is one which varies continuously as, for example, in ordinary speech. An
analogue signal has a graphical form as shown in the following diagram.
Digital signals
Digital signals are used in ISDN and ADSL connections. Newer television and radio transmission
techniques are also making using of digital technology.
Digital signals are two state signals corresponding to a switch which is on or off. The same two
state signal can also represent TRUE and FALSE or 1 and 0.
_____________________________________________________________________________
Page 36
Modems
A modem or modulator-demodulator is a device connected
between a computer and a telephone line. Its function is to convert the
digital signals of the computer into a form suitable for transmission
over a telephone line. It must also do the reverse and convert the
telephone line signals into a form suitable for the computer. Note that
the modem used to connect to an ISDN line is different to that used to
connect to an analogue line.
Data transfer rates
Each 1 or 0 that is transferred is referred to as a bit. The speed of a data transfer is measured by
the number of bits that can be transferred each second or bps (bits per second). This is also
sometimes called the baud rate or bandwidth.
High speed lines have their speed measured in kbps or Mbps.
1 kbps = 1 024 bps (roughly 1 000 bps)
1 Mbps = 1 024 kbps = 1 048 576 bps (roughly 1 000 000 bps)
To put these figures in perspective, the maximum theoretically attainable speed with an analogue
line is 56kbps. This figure is very seldom attained and the reality is usually substantially lower.
ISDN lines operate at 64 kbps.
_____________________________________________________________________________
Page 37
Module 1:
Concepts of Information
Technology (IT)
Section 5: The Use of IT in Everyday Life
_________________________________
1.5.1
Computers at Work
1.5.1.1 Identify some situations where a computer might be more appropriate than a
person for carrying out a task and where not.
Computers are ideal for repetitive work requiring speed and accuracy. This is especially true of
those situations where human beings would become bored or simply cannot work fast enough.
Some examples include:
_____________________________________________________________________________
Page 40
The Department of Home Affairs keeps records of all the citizens in a country. It keeps records of
births, marriages and deaths. It also issues identity documents and passports. All this is only
possible through the use of computerised systems.
_____________________________________________________________________________
Page 41
1.5.1.5 Know some of the uses of computer applications in education such as:
student registration and timetabling systems, computer-based
training (CBT), distance learning, homework using the Internet.
Student records
Education institutions have electronic registration that allows students to be registered on the
system first and then further information such as personal records and results as they progress
_____________________________________________________________________________
Page 42
It also means it can recruit students from all over the world. Registration and payment of fees
can also be done on-line.
Homework using the Internet
The Internet contains enormous quantities of information. Some of this is excellent, some very
poor and much incorrect. To access information on the Internet, a student makes use of a
search engine such as Google. Feeding in a number of key words can result in a list of many
thousands of sites being displayed. Each of these is represented by a hyperlink. This is a link to
another site. When you click on a hyperlink, you are immediately taken to the site.
There are two important aspects to using the Internet to search for information to do
assignments:
The skilled use of a search engine: First you need to become familiar with the different ways of
using keywords and the various criteria you can set. This comes with practice.
Sifting the good from the bad: There is no control over the Internet. People can and do post
deliberately incorrect or biased information on the Internet. You need to be able to assess the
quality of what you read. For example, does the site give references to its sources or is the
information corroborated by that on another independent site. Developing a critical mind in
determining the quality of information is as important as being able to access information in
the first place.
Organisations:
save on office space, equipment and facilities.
_____________________________________________________________________________
Page 45
Disadvantages of teleworking
Professionals:
may suffer from lack of human contact.
need to be highly self-disciplined.
Organisations:
will not get the benefits of teamwork.
will have less control over workers.
The disadvantages of teleworking can be overcome by requiring professionals to spend a certain
amount of time at the office. This does not require that they actually have a workstation or office
of their own. They could be required to attend meetings or seminars. If they are structured as
part of a team working on a project, they could be required to attend team meetings which focus
on planning, allocation of tasks, feedback or general motivation.
1.5.2
Electronic World
1.5.2.1 Understand the term electronic mail (e-mail) and know its main uses.
Email refers to the transmission of messages between computers across a network or across the
Internet. Email allows text, graphics and sometimes sound. Users are able to send files together
with messages. These are sent as attachments to the email.
To use email, you need to have access to a network or the Internet. A mail client is installed on
the computer. This is used for the creation, sending, receiving and storage of email messages.
Well known email clients include Evolution, KMail, Microsoft Outlook and Outlook Express.
Web based email systems only require that you have access to the Internet. Many of these such
as Yahoo, Hotmail and Eudoramail are free. Web based mail systems act as remote mail clients.
Effectively, you log on to the mail client on the server using a web browser. From that point on, it
acts in much the same way as a mail client installed on your own computer. You can log on to
your web based mail system where ever in the world you happen to be.
Email addresses
Email address consist of two parts separated by an @ symbol. The first part is the name of the
user and the second part is the name of the mail server.
For example, in the email address [email protected], the user name is david and the name of
the mail server is icdlafrica.com. This is the address of the computer which holds his mail.
Advantages of email
It is very fast and efficient. Mail is transmitted from the sender to recipient in a matter of
seconds. Recipients can reply immediately. If both happen to be on-line at the same time, they
can conduct a conversation using email.
Documents and files can be sent with the email. The only limitation is the maximum size of
attachments that your system will permit.
It is very cost effective. The cost of sending an email is a fraction of the price it would be to
send it as a letter.
There is a saving on paper, printing and envelopes.
Email clients can be organised so that copies of emails that have been sent can be stored
under appropriate directories.
_____________________________________________________________________________
Page 46
Disadvantages of email
If there is a problem with the telephone lines, email cannot be sent or received.
There are certain security problems such as the interception of email by hackers. This can be
overcome by encrypting email. This requires the email to be coded into an unintelligible form
using a key. The recipients system has access to the key and is able to decrypt the email.
Occasionally problems in the complex system between the sender and recipient occur which
cause email to disappear. To know when this has occurred, it is possible for your system to
request a receipt of delivery from the recipients computer.
Unsolicited email or spam is becoming a problem. Because it is simple to send thousands of
identical emails to users at the same time, some merchants acquire lists of email addresses
and compile these into distribution lists. They then send the same advertising email to
everyone on the distribution list. To overcome this, anti-spamming software is now available
which identifies certain addresses as sources of spam and discards any mail that comes from
them.
They can afford the goods they are buying. It is very easy to spend money using a credit card
on the Internet.
The vendor will not abuse the information and make unauthorised debits. They should not deal
with any unknown sites.
The information will not be stolen by employees and used fraudulently. Once again, well known
reputable sites will have measures in place and will generally take responsibility if anything
does go wrong.
The information will not be stolen and used by hackers. Only use sites that are able to encrypt
the information you send using a secure link such as SSL. This eliminates the risk of insecure
payment methods.
1.5.2.3 List some of the advantages of purchasing goods and services online,
such as: services available 24 hours a day, opportunity to view a wide
range of products. List some of the disadvantages of purchasing goods
and services online such as: choosing from a virtual store, no human
contact, risk of insecure payment methods
Advantages of on-line purchasing
No restriction on shopping hours. You can purchase goods 24 hours a day, seven days a week.
You are not put under pressure by a salesperson and have time to make a more rational
purchase decision.
You are not restricted to shopping in an area to which you have physical access. You can shop
across the world.
Usually it is much cheaper to purchase goods on-line from a virtual store. If you purchase at
source you can eliminate the mark up of intermediaries. Further, on-line sites have lower
overheads than conventional shops.
You have access to a wider range of alternatives.
Disadvantages of on-line shopping from a virtual store
It is more impersonal as you do not interact with a human being with whom you can discuss
the product you wish to buy.
You cannot physically see and touch the item you are buying.
There are certain risks associated with purchasing goods on the Internet with a credit card. See
the section on CNP transactions above.
Returning defective or incorrect goods can be a problem. This is especially the case if they
have come from another country.
_____________________________________________________________________________
Page 48
Module 1:
Concepts of Information
Technology (IT)
Section 6: Health, Safety and Environment
_________________________________
1.6.1
Ergonomics
1.6.1.1 Understand what elements and practices can help create a good
working environment such as: appropriate positioning of monitors,
keyboards and adjustable chairs, use of a mouse mat, use of a monitor
filter, provision of adequate lighting and ventilation, frequent breaks
away from the computer.
Ergonomics is the science of co-ordination the physical and psychological aspects of human
beings with their working environment. Although computers present us with great opportunities
for making our work easier, they do present some health and safety risks if used incorrectly. The
science of ergonomics tells us how to use computers correctly.
Monitors
If you work with a monitor, tired, sore or blood-shot eyes indicate eye strain. The following points
indicate some aspects of monitors to be aware of.
Refresh rate: The refresh rate of a monitor is the rate at which it updates the images on the
screen. When the refresh rate is too low, the screen appears to flicker. Apart from the
annoyance factor, this causes eye strain. The refresh rate should be at least 72 Hz (72 times a
second) and preferably higher.
Monitor filter (Anti-glare screen): Reflections on the screen can cause eye strain. This can be
overcome by using a monitor filter with an anti-glare screen or by placing a special anti-glare
cover in front of the screen.
Focus: The image on the screen should be sharp. Poor quality monitors have a slightly blurred
effect. This causes the eyes to continually attempt to reduce the blur.
Low radiation: The beam of electrons that strikes the screen to display the image also sends
out electromagnetic radiation. There is some fear that this can be a health hazard, particularly
to pregnant women. Use a monitor with low electromagnetic radiation.
Position: Place the monitor in a position where you can look into the distance at regular
intervals. To the side of a window is an ideal position. You need to change the focus of your
eyes on a regular basis to prevent eye strain.
Angle: The monitor should be slightly below eye level. Looking up at a monitor can cause
strain in the neck.
Rest: Take regular rest periods where you do not look at the monitor.
Keyboards and mouse
Repeated use of the same muscles and joints can result in a type of injury called RSI or
Repetitive Strain Injury. This type of injury can range from inflammation of joints, to damaged
ligaments and muscles or even hairline fractures in bones. RSI is usually caused by the incorrect
use of the keyboard and mouse.
Ergonomic keyboards: Ergonomic keyboards are designed in such a way that the strain on the
hands and finger are reduced.
Touch typing: Learning to touch type can help reduce strain as it distributes the work evenly
between the fingers. Users who can touch type also tend to use far less force when striking the
keyboard.
Mouse mats (pads): Mouse mats or pads are available with a cushion for the wrist to rest on.
Repeated clicking of the mouse buttons can lead to inflamed finger joints. Resting the wrist on
the cushion reduces this effect.
Rest: Take regular breaks to rest the muscles and joints.
_____________________________________________________________________________
Page 50
1.6.2
Health Issues
1.6.2.1 List some common health problems which can be associated with
using a computer such as: injuries to wrists caused by prolonged
typing, eye strain caused by screen glare, back problems associated
with poor seating or bad posture.
Lighting and ventilation
It is important to ensure that there is adequate lighting, but does not cause a glare on the
screen. Another important consideration is whether there is enough air circulation in the room as
computers generate a lot of heat and if a room is not adequately ventilated it can become stuffy
and cause fatigue. It is also not good for the equipment so most companies make use of air
conditioning.
Other health problems associated with using a computer as discussed in the previous section are
listed below:
1.6.3
Precautions
1.6.3.1 List some safety precautions when using a computer such as:
ensuring power cables are safely secured, power points are not
overloaded.
Apart from health issues, there are a number of safety issues associated with the use of
computers.
Adequate earthing
A faulty earthing system can cause electrical shock. A good system will be properly earthed and
will incorporate earth-leakage detection. If the system detects a fault that could lead to
_____________________________________________________________________________
Page 51
electrical shock, a switch will trip before any damage can be done.
Cabling
It is common to see electrical cabling lying on the floor of offices. Apart from the fact that it looks
untidy, workers can trip over cabling. Electrical cabling should be installed by electricians so that
there is the minimum of open cabling. Electrical power sockets should be installed close to
workstations so that there is no need to run cabling across the floor. The cabling between the
power point and the computer should be secured using cable ties.
_____________________________________________________________________________
Page 52
1.6.4
The Environment
1.6.4.2 Understand that using electronic documents can help reduce the need
for printed materials.
Using networks and email, there is little need to send printed documents. Rather send them in
electronic format. In addition to avoiding printing, it is faster and more efficient.
Avoid printing documents even for you own use unless it is necessary. It is quite possible to do
much of your reading on-screen. Set the zoom and font size to facilitate on-screen reading.
_____________________________________________________________________________
Page 53
Module 1:
Concepts of Information
Technology (IT)
Section 7: Security
_________________________________
1.7.I
Information Security
information should be recorded. The question of access rights is discussed further in the next
section. Where sensitive information is stored in the form of paper files, these should be kept in a
secure vault. Procedures should be in place that enable staff to report breaches or suspected
breaches of security. They should be able to report these without fear of reprisal. In large
organisations security departments can be established specifically for the purpose of providing
such channels and monitoring security on an on-going basis. This is often done in conjunction
with forensic auditing. This is a special form of auditing to detect mismanagement and
corruption.
For example, some users may have no access to certain data, others may only be able to read
the data but not change it. Others in turn may have full rights to create and change data. Access
rights are associated with a user id and password. A user id could be a user name or a
combination of letters and numbers. To log on to a system a user would need a user id and a
password. As other users may know the user id of colleagues, another level of security in terms
of passwords needs to be added in the form of a password. Passwords are private and should
never be divulged to anyone else. Users could have several user ids, each with a different level of
security. They would log on each time with the lowest level of security they need to accomplish a
given task.
Password policies: Password policies refer to guidelines or requirements on the structure and
use of passwords. They can be required for access to a computer system or a group of files or a
single file. The following are some guidelines for password policies:
They should never be blank.
They should not be the names of family members or pets or anything else that would be easy
for an intruder to try out.
Ideally they should never be words, especially words like administrator, admin or root.
They should never be less than five characters and preferably longer. Short passwords can
easily be determined by a brute force password cracker. This is a piece of software that
repeatedly feeds in all combinations of letters and numbers until accessed is gained. With short
passwords this can be done in seconds.
A good policy is to use a meaningless combination of letters and numbers that is seven or eight
characters long. What some users do is to take a meaningful word such as looking and replace
the o with the number 0 and the letter i with the number 1 so that the password becomes
l00k1ng. You could also make a less obvious change, for example replace k with 3 and g with
9 so that the password becomes loo3in9.
Passwords should be changed on a regular basis. Administrators can set a policy that
automatically causes passwords to expire after a certain period of time, for example 7 days.
When using a PC, you would need to use an operating that provides genuine access protection
with a user id and password. This means using Linux or Windows NT/2000/XP/2003. In Windows
95/98/Me the logon procedure can be bypassed. If Windows NT, 2000, XP or 2003 are used, it
should be in conjunction with the NTFS file system.
Data encryption: Data should be encrypted. Encryption scrambles the data and makes it
unintelligible without the use of a key. The key is used to decipher the data.
1.7.1.3 Know about the purpose and value of backing up data, software to a
removable storage device.
Vulnerability of data
Data is vulnerable in many ways:
The system on which it is stored can fail. For example, a hard drive may crash due to
component failure.
The medium itself may become corrupt. Where data is stored on a magnetic medium, this can
become corrupt due to a number of factors including moisture, heat, magnetic fields and
electromagnetic radiation. Even optical storage which is highly reliable should never be
regarded as infallible.
The system can be stolen.
The system could be physically damaged through war, criminal activity, vandalism or
carelessness.
_____________________________________________________________________________
Page 57
The system could be damaged as a result of a natural disaster such as a flood, fire or
earthquake.
The data could be deleted or changed through criminal activity, vandalism or carelessness.
No matter what care you may take to protect a system, additional copies of data need to be
made and stored on a regular basis. Copies of data are referred to as backups. The following are
some guidelines to working with backups.
Once backups have been created, they should be store in a secure area at a different site.
Never keep backups on the same site as the system. They could be stolen or destroyed along
with the rest of the system.
Backups should be made on a very regular basis. Even for a small organisation, this should be
done daily. Even the loss of a single day's work would be a major problem. In large
organisations backing up may take place on an on-going basis. A schedule of backing up
should be clear policy and adhered to.
More than one copy of data should be made. If the data is very valuable, the different copies
could be stored in different secure locations.
Different versions of the backup should be retained. The following is an example of a backup
schedule that could be followed.
The cycle of backing up starts on the first Monday of the month. At the end of each day of the
week a backup is made. At the end of the week, there is a Monday, Tuesday, Wednesday ...
Saturday backup. On Sunday a backup is created and labelled week 1 backup. This is kept for
the rest of the month. The weekday tapes are then reused and the process repeated. At the
end of the month you end up with a series of weekly backups. The last one becomes the
backup for the month and the process starts over the next month. At the end of the year you
then have a series of monthly backups.
An appropriate medium for backing up must be used. In the case of companies this would
generally be done using tape, although optical storage is becoming more common. For
personal use, a CD or DVD makes an excellent backup. DVD writers are still quite expensive.
Never use diskettes for backup purposes. They are not reliable for this purpose. Even when
backing up a PC, makes multiple copies and keep them at another site for safe storage. You
could, for example, use a safety deposit box at a bank.
Often a network server has two identical hard drives, one being a mirror image of the other. This
means that if one fails the other one can take over. In other words all the software on the first is
identical to the software on the second.
Software can be backed up by making a copy of the cd/dvd media and then storing the originals
and using the backups to install from. This is allowed by most software manufacturers. The
original is kept under lock and key along with the licence numbers.
_____________________________________________________________________________
Page 58
are on two different devices. These should be kept apart so that they are unlikely to be stolen at
the same time. Ideally, you should make backups of these at the end of every day and keep
these backups in a safe location.
Although you can at least retain your diary, contacts and files through the use of backups, loss of
these can compromise you seriously. If for example, you keep information of your bank and
credit cards details on your PDA, cell phone or laptop, a criminal could make use of these if they
steal these devices.
Personal information and telephone numbers of friends and business colleagues could make them
vulnerable to the activities of criminals.
1.7.2
Computer Viruses
1.7.2.1 Understand the term virus when used in computing and understand
that there are different types of virus. Be aware when and how
viruses can enter a computer system.
Computer viruses
A computer virus is a program that is deliberately created to cause annoyance or alter or delete
data. Some viruses cause computer systems to slow down to the point where they are not
usable. One of the features of viruses is that they are designed to replicate and spread.
Trojan: A Trojan (or Trojan horse) is a virus that hides itself inside another legitimate program.
When the program is used, the virus is released and can begin its work of replication and
annoyance or damage.
Worm: A Worm is a program that replicates itself over and over in the computer's memory until
the computer can barely function. One of the signs of invasion by a worm is the slowness of
computers.
Time bomb: A time bomb is a virus which lies dormant until a certain date or time or for a
period of time. At this date or time, the virus suddenly becomes active and carries out whatever
task it is programmed to do. This can include the deletion of everything on the hard drive.
Logic bombs: A logic bomb is similar to a time bomb, except that instead of becoming active at
a certain time, it becomes active when a particular activity happens. For example, instead of
formatting a diskette, the virus causes the hard drive to be formatted.
Macro-viruses: Macro-viruses make use of a special customisation feature in applications called
macros. Macros allow you to create mini-programs to carry out certain tasks in your applications.
Spread of computer viruses
Viruses are spread in a number of ways:
_____________________________________________________________________________
Page 59
1.7.2.2 Know about anti-virus measures and what to do when a virus infects a
computer. Be aware of the limitations of anti-virus software.
Understand what disinfecting files means.
The actions of computer viruses were discussed in the previous section. The measures you can
take to protect yourself against viruses will be discussed in the next section. One of the main
measures to protect against viruses, anti-virus software, is discussed in this section.
Anti-virus software
Anti-virus software scans files for pieces of code, called signatures, which it recognises as part
of a virus. Updating anti-virus software mostly involves updating the signatures file. This should
be done on as frequent as basis as possible. This is even more the case when you receive files
regularly from outside sources. The actual anti-virus program itself will be updated from time to
time. These updates will include additional features and improved methods of scanning.
It is important to keep in mind that no anti-virus software is perfect. It is only as good as the
techniques it uses for detecting viruses and the currency of the signature file. There is always the
chance that a virus will go undetected. However, a good anti-virus system installed on your
system is essential and will usually detect most viruses.
When a virus is detected, the software will attempt to remove the virus. This is called cleaning
or disinfecting. It sometimes happens that the system can detect the virus but not get rid of it.
In this case, you will usually be given the option of deleting or quarantining the infected file.
When a file is quarantined, it is made unusable and so unable to spread the virus. A future
update of the software may be able to remove the virus. If it can the quarantine is removed.
_____________________________________________________________________________
Page 60
Module 1:
Concepts of Information
Technology (IT)
Section 8: Copyright and the Law
_________________________________
1.8.1
Copyright
program still remains the intellectual property of the developer. This does not mean that you may
lend the stored program out to others, though. This would be a breach of copyright. The stored
version is for that purpose only as a backup and for the licensed user only.
The section on licence agreements in the next section specifies some of the copyright issues in
more detail.
1.8.1.3 Know how to check the Product ID number for a software product.
Understand the terms shareware, freeware, end-user license
agreement.
Licence agreements
As mentioned in the previous section, when you purchase software, you only purchase the right
to use the software subject to certain conditions. These conditions are specified in the licence
agreement. When you install the software onto a computer, there is always a stage where you
have to make a selection that you have read and accept the terms and conditions of the licence
agreement. When you do this, you are agreeing to the developer's rights under copyright law.
The terms of the licence agreement include the following:
Clarification of the licence as meaning right to use the software not ownership of the
intellectual property.
The number of machines on which the software may be installed.
Restrictions on copying the distribution CD.
Restriction on the resale of the software.
Prohibitions on altering the code and reverse engineering. Reverse engineering involves a
process of uncovering the logic and algorithms used to develop the program.
Shareware
Shareware is software, generally downloaded from the Internet, which can be freely used and
distributed. However, it does require that if users would like to continue using it, they pay the
developer a fee. This is nearly always done by means of a credit card transfer across the
Internet. When payment is received, users get a serial number which they insert into the
software.
To attempt to enforce payment, developers usually employ a number of methods:
Nag notices. These are notices that appear on a regular basis reminding the user that the
software has not yet been registered.
Time limitations. The software can be used for a certain period of time. At the end of this
period it ceases to work.
Function limitations. The shareware version may exclude certain key features.
These limitations would be removed when a valid serial number is entered.
Freeware
Freeware is software which can be freely copied and distributed. Usually there are certain
restrictions such as it may not be resold or its source should be acknowledged.
Open Source software
_____________________________________________________________________________
Page 63
Preamble
The licenses for most software are designed to take away your freedom to share and change it.
By contrast, the GNU General Public Licenses are intended to guarantee your freedom to share
and change free software--to make sure the software is free for all its users.
This license, the Library General Public License, applies to some specially designated Free
Software Foundation software, and to any other libraries whose authors decide to use it. You
can use it for your libraries, too.
When we speak of free software, we are referring to freedom, not price. Our General Public
Licenses are designed to make sure that you have the freedom to distribute copies of free
software (and charge for this service if you wish), that you receive source code or can get it if
you want it, that you can change the software or use pieces of it in new free programs; and
that you know you can do these things.
To protect your rights, we need to make restrictions that forbid anyone to deny you these rights
or to ask you to surrender the rights. These restrictions translate to certain responsibilities for
you if you distribute copies of the library, or if you modify it.
For example, if you distribute copies of the library, whether gratis or for a fee, you must give
the recipients all the rights that we gave you. You must make sure that they, too, receive or
can get the source code. If you link a program with the library, you must provide complete
object files to the recipients so that they can relink them with the library, after making changes
to the library and recompiling it. And you must show them these terms so they know their
rights.
1.8.2
Data Protection Act of 1998 of the United Kingdom are set out below as an illustration of the
issues covered.
The provisions of the act refer to data in whatever way it is stored, whether electronic or
paper.
Personal data should be obtained in a fair and lawful way.
Data should be processed in accordance with its original purpose. If data is to be used for
purposes other than for which it is collected, safeguards need to be put in place to avoid
abuse.
Data must be up-to-date and accurate.
Data must not be kept for longer than is necessary.
Appropriate security measures must be in place to prevent:
Unlawful or unauthorized processing;
Accidental loss;
Damage;
Theft.
Personal data may not be transferred.
Data may not be used for certain purposes such as direct marketing.
In addition, subjects of the data have certain rights. These include the right to access data held
about themselves.
_____________________________________________________________________________
Page 65