CBCT2203 Basic Concepts of IT Chapter 6 - 10
CBCT2203 Basic Concepts of IT Chapter 6 - 10
Language
6
LEARNING OUTCOMES
INTRODUCTION
In this topic, we shall know more about programming language. Computer
programs are developed by using programming languages. A program is a set of
instructions followed by the computer, so that data can be processed. The process
of producing a program is called programming. Programming is part of the larger
software development process which consists of problem specification, program
design, programming, program testing and program maintenance.
There are many programming languages such as Python, Java, Perl, Eiffel, C, C++,
C# and COBOL. These different programming languages were invented at
different points in time, as shown in Table 6.1.
Figure 6.1: Relationship model between users, programming language and computer
Benefit Elaboration
Influences usersÊ thinking For example, an object-oriented language will cause the
in solving problems user to think of a solution based on the object concept
while a logic-based language will trigger the user to
think of the solution based on logic.
Tools for solving problems Most problems are more efficiently solved by experts in
using the computer their respective fields. Therefore, experts in certain fields
can learn appropriate programming languages in order
to solve their problems.
Programming
Application Year
Language
Computer language generation is said to have begun from low level to high level.
A programming language is said to be a low level of one when it resembles the
language that is actually used by the computer. A high-level programming
language, on the other hand, closely resembles the language used by human
beings such as the Malay Language. Table 6.4 shows five programming language
generations and how the programming language is represented in each of the
generations.
It uses symbols and words to represent instructions and data, and does not
use binary digits like the machine language. An example of a program in the
assembly language is given as follows:
V86_signal_return:
Call SYMBOL_NAME (save_v86_state)
movl
xorl
call SYMBOL_NAME (do_signal)
jmp restore_all
ALIGN
Among the reasons for the invention of the high-level languages are as
follows:
(ii) To enable a program to run on more than one machine, as it only needs
to be recompiled before being run on a different machine; and
(ii) Report generators are languages used to generate queries and reports
from databases; and
(iii) Application generators perform more than query languages and report
generators. They are tools that generate software according to usersÊ
needs with regard to data required to be processed and reported.
SELF-CHECK 6.1
Each characteristic has its own strengths and weaknesses. Besides these six
characteristics, there are also other characteristics of programming languages such
as:
But for now, we shall focus on the six core characteristics mentioned earlier. The
following subtopics will discuss the strengths and weaknesses of each
characteristic.
Object-oriented language was invented to develop systems that are large and
complex.
The need for an object-oriented language arose when existing languages could no
longer fulfil the needs of systems that are becoming more complex. The advantages
of object-orientation are ease of system management, ability to change system
properly and reusability of components in a new system. The structure of an
object-oriented language makes a program easier to design and understand.
Object-oriented languages handle images, audio, video and sound much easier
than procedural languages (third generation). The basic idea is to focus on objects
inside a system, not on functions that occur inside the system.
Concept Description
Class Blueprint that defines the variables (or attributes) and the methods
common to all objects of a certain kind.
Encapsulation Term given to the process of hiding all details of an object that do
not contribute to its essential characteristics. Encapsulation hides
the implementation details of the object and the only thing that
remains externally visible is the interface of the object (i.e. set of all
messages that the object can respond to).
SELF-CHECK 6.2
In writing logic-based program, users make use of Horn Logic - statement that
uses IF-THEN. All facts and rules will be stated in Horn Logic form. Subsequently,
the user will state a problem to be solved. The system will try to solve the problem
based on the facts and rules that have been given. For example, we can produce
the following information based on Horn Logic:
actor {ali}
rich {ali}
Finally, we can ask the system the following question which means is ali happy?:
? – happy (ali)
The system will answer yes or no based on the information given earlier. An
example of the logic language is Prolog.
Examples of function languages are Lisp, FP, Scheme, Common Lisp, Hope,
Standard ML, Miranda, Haskell, Hugs and Lucid.
6.4.5 Script
Scripting languages are translated languages that are normally produced for a
certain objective. They can be used for developing prototypes rapidly. This type of
language is portable between various types of computer platforms. Systems that
have been developed in scripting languages run slower. Examples of scripting
languages are JavaScript, Python and PHP.
HTML, JavaScript and PHP are the Internet-based scripting languages that are
used to develop applications for the Internet.
(a) C
It is a small language with attractive features. The C language is mostly used
in the development of system software and application software.
(b) C++
C++ adds on object features to the C language based on ideas from the Simula
language. Initially, it was known as C with Classes language. This language
is mostly used in large and complex systems development such as telephone
switching, graphic user interface system and road traffic control.
(c) Java
Java is an object-based language which was invented in 1995 by James
Gosling. It has the features of C++ and Simula.
Java converts Java programs into byte code, not to object code, where the
byte code can run in any operating system by using Java virtual machine
without any changes to the program. This technique enables any Java
program to be portable among many computer systems. Initially, Java was
mostly used in producing graphics and animations on websites. It is known
as a widely used programming language in the world. Java has been popular
with the slogan „Write once, run everywhere.‰
(d) Perl
Perl is a scripting language that can be used in the processing of text,
common gateway interface, database communication and others. PERL has
portability feature.
(e) Python
Among the applications that have been built using Python are web
applications, address book, computer network management and astronomy
software. Python is an alternative to Perl.
main ( )
{
printf (“hello world \ n”);
}
This source code needs to be compiled or converted into object code before it can
run in any computer. The compilation process is done by the compiler. If this
program is compiled in Linux, it can only run in Linux; if it is compiled in
Windows, it can only run in Windows.
This problem is said to be non-portable, that is, any software that is compiled in
operating system type A cannot run in operating system type B. The problem of
non-portability arises because the object code produced from the compilation
process is different for different operating systems. The object code is specific for
only one type of operating system.
While the source code is compiled, it will be linked to a library, that is, a set of
existing instructions in an operating system. In Windows operating system, the
library is given extended dynamic loading library (.dll). Examples of libraries in
Windows operating system are vb200.dll and vb3000.dll. The software (or object
code) that is produced requires this library to run. Since the library is only present
in the specific operating system (for example, Windows), the object code that is
produced can only run in Windows system.
For example, two types of architecture for the processor are RISC and CISC.
Examples of CISC processors are Intel, AMD and Cyrix while examples of RISC
processors are Alpha, Motorola 6800 and PowerPC. Any program that is compiled
for an Intel processor cannot run on an Alpha processor because both contain
different object codes.
To convert assembly language programs into object code, we need to use the
assembler. The object code produced is not portable. We can use assembly
language to write the program. The assembly language is mostly used in the
development of operating systems and it is used specifically in certain operating
systems.
The higher the language is, the nearer it is to the human language form.
Object-oriented language was invented to develop systems that are large and
complex.
Scripting languages are translated languages that are normally produced for a
certain objective.
Assembler Interpreter
Compiler Logic-based language
Encapsulation Machine language
Function-based language Object-oriented language
Imperative language Visual language
Inheritance
7
LEARNING OUTCOMES
By the end of this topic, you should be able to:
1. Define the term „Internet‰;
2. Discuss the history, development and evolution of the Internet;
3. Explain Internet addressing, applications of the Internet and ways
of searching for information via the Internet; and
4. Discuss the current and future trends of the Internet.
INTRODUCTION
In this topic, we shall focus on the Internet. You may be familiar with browsing the
Internet, however, do you know what the real capability of the Internet is? Do you
know the definition, history, development and evolution of the Internet? In this
topic, we shall learn about these things as well as how the Internet addresses the
computer that is connected to it. Besides that, you will also learn about the effective
process of searching for information over the Internet. Finally, we will explore the
current and future trends of the Internet. Let us start!
The Internet is the short form of „interconnected networking‰ that refers to the
largest type of global network. Imagine that all computer networks in the world
are linked to form one big network that spans the globe. The network formed is
called the Internet, in other words, a network formed by an interconnection of
computer networks in the entire world. With the Internet, a computer in Kuala
Lumpur can access a computer in China, India, US, Japan, Saudi Arabia and
anywhere else in the world.
The Internet is a grouping of computer networks that is very large and covers
the whole world. It operates using Transmission Control Protocol/Internet
Protocol (TCP/IP).
There were various proprietary networks linking several countries before the
Internet era (for example, the Malaysia Airlines network linking the companyÊs
offices worldwide) but these were not the Internet. The Internet has adopted the
TCP/IP in order to enable various types of computers to work together. The
Internet has been successful in creating a global village whereby a community can
easily communicate with another community without physical and time
boundaries.
The term „intranet‰ refers to a portion of the Internet that is located within
one organisation. „Intra‰ means inside or within.
For example, a portion of the Internet that is located in all the faculties in Open
University Malaysia (OUM) constitutes an intranet. The portion must be guarded
by a firewall (a type of security software) to ensure that outsiders could not simply
come into OUM network to access its confidential files. Therefore, the intranet is
really a subset of the Internet ă one at the organisational level, while the other, at
the global level.
SELF-CHECK 7.1
(a) Internet;
(c) Extranet.
In the 1970s, initiatives were taken to create a standard data sharing among various
types of computer networks. At that time, every computer company introduced
network systems that were different from one another. This initiative enabled all
computers of different brands in various types of networks to share data or to
communicate among themselves easily. In 1974, a data sharing technique called
Transmission Control Protocol (TCP) was introduced. Later, in 1978, this technique
was expanded to what was called TCP/IP.
In the 1980s and early 1990s, Internet usage was still confined to universities,
research centres and government organisations. Its main applications were e-mail,
file transfer, remote login and Usenet. In 1989, a breakthrough occurred in the
European Laboratory for Particle Physics (European Organization for Nuclear
Research [CERN]), a large research centre in Switzerland that was destined to
change the Internet forever. Tim Berners-Lee, a researcher at CERN, proposed an
information sharing technique based on hypertext for the Internet environment.
The multimedia system contains graphics, text, audio and video which can be
indexed and accessed easily by users in the entire world. This system has been
given various names like the World Wide Web, also known as the Web, W3 or
WWW. The Internet, in the shape that is most familiar to many of us, was born!
The Web can be defined as a network of various types of information like graphics,
audio, video and its text is based on hypertext. The original term for hypertext was
introduced by Ted Nelson in 1967. Originally, hypertext only involved document
texts but now, it involves documents based on graphics, audio, video and others.
Ted Nelson worked to develop a hypertext system that was named Xanadu.
The basic idea of the hypertext was once presented by Vannevar Bush in an article
As We May Think in 1947. According to Nelson, hypertext means a collection of
documents or nodes that have links or references among them. Users can read a
document and access other documents via interactive links. The basic concepts in
hypertext are link, accessibility and interactivity. With hypertext, the information
provided is linked among themselves like a cobweb.
In 1992, there were 70 sites that offered HTTP and Web services on the entire
Internet. HTTP was still not widely used because there was no Internet browser
that was good and attractive for users. Most Internet browsers at that time were
based on text.
In 1993, a browser based on graphics was developed by Marc Andreessen and Eric
Bina at the National Centre for Supercomputing Application (NCSA) in the US.
This browser, called Mosaic, was given out for free to users. It contains interface
features that are attractive and user-friendly. A combination of ideas from Berners-
LeeÊs hypertext and the Mosaic browser was finally successful in popularising
HTTP on the Internet.
Mosaic software was considered the main invention ă a great application that has
successfully popularised the Internet to general users instantly. At the end of 1993,
within just two years of the HTTP introduction, there were 700 websites.
The Internet began to attract the media and the general public, and a lot of news
concerning the Internet was found in magazines, newspapers and television (TV).
On the commercial aspect, the Internet began attracting the attention of giant
commercial organisations. Many people think that the Internet is the key to their
future business success. Many Internet-based companies have been formed in
large numbers. Marc Andreessen and a few friends set up an Internet technology
company and produced an Internet browser called Netscape. This browser is given
free to all users. The giant Microsoft Corporation was quite late in entering the
Internet browser arena. This company produced the Internet Explorer browser as
a means of dominating the Internet. Competition between these two Internet
browser software brands in attracting the Internet users market was very
interesting. Many people thought that whoever dominates the browser software
will dominate the Internet. The textbox below presents an interesting story about
the Netscape-Microsoft Internet browser software war.
From 1996 to 1999, there was a war on Internet browser software ă the software
that was used to surf the Internet between software giant Microsoft and
Netscape. Why? Many people thought that whoever managed to control the
market in the Internet browser software would ultimately control the Internet
because the Internet browser is the „vehicle‰ for accessing the Internet.
Microsoft Corporation entered the Internet browser market quite late. After
realising the importance of the Internet, Microsoft began to set out a strategy to
control the Internet. Remember that Microsoft was controlling 90 per cent of the
PC operating system market (nine out of ten PCs sold were using Windows
95/98/ME/XP system). As a first step, Microsoft produced the Internet
Explorer and it was given out for free to customers. As a result, in 1998, almost
90 per cent of the browser market was controlled by Internet Explorer.
SELF-CHECK 7.2
ACTIVITY 7.1
1. Surf the web for articles on the Internet between 1997 and 1999.
In the frenzy to popularise the Internet, some reports from the
media could have been sensationalised. Based on current facts,
which statements by the pundits then have now become true and
which statements have turned out to be wrong?
2. In your opinion, what will the Internet be like in the next seven
years to come?
Although the popularity of the Internet has increased and many dotcom
companies have emerged rapidly, the year 2000 was a difficult year for the
Internet. Weaknesses on the Internet were felt by users. Among problems that
arose were the difficulty in searching for relevant information, network
congestion, unfiltered news, fake news, spread of viruses through e-mails,
inadequate security for financial transactions over the Internet, invasion of
privacy, data theft and widespread online pornographic materials. While the
Internet saw the booming of many tech start-ups, there were also many dotcom
companies that suffered losses and had to close down.
The Internet will continue to develop. Table 7.1 shows the history of the Internet
(five phases) and how it has developed throughout the course of history.
1st Phase Before 1969 Birth of the ARPANET for the purposes of research and
computer resource sharing in the US only. Most users
were scientists, students and academicians. The Internet
was used as a tool for sharing computer resources.
2nd Phase 1970ă1990 Communication like e-mail, FTP and Usenet were used
widely. Usage was still confined to universities and
government agencies. Internet usage concentrated in the
US, Europe and Japan. The Internet was used as a tool
for communication.
4th Phase 1998ă2000 Internet explosion era. The number of users expanded
rapidly. The Internet was used for business transactions.
It became the subject of conversations and many articles
regarding the Internet were written in various
magazines.
5th Phase 2001ăonwards Internet reality era. Many dotcom companies closed
down. The realities of the InternetÊs advantages and
disadvantages were felt. Initiatives to improve the
Internet continued.
ACTIVITY 7.2
Year Event
1969 Four computers were connected on the ARPANET network in the US. The
computers were from University of California, Los Angeles, University of
California, Santa Barbara, Stanford Research Institute and University of Utah.
1971 The number of computers in the ARPANET went up to 21. The technique of e-
mail communication was introduced.
1973 The University College of London was connected to ARPANET, the first
connection of ARPANET outside the US.
1982 ARPANET used TCP/IP completely. Definitions of Internet and intranet were
introduced. „Internet‰ refers to the (worldwide) grouping of computer
networks that uses TCP/IP while „intranet‰ refers to a computer network that
uses Internet Protocol.
1988 The Internet was massively attacked by „Internet worms‰, which was a
computer software that spread on its own. This incident demonstrated the low
level of safety on the Internet. Computer Emergency Response Team (CERT)
was set up to monitor the security on the Internet.
1989 The number of computers exceeded 100,000 units. A book entitled Cuckoo Nest
was published. This book explained how a group of invaders from Germany
successfully entered some of the US military computers, without permission,
via the Internet.
1990 ARPANET was terminated and replaced by the National Science Foundation
Network.
1991 HTTP was produced by Tim Berners-Lee at CERN. This became the basis for
the development of the Web on the Internet.
1992 The number of computers on the Internet exceeded 1 million units. Malaysia
gained access to the Internet. The Internet network in Malaysia was managed
by the Malaysian Institute of Microelectronic Systems (MIMOS). The network
was known as JARING and is participated by several local universities
including OUM.
1996 Browser war between Netscape Communicator and Internet Explorer. At that
time, almost 80 per cent of users were using Netscape Communicator.
1997 The backbone function of the National Science Foundation Network for the
provision of the Internet passage was taken over by a commercial company.
Java, a computer programming language which was based on objects was
launched by Sun Microsystem in 23 May 1997. This language received
extraordinary responses. Java enables websites to have various attractive
animations. Search engines were also introduced. There were already 17,618
discussion forums based on e-mails.
1998 The Internet was estimated to have millions of websites. Electronic commerce
(e-commerce) and portal technology began to attract attention.
1999 The number of computers on the Internet was estimated at 76 million units. The
number of web servers was estimated at seven million units.
2003 Wi-Fi (wireless LAN) technology was expanding rapidly. It started to become
a main source of connection to the Internet for many compatible devices.
2008 The Internet became more accessible to many people via portable and wireless
devices such as laptops and smartphones as compared to fixed line services on
desktop computers. The shift to mobile access of the Web has accelerated with
the rise of smartphones and later with the rise of tablet computers. Social media
platforms started to rise in popularity.
2018 It is estimated that well over half of the worldÊs population have online access
or are using the Internet. Most of the growth of Internet users has been
attributed to affordable smartphones and various data plans.
In the Internet history and timeline, we have found rapid development of the
Internet just within a period of 50 years. The Internet began as a research network.
Then, it became a communication and data sharing network (later it evolved into
the Internet becoming a platform for social media and social network) and a
network for e-commerce. The Internet has removed physical boundaries that
divided the world and created a global village that transcends time and space.
ACTIVITY 7.3
The Internet has greatly affected human life today, whether in Malaysia
or the entire world, and it is expected to continue to do so in the
foreseeable future. Imagine if the Internet did not exist today. What
would society be like? What are the activities that users cannot do
without the Internet? Discuss with your coursemates in the myINSPIRE
online forum.
There are two types of computers on the Internet ă host computers and server
computers. A host computer is a unique computer on the Internet which has an IP
address. IP address is made up of four sequential numbers which are organised in
the format of „a.b.c.d‰. Examples of IP addresses are 202.187.48.7, 202.187.46.197
and 192.228.128.18. Each sequence of a, b, c, and d consists of numbers between
0 and 255. For example, IP address for a host at OUM consists of numbers between
211.25.48.X and 211.25.54.Y. A good analogy for an IP address is the identity card
number. It is unique to a certain host. There are no two hosts on the Internet that
has the same IP address. A computer needs to have an IP address to access the
Internet.
As a simple rule, if the computer is a PC and has an IP address, then the computer
is a host computer. If a user accesses the Internet using services provided by the
Internet service provider like unifi.com.my, time.com.my or maxis.com.my via a
home computer, the user does not need an IP address. The userÊs computer will be
given an IP address dynamically by the Internet Service Provider (ISP).
Computers can also function as servers, that is, computers that can be accessed by
users on the Internet. A server is a high-powered computer that is used as a
platform for websites, e-mails, electronic discussions, archives, file server and
others. Normally, a server would use UNIX, Linux, Solaris or Windows Server
2019 as its OS.
FQDNs are used to assist Internet users because it is easier to remember a fully
qualified domain name (thestar.com.my) rather than an IP address (13.32.8.111).
Therefore, every server on the Internet has an IP number and name for
identification. A fully qualified domain name gives a lot of information regarding
a certain server. For example, the server name oumvle.oum.edu.my gives the
following meaning ă oumvle is the host computer, oum is the organisation name
and my is the country name. Therefore, in general, the name oumvle.oum.edu.my
refers to a server located at OUM.
The end part of the server name normally shows the location or type of
organisation in which the server resides which is called top-level domain (TLD)
that shows the suffix of the domain name. For examples:
Because the Internet originated from the US, the domain name for computers in
the US does not have a country name. For example, www.facebook.com.
We can see more examples with explanations of TLD an Internet address end part
in Figure 7.3.
Did you know that most server names are in the form of Uniform Resource Locator
(URL) and that has been the basis of HTTP? An example of a URL name is
https://www.oum.edu.my, whereby:
SELF-CHECK 7.3
The Internet also offers various forms of communication such as e-mail, online
discussion board, Usenet, e-mail based discussion and social media through the
Web. These communication techniques have successfully created a global village.
With e-mail, users can communicate with anyone, anywhere. E-mail is a type of
communication that is cheap and fast. An e-mail sent from the OUM takes only
seven seconds to reach the UK. By using e-mail, users can send attachments such
as Microsoft Word documents, software, zipped files, graphics or audio.
The Internet also offers discussions based on e-mails. Discussions normally focus
on a specific topic. Users need to have and e-mail accounts in order to participate
in the discussions. There are several locations that offer discussions based on
e-mail for free. One such example is https://groups.yahoo.com.
The Internet also offers various online discussion topics via Usenet. There are over
7,000 topics discussed in Usenet and users can choose from various topics that
interest them. In a Usenet discussion, anyone from any parts of the world can give
his opinion or idea freely. One of the ways to access is by accessing a Usenet server
such as http://dotsrc.org/usenet.
Internet has become the platform or host to various social media and social
networking sites such as Facebook, Twitter, LinkedIn, YouTube and many more.
All these sites have the features of Web 2.0, which is a term for sites that allow
users to connect, interact, contribute and collaborate with each other, rather than
being websites with static pages or just for retrieving information. Web 2.0
provides users with the opportunity to effectively present their ideas, lead online
discussions, share educational content and document files as well as collaborate
with each other in real time. Some of the Web 2.0 applications are Google Docs,
Prezi, Pinterest and many others.
On the Internet, you can also search and obtain various types of information for
reference and reading. A user can get the entire literary works of William
Shakespeare, translations of the Quran, sayings of Prophet Muhammad PBUH,
classical Malay literary works, recipes for cakes, lecture notes, US Central
Intelligence Agency reports on Malaysia and many more. Many foreign and local
universities have placed their lecture sources such as notes, sample examination
papers and online software onto the Internet to be accessed by and for the benefits
of the students. An example of a lecture website is http://www.vlib.org.
The Internet is also a large archive of computer software. It contains various types
of software such as graphics, word processing, databases and games. A type of
software that is getting wide attention on the Internet today is the open source
software. The open source software consists of high quality software and can be
obtained together with the program codes.
The Internet also offers various news sources which are up to date and fast via
newspaper and television websites.
(a) https://edition.cnn.com
(b) https://www.thestar.com.my
(c) https://www.bharian.com.my
Users can also buy various things via the Internet. For example, users can buy
reference books from companies in Germany via the Internet. Purchases via the
Internet normally require credit cards. It is estimated that total sales via the
Internet, also called e-commerce, could reach up to billions in the near future.
(a) https://www.amazon.com
(b) https://www.ebay.com
(c) https://www.lelong.com.my
The Internet also offers a variety of entertainment such as music, videos, movies,
blogs and games. On the Internet, you can also find various websites that have
been built by marketers for the purpose of promotion and advertising. Users can
visit the website of a museum, a university, a company or of an individual person
and view the various types of information being displayed. The websites contain
a variety of information in the form of text, audio, video, graphics, cinema,
software and so forth. In other words, there are numerous materials on hundreds
of websites that can be accessed through the Internet.
Based on the discussions, we can think of the Internet as a very large virtual
environment, without boundaries, without a clear map and without anyone in
control, and it covers the entire world. It can be said to contain a reservoir of
knowledge about the world. It also offers ways of communicating to human beings
effectively and speedily.
We can see the summary of things available on the Internet in Figure 7.4.
ACTIVITY 7.4
In your opinion:
(a) How has the Internet benefited individual users and the society at
large?
(b) What problems have you encounter with the Internet? What
processes can be improved on the Internet?
Searching for information involves the process of searching the place where the
required information is present. This is an important process. Many users spend a
lot of time exploring the Internet and searching for information but to no avail.
The user ends up obtaining information that is not relevant and/or out of date.
Two main ways of searching for information over the Internet are through search
engines and portals. Other minor approaches that can also be used are the Usenet,
FAQ, e-mail discussion forums and archive sites. Examples of components that are
used to search for information on the Internet can be seen in Figure 7.5.
Figure 7.5: Components that are used in searching for information on the Internet
The Internet security level has improved a lot. This can be seen on especially on
online banking sites such as cimbclicks.com and maybank2u.com. Even so, there
are still hackers who are able to access the host computer without permission.
If they managed to successfully invade the website, they will be able to steal data,
change sites, steal credit card numbers and perform other transactions.
ACTIVITY 7.5
Users are still questioning the level of data security over the Internet for
e-commerce transactions. There have been thousands of stories of stolen
credit card numbers by intruders from company servers. What is the
guarantee provided by companies that the credit card numbers used in
e-commerce transactions are safe?
Search engines are not intelligent but they are also not dumb either. They function
based on robot and index.
How does this robot work? A search engine will send many robots to wander
around the Internet. These robots will bring back data on the web servers visited.
Based on the data brought back by the robots, an index will be built. This index
basically contains key words and identifies in which servers the key words are
present. Every search engine has different techniques in building the index.
Therefore, two different search engines will give different answers for the same
key words. Since the size of the Internet is very large, not all Internet servers will
be accessed by the robots. When users make a request based on key words in a
search engine site, the search engine will refer to the index to obtain relevant
servers. The search engine will always perform the updating process over the
index.
7.6.2 Portals
The second best way to access information is to use portals. A portal is a server
that contains a directory of several servers on the Internet based on categories of
information available on the servers. Users can find information by accessing the
servers in related categories.
(a) http://www.igoogleportal.com
(b) https://www.yahoo.com
(c) https://www.wikipedia.org
Just remember that Usenet is an online discussion corner. There are various
discussion corners in Usenet. In one discussion corner, new users may be asking
very trivial questions in the eyes of experienced users. Often, whenever trivial
questions are asked in the discussion corner, experienced users would say ă
„RTFM or the FAQ‰. Do you know the meanings of these abbreviations?
The acronym RTFM means „read the fine manual‰. In other words, the new user
should have read the manual first before asking trivial questions or simply refer to
the FAQ, which is a document in the form of questions and answers. Questions in
the FAQ are those that are often asked in the Usenet discussion corners. More
details about Usenet and FAQ will be deliberated in the upcoming topics in this
module.
Besides FAQ and RTFM, users can also search for information on the archive
server, that is, a server that contains a lot of information on specific topics. The
address of the archive can normally be obtained from FAQ portals or documents.
Many hosts on the Internet serve as archives or centres of information gathering in
certain fields.
SELF-CHECK 7.4
(b) Usenet.
In summary, cyber laws in Malaysia may not be used to stop the broadcast of
illegal materials outside of Malaysia. The act only has jurisdiction over websites
operating in Malaysia. In line with the progress of the Internet, the Malaysian
government has gazetted the Computer Crime Act 1997 and Communication and
Multimedia Act 1998 to deal with unhealthy activities over the Internet.
Nowadays, there are many crimes committed through the Internet. There are also
individuals who abuse the Internet as a source of reference for their criminal acts.
For example, misuse of chat or social networking site to lure women or teenagers
for various purposes are not healthy. This is quite dangerous isnÊt it? Various laws
have been enacted in recent years to provide effective protection to women and
children. Furthermore, various methods have been used to provide education and
training as well as creating awareness among Internet users, regardless of gender
and age, to better protect themselves and use Internet safely.
With most of the data available online and easily accessible to many people,
concerns about data privacy has been increasing among Internet users. In order to
provide better data protection to both online and offline users, laws and
regulations such as MalaysiaÊs Personal Data Protection Act 2010 and European
Union General Data Protection Regulation have been introduced and adopted.
Businesses will also increase via the Internet. Various steps are being taken to make
the Internet more widespread and easy to use by users, for example, Internet access
via TV, fourth and fifth generation (4G and 5G) approach to mobile phones as well
as the use of optical fibres and high powered lines to houses.
Based on earlier discussions, we also find that the Internet has its own set of
problems. By understanding the problems, users will be aware of its limitations,
future of the Internet and will not easily believe everything that is found on the
Internet. The Internet is a virtual space and has a very wide coverage.
There are five major trends that are related to future Internet, as shown in
Table 7.3.
Table 7.3: Five Key Trends that are Related to Future Internet
Trend Description
We use a variety of For example, online banking, online games, Internet TV, digital
online services every movies, video on demand, magazine subscription or online
day newspapers, online purchases, online distance learning and
social networking.
The Internet has Users will be powered by equipment and low cost devices that
evolved rapidly from will allow them to create their own content. This will make the
the concept of products and services more personal. To make the content and
sharing information products more attractive, the collaborative concept will be
to collaborative adopted for the production and better service. This will spark a
publication phenomenon that will change work ethics and commercial and
social activities amongst the Internet users.
The number of smart The smart products are used to collect and process data. This
products increases information could then be used in the subsequent preparation
every day of information in order to facilitate decision making.
Info graphics from the following websites may also provide you with an overview
of the future developments on the Internet:
(a) https://www.visioncritical.com/internet-of-things-infographics/
(b) http://dailyinfographic.com/2016-the-year-of-the-zettabyte-infographic
(c) http://www.smashingapps.com/wp-content/uploads/2011/01/The-
Internet-in-2020.jpg
ACTIVITY 7.6
From 1969 until today, computers and the Internet have undergone five phases
(before 1969, 1970ă1990, 1990ă1997, 1997ă2000 and 2001ăonwards) and have
become a major part of our life.
Ć The Internet is a grouping of computer networks that is very large and covers
the whole world. It operates by using TCP/IP.
Ć The Internet began in the US with the birth of ARPANET, which was intended
for research and sharing of academic resources. ARPANET has grown rapidly
but was later replaced by the National Science Foundation Network.
Ć HTTP and the Web have sped up the already rapid development of the Internet
even more.
Ć There are two types of computers on the Internet, namely host computer and
server computer.
Ć The computer can also function as a server, that is, the computer can be
accessed by other users on the Internet.
Ć The server has two forms of identification, namely IP address and fully
qualified domain name. A fully qualified domain name is much easier to
remember compared to the IP address.
Ć There are several major trends associated with the future of the Internet
including the existence of online services and the growing number of smart
products.
ARPANET Intranet
Cyber law Internet
Domain Internet Protocol (IP)
E-mail National Science Foundation Network
(NFSNET)
Extranet
Search engine
Frequently asked questions (FAQ)
Security
Fully qualified domain name (FQDN)
Transmission Control Protocol/
Hypertext Transfer Protocol (HTTP) Internet Protocol (TCP/IP)
Hypertext Usenet
Information Web
INTRODUCTION
In this topic, we shall learn about the various software that are available on the
Internet. Some software can be obtained free of charge while others have to be
purchased. This topic will also discuss a popular Internet communication
technique, that is, e-mail. In the beginning, e-mails were text-based but now, you
can even send several types of data together with the e-mail such as text
documents, graphics, audios, PowerPoint presentations and many more. We will
also discuss matters related to e-mail such as ethics, the smiley icons and many
others. Finally, we will discuss about the Usenet and frequently asked questions
(FAQ). Are you ready?
We will look at the types of software in more detail, starting with shareware and
freeware in the next subtopic.
Shareware is a type of software that can be used free of charge within a certain
period of time.
After that period, if the user continues to use the software, he needs to send
payment to the programmer of the software. This allows the consumer to make a
choice whether to continue using it or to switch to another application.
Do you know some of the examples of this software? Examples of shareware are
WinZip (see Figure 8.2) and McAfee (antivirus).
Besides shareware, there is also freeware. It is available free of charge from the
Internet. Often, this software has specific charges to users who want to add
functionality or upgrade the software. If not, the user will remain with the basic or
normal functions of the software.
Open source software is a software that can be obtained without any cost,
together with its source codes that is licensed to be studied, changed and
redistributed freely to others.
Distribution of the software together with its source codes has the following
advantages:
(a) Users can modify the software and are not tied or bound to any company;
(b) Users have the opportunity to remove errors that may be present in the
source codes; and
(c) Users can also learn how the software is built based on the source codes.
The open source software begins with the GNU project (GNU is not UNIX). It is a
project founded by Richard Stallman from the Massachusetts Institute of
Technology (MIT) at the beginning of 1980s. The original aim of this project was to
produce a system based on UNIX for free of charge use. This project has been
successful in producing software of high quality such as GNU Compiler Collection
(GCC) compiler, Lisp program compiler, Emacs editor and others. All GNU
software programs use the copyright called GNU Public Licence (GPL) which
states that anyone can modify the program source code but the modification must
be shared with other users. Basically, GNU encourages software and source code
sharing among users so that high quality software can be produced.
The GNU Public Licence concept is the opposite of the commercial software
concept. Commercial software would tie users to the software company. If the
software contains errors, users will have to wait for the newer version to be
produced and this will take a long time. If the software company raises the price,
users will have to accept that and pay more for the latest version of the software.
Users can make any modification to the source code of the open software but users
are requested to share the modification with other users via the Internet. With this
intellectual sharing, it is hoped that the software will be continuously modified so
that it will become a high quality software.
Examples of open source software which are widely used today are Linux
(operating system), Apache (web server), GNU Compiler Collection (C language
compiler), Perl (high-level programming language) and R (statistical software).
We can see the definitions of GNU Public Licence software in Table 8.1.
GNU Public
Definition
Licence Software
There are thousands of high quality open source software available over the
Internet for users. You can visit the following website for detailed information on
open source software:
(a) http://www.opensource.org
(b) http://www.gnu.org
SELF-CHECK 8.1
File Transfer Protocol (FTP) is a technique of downloading data from any FTP
server on the Internet onto the userÊs computer.
Many servers offer anonymous FTP services, which means the server allows
anyone, anywhere to download data from it.
Users can use a variety of software to manage the files on the server. Among the
commonly used software is CuteFTP (see Figure 8.5).
8.5 TELNET
To use Telnet, a user needs to have a user account on the server to be accessed.
The Telnet technique can be used to access servers at foreign university libraries,
Usenet server, Internet Relay Chat (IRC) server, multi-user domain server or
database server.
Let us look at an example of the use of Telnet. Suppose a user wants to perform
complex calculations that require high performance computers (super). What
should he do? The user can proceed to the supercomputer centre in Malaysia
located at Universiti Teknologi Malaysia (UTM), Jalan Semarak, Kuala Lumpur to
perform the tasks. A supercomputer is a type of computer with high capability and
cost. It can be used to perform simulations, car modelling, complex calculations,
weather forecasting and many others.
Besides that, the user can access the supercomputer via the Internet. The user can
Telnet to the supercomputer and perform computations on the computer
remotely. The Telnet technique enables the sharing of supercomputer resources
for all users wherever they may be in Malaysia.
8.6 E-MAIL
An e-mail is a communication technique between users on the Internet. In the early
days, e-mails were only text-based. Today, users can send various types of data
together with the e-mail, for example, Microsoft Word documents, PowerPoint
presentations, Excel spreadsheets, graphic .jpg, audio .mp3 and others. The
computer server that manages the e-mail is called the Simple Mail Transfer
Protocol (SMTP) server.
To use e-mails, users need to have an e-mail account on the e-mail server. Most
organisations like universities and private companies give out free e-mail accounts
to their staff. If users use the services of tm.net.my (Telekom Malaysia), they are
also given free e-mail accounts.
There are websites that offer free e-mail accounts such as Gmail at mail.google.com
and Yahoo! Mail at mail.yahoo.com. Users can access the websites and register for
the e-mail accounts. These free e-mail websites are popular among students and
other individuals.
An e-mail account contains two parts ă account name and the name of the SMTP
server (domain name). For example, a user with the name Anis Shafiqah has an
account name of anis_shafiqah on the host server SMTP oum.edu.my. If the user
registers at www.oum.edu.my with that account name, the userÊs e-mail account
will be [email protected]. The account name has a minimum of eight
characters and a maximum of 32 characters, on condition that it does not contain
special characters or space.
The following e-mail account names are not valid: „anis shafiqah‰ and
„a shafiqah‰. On the other hand, the following account names are valid:
„anis_shafiqah‰ and „a_shafiqah‰. Select a good account name that is suitable and
can be easily remembered by other users. Names such as „brutal99‰, „lanunlaut‰,
„amy89810‰ and „mahakaya‰ are certainly not suitable. Imagine the feelings of the
receiver when he receives an e-mail from someone with the name,
[email protected].
To read an e-mail on the user account on the SMTP server, users can use two
techniques:
(a) Users can use the server software and access the said SMTP server; and
(b) Users can download the e-mail from the SMTP server onto a personal
computer using the Post Office Protocol 3 (POP3) technique.
Advantages Disadvantages
Can discuss with and pose questions The number of e-mails received may be a
to many Internet users who are lot. Certain active discussion corners will
knowledgeable in certain fields. see more than 200 e-mails a day.
Answers to questions may be obtained Users need to spend a lot of time reading
very quickly. e-mails.
Can share opinions and information with Most e-mail contents are rubbish and not
people who have the same interest. beneficial.
Low cost. ă
(a) Observe traditional customs during discussions. Always respect other usersÊ
opinions even if they disagree. Agree to disagree;
(b) Remember that it is a virtual discussion corner. Users do not know other
users or their background. Other users may be older or may have more
experience. They may be a professor, researcher, program expert, chief
executive officer, coursemate, neighbour or others;
(c) Show good conduct. This demonstrates your personality to other users. If a
user is noisy and obnoxious during the discussion, most likely his questions
will not be entertained by other users;
(d) Share your expertise and ask questions if you need the expertise of other
users. By sharing, a user can establish communication with other users;
(e) Respect the privacy of other users. Do not discuss private issues;
(f) Be willing to forgive other usersÊ mistakes and be ready to help in solving
problems. Do not entertain those who like to quarrel;
(g) Discussion forums are archived. Maybe in 10 yearsÊ time, if users search on
the Internet, they may find their old e-mails again. Therefore, be careful
when writing them; and
(f) Do not post usersÊ private e-mails onto the discussion forum without the
permission of the concerned users (very important). This violates the privacy
act of certain countries.
8.6.3 Smiley
An e-mail content in the form of text makes it difficult for users to express emotions
like anger, happiness, hatred, tears and laughter. Therefore, the smiley icon
technique is used. A smiley contains text-based symbols used in e-mails to
represent a certain emotion such as anger, hatred and laughter. To view a smiley,
users need to tilt their heads 90 degrees leftwards. Nowadays, most e-mails have
options for smiley icons (see Figure 8.7):
Is it less effective or impactful? Let us change it into a more effective e-mail and
have better impact by using the smiley icons:
The smiley symbols or icons used are :-) and :-(. The second e-mail shows that the
writer feels sad and jokingly asks if the receiver can help him.
There are hundreds of smiley symbols and there are most common ones are shown
in Table 8.3.
Do you know how the smiley icon was started? You can visit the following website
to learn the history of smiley icon and how it began:
http://www.cs.cmu.edu/~sef/sefSmiley.htm
ACTIVITY 8.1
In your opinion, what other icons can be added? Try to find other icons
from other websites. Compare the ways and means of how they are
written.
ACTIVITY 8.1
8.6.4 Acronyms
What is ASAP, ROTFL, RTFM, YMMV, BTW? These characters are acronyms or
short forms that are used to represent phrases that are normally used on the
Internet. In Table 8.4, nine of the popular acronyms are shown. Acronyms are used
in order to facilitate users to write quickly, without the need to type full sentences
in the e-mail, discussion and chat. This can save time and reduce spelling errors.
In fact, space can also be saved!
ROTFL rolling on the floor laughing Laughing while rolling on the floor,
a cynical expression
RTFM read the fine manual Advised to read the manual before
asking
ACTIVITY 8.2
If you receive the following e-mail, what can you understand from it?
Guideline Explanation
Ensure that your e-mail This makes it easier for the receiver to read your e-mail.
content is short and It is not proper to send a long-winded e-mail, hoping that
precise. the receiver will read it. Remember, the receiver is also
busy with other work and may be receiving hundreds of
e-mails a day.
Ensure that an appropriate This will help the receiver to determine the importance of
and concise title is used. the e-mail received.
Do not enclose a large- This would cause problems to the SMTP. Limit the size of
sized attachment. your attachment to less than 1MB. There are cases when
users send e-mail attachments of 50MB in size.
Ensure that the e-mail sent Use the virus scanner to examine the e-mail received.
or received does not
contain virus.
Process your e-mail in a For example, before going out for lunch, solve all your
batch. e-mail communications immediately. Do not postpone.
Do not subscribe to many For example, if you subscribe to five discussion corners
e-mail discussion corners. and each discussion has 100 e-mails a day. As such, you
will receive an average of 500 e-mails a day. Much of you
time will be used just to read the e-mails.
Do not reply to e-mails E-mail enables you to reply directly even to those whom
while you are angry. you are not comfortable with. You may regret sending the
reply. Once sent, an e-mail cannot be retracted.
8.7 USENET
A Usenet discussion does not involve e-mails. Users do not have to register with
any server to enter Usenet. A user simply need to have Internet access to access a
usenet news server and participate in the message threads or read Usenet postings.
Servers are usually operated by public universities or local Internet service
provider.
Usenet discussion is divided into a number of major topics. These topics are later
broken down into more specific subtopics (see Figure 8.9). Therefore, users can
easily search for discussion forums that are of interest.
Nick
In Usenet discussion forums, users can share opinions, request for help, argue,
spread rumours, sell items, fire at someone, criticise someone, get to know each
other and others. There is no filtering of the Usenet contents. Therefore, the Usenet
contents may be true or false. Users are reminded not to readily believe stories
such as get-rich-quick-schemes or pills for preventing old age that are available in
Usenet.
Therefore, FAQ originate from various Usenet discussion forums. For example,
if there is a new user involved in comp.text.tex discussing TeX document
processing software, the user may want to know the background of TeX, its
history, how to use TeX and so forth. The new user can ask these questions in
comp.text.tex. However, a better way is for the user to read the FAQ in the
comp.text.tex discussion forum. Normally, each discussion forum has a FAQ sent
to the forum every month.
It is wise to read the FAQ first before posing questions because it contains useful
information for new users to refer to and to know. An archived FAQ document is
available at the website http://www.faqs.org and has been discussed in Topic 7.
SELF-CHECK 8.2
One of the phenomena of the Internet is the addictive use of social network
websites and applications such as Facebook, Twitter, Instagram, LINE, Google+
and many more. So, what do you know about social network websites?
Boyd and Ellison (2013) in their article titled Social Network Sites: Definition,
History and Scholarship have defined the social network websites as web-based
services that allow individuals to:
(b) Articulate a list of other users with whom they share a connection; and
(c) View and traverse their list of connections and those made by others within
the system.
Facebook is the most popular social network site that allows users who are part of
the same „network‰ to view othersÊ profiles, unless a profile owner has decided to
deny permission to those in their network. Figure 8.11 shows the interface of the
Facebook website for Open University Malaysia.
Other popular social network sites, geolocation applications and trending social
media applications that are based on the Internet and cloud storage are Twitter,
YouTube, Foursquare and Instagram. These software or applications have created
their unique approach and phenomenon for their users.
The other trend on the Internet that is currently attracting many users is the growth
of smartphone usage. It led to the active development of mobile applications in
accessing data over the Internet. In addition, cloud computing allows accessibility,
storage and online communication such as through Google ChromeOS or
Chromebook, Box, Dropbox, Google Drive and others. Last, but not least, is the
wearable computing such as Google Glass and smart watches. All these new and
developing technologies cater to the growth of the Internet around the world.
SELF-CHECK 8.3
Discuss the Internet phenomenon and predict the future of software and
applications used for the Internet.
There are various types of software on the Internet. Some of them are
shareware, freeware, open source software, protocols, file transfer, Telnet,
e-mail and Usenet.
The open source software begins with the GNU project (GNU is not UNIX),
a project founded by Richard Stallman from the Massachusetts Institute of
Technology at the beginning of 1980s. The original aim of this project was to
produce a system based on UNIX for free of charge use.
Among the advantages of open source software is that users can change or
modify the software and they are not tied to any company.
There are several ethical issues that need to be observed during e-mail
discussions.
Acronym or brief phrases are used to represent commonly used phrases on the
Internet.
The Internet has grown to be a phenomenon in various aspects of our daily life
including the way we communicate, share and work. There are many software,
applications and websites available for social networks, communication, cloud
computing, wearable computing and many more technologies to fulfil our
needs.
9
LEARNING OUTCOMES
By the end of this topic, you should be able to:
1. Describe four basic elements of communication;
2. Identify communication as an important component of information
technology (IT);
3. Explain the functions of coder-decoder in a communication system;
4. Describe two types of electromagnetic signals for data
transmission;
5. Identify two modes of transmitting data;
6. Identify three techniques of controlling data flow direction;
7. Identify three types of wires used as media for transmission; and
8. Explain the concept of cellular radio technology.
INTRODUCTION
Communication is simply the transfer or exchange of messages, ideas, thoughts,
information or knowledge by means of whatever forms like words, writing,
behaviour or even body language. Data communication is a more specialised term,
targeting at the collection and distribution of electronic data in the form of text,
voice, pictures, graphics, video and others via the communication network.
There are four elements for each type of communication to happen. The elements
are message, sender, receiver and media as illustrated in Figure 9.1 during a
telephone communication.
9.1.4 Security
When data is sent, it will become an attraction for eavesdropping. An example is
buying goods via the Internet using credit cards. The credit card number sent via
this medium will be easily stolen, if security measures are not taken. Among the
security measures often used is encryption. We shall discuss this issue in the next
topic.
SELF-CHECK 9.1
ACTIVITY 9.1
Can you imagine how electromagnetic signals that carry information are delivered
to the receiver?
(a) Frequency
Refers to the number of recurring waves (see Figure 9.3). It is measured in
hertz (Hz), which is one cycle per second. Signals with 40Hz recur
40 cycles per second.
(b) Amplitude
Refers to the height of the wave or the waveÊs highest energy level,
as shown in Figure 9.5. Amplitude is measured in various units,
for example, voltage (V) or decibel (dB). The stronger the signal, the higher
is the amplitude.
(c) Phase
Refers to the rate of signal change with time or the measure of time
shift of the waves and is measured in degrees (À). Signals with the
same frequency can have different phases when they are compared.
In Figure 9.6, the bottom wave (b) has a different phase (phase 180À)
compared with the top wave (a). One complete wave cycle begins at a point
and continues until it reaches the point again. A shift in phases happens
when one cycle is not yet complete but another new cycle has already begun,
that is, before the previous cycle has completed fully. This happens at
point 1 in Figure 9.6(c).
Digital signals are in two states only, either low voltage and high voltage, off
and on or 0 and 1.
SELF-CHECK 9.2
Data transmission between two points or between two computers can happen in
two forms, namely in parallel or in series. Data that is sent through the parallel
transmission will be delivered in one go, normally in one byte (8 bits)
simultaneously. If 8-bit data is sent, 8 parallel wires will be used to send the data
ă each bit is sent via separate wires, as shown in Figure 9.8. Extra wires are needed
to send data between the sender and the receiver. These signals allow the data to
be sent in a proper sequence.
Printers, for example, receive data from the computers via the parallel ports that
are transmitted in parallel, that is, character (byte) by character (byte). This
transmission is suitable for short distances. Parallel transmission is not practical
for data communication. Computers normally transmit data in serial form because
of the high speed. Centronics parallel interface is an example of the parallel format.
Serial transmission is transmitting data serially, that is, the data is being sent one
bit after one bit (see Figure 9.9).
Serial transmission is slower than parallel transmission but is more suitable for
long distances. Serial transmission is the normal method of data transmission in a
communication network. In data communication, the data is transmitted serially.
Two modes of transmission for serially transmitted data are asynchronous
transmission and synchronous transmission.
Each character can be separated by a different time space, which means that there
is no synchronisation between the sender and the receiver, especially when there
is no data being sent. Synchronisation is achieved only at each character. The
receiver will synchronise with the sender when start bit is received. Several
agreements between the sender and the receiver include the number of bits per
word, parity check (whether odd or even), speed of transmission and how the
message is ended.
For sending each character, two additional bits are also sent. For example,
when sending 100 characters, the total bits being sent are 1,000 bits (eight bits
per character + two bits for start/stop 100). These 1,000 bits are equivalent to
125 characters, where 25 additional characters constitute the overheads for the
asynchronous transmission. The asynchronous transmission is clearly not efficient
for sending large amounts of data. However, it is suitable for low-speed data
communication, normally up to 32,000bps.
The receiver will check the data bits received until a header is found which
contains Synchronous Idle (SYN) characters and start bit, as shown in Figure 9.11
above. Next, both the sender and the receiver will mutually synchronise between
them. The receiver will receive all characters until a tail is found containing the last
character and SYN character. Data block (or packet) size varies from a few
characters to hundreds of characters. The bigger the data block, the faster the
transmission will be.
SELF-CHECK 9.3
9.4.1 Simplex
Simplex transmission allows data to move in only one direction, similar to the one-
way traffic (see Figure 9.12).
9.4.2 Half-Duplex
Half-duplex transmission confirms that data moves in two directions but only one
direction at a time. For example, moving through a very narrow bridge allows you
to move only one car at one time, climbing the road to FraserÊs Hill where going
up and coming down are fixed at different hours, people who communicate using
walkie-talkie or radio taxi as well as communication between two computers using
modems (see Figure 9.13).
(a) The time for the device to change its role from sender to receiver or vice
versa;
(b) The waiting time while the sender device transmits a message to confirm
readiness to receive data to the receiver device; and
(c) The waiting time for the sender device while waiting for the reply on the
readiness to receive data from receiver device.
9.4.3 Full-Duplex
Full-duplex transmission allows data to be sent in two opposite directions all the
time, just like the two-way street (see Figure 9.14).
ACTIVITY 9.2
Bit rate is the real measure of the number of bits transmitted every second.
Bit rate or data rate is measured in bit per second (bps). For example, modem
speed is 14,400bps.
Baud rate is a measure of the number of changes of line states per second.
Change of line state means a change from state 0 to state 1 or vice versa, for
the digital signal. For the binary digital signal, baud rate = bit rate.
Frequency refers to the amount of data being sent via a channel or line at wave
frequency ă the cycle of waves per second. Frequency is stated in Hertz (Hz)
or cycles per second.
Bandwidth is the difference between the highest and the lowest frequency
that is supported by a certain channel or line.
Data can be sent at various frequencies within a certain bandwidth. The maximum
transmission speed depends on the available bandwidth. The bigger the
bandwidth, the higher the transmission rate or the speed of transmission will be.
There are three grades of bandwidth. Let us learn more about each grade of
bandwidth in Table 9.1.
Bandwidth Description
Voice band This bandwidth is present in PSTN, the traditional telephone network.
It is called voice band because PSTN is originally built for voice
communication instead of data. The width of its bandwidth is 4,000Hz,
which is sufficient for sending voice. Since its bandwidth is limited, it is
used for communication at the rate of up to 28.8Kbps.
Broadband It involves the satellite, microwave, coaxial cable and optical fibre. It is
used for high-speed computers and has a speed of between 56K to
30Gbps.
SELF-CHECK 9.4
1. State the differences between bit rate and baud rate. When will both
the bit rate and the baud rate be equal?
The types of transmission media for carrying signals depend on the types of
signals. Twisted pair wire and coaxial cable carry signals in the form of electrical
pulses. Light pulse signals can be carried via optical fibre cable. For the
electromagnetic wave that penetrates the air, it requires the support of microwave
and satellite systems. The three forms of data ă light pulses, electromagnetic waves
and infrared waves ă are all the types of waves that come with the wireless type of
transmission media.
Transmission media can be classified as guided (via the physical media such as
twisted pair wires, coaxial cables and optical fibre cables) or unguided (via air,
vacuum and water).
There are two types of wires or cables, namely unshielded twisted pair (UTP) and
shielded twisted pair (STP). Unshielded twisted pair cables are cheaper and easier
to handle but can be interrupted easily and have a shorter coverage distance as
compared with shielded twisted pair.
Besides being classified into unshielded twisted pair and shielded twisted pair,
twisted pair cables are also classified according to categories set by EIA/TIA-568.
In general, the factors that differentiate between these categories are the thickness
of wires according to American wire gauge (AWG) and the error features.
In a voice communication system, every coaxial cable can support about 60 voice
channels. Such cables that support multiple voices are called bandwidth coaxial
cables with a speed of up to 100Mbps. This type of cable is called thick coaxial
cable, thicknets or 10Base5, which is also called thick Ethernet.
Another type of such cable is the basic band coaxial cable that is used to send data
at high speed such as in the local area network (LAN). The cable that is often used
in the local area network is the RG-58AU cable, often called the thin coaxial cable,
thinnets or 10Base2, which is also called thin Ethernet ă with a speed of up to
10Mbps. An example of the coaxial cable can be seen in Figure 9.16.
Coaxial cable offers bandwidth and a degree of immunity from highly unstable
signals. In addition, this cable is cheap to install and complies with existing
standards. However, this cable incurs high cost for long distances because of the
need for repeaters. The safety level of this cable is not yet high. Termination and
connecting points of this cable need to be done correctly to avoid spoilage that can
create congestion in the network, thus, preventing access to it.
Optical fibre is made from silicon fibre or silica, which is thinner than the human
hair. It can be used to transmit various types of data such as video, pictures,
multimedia, music and graphics. Since the data is transmitted via light, it is not
affected by electronic interference and that will reduce errors in data transmission.
This fibre is also lighter than coaxial cable. Optical fibre cable is used for linking
long distances or linking between continents. Each fibre can support multiple voice
channels or TV channels.
measured in increments of two hertz until 40GHz. Figure 9.18 is a simple diagram
that describes how relay stations are used to provide coverage over a geographic
region.
Microwave technique is used for high volume communication and over long
distances. Parabola discs and towers require high costs to be built. Therefore, the
cost of a microwave system is expensive and it is for long distances. This technique
is suitable for communication between tall buildings in city areas, especially when
the cost of installing optical fibre cable is very expensive. Now, microwave systems
are often used to link up networks between buildings in campuses and towns.
For a medium-sized microwave system, the cost is average, it can be divided into
sub-channels and can be extended over long distances. However, it can be easily
interrupted by noise from the weather and electricity as well as the need to
overcome the line of sight problem including geography. The use of microwave
also follows tight rules in order to avoid overlapping.
Satellite acts as a relay station between one earth station and another earth station.
The signal frequency that is uplinked to the satellite is different from the signal
frequency that is downlinked to the earth station. Types of satellites are classified
according to their locations from the earthÊs surface as well as the signal frequency
to uplink and to downlink. Figure 9.19 illustrates how a satellite system relays
signal.
Satellite system is expensive but cost effective for sending large volumes of data.
The satellite coverage area on earth is called footprint. The position between the
satellites needs to follow certain rules in order to avoid signal interference between
each other. There are three advantages and seven disadvantages of using the
satellite system, as presented in Table 9.2.
Advantages Disadvantages
Satellite footprint offers a large Signal gets noisier while its strength
geographical area of coverage. deteriorates as distance increases.
High loading enables large volumes Limited lifespan of 7 to 10 years, after
of data to be transmitted. which the satellite will run out of real
orbit.
Low cost per user.
Data transmission can be intercepted
and decoded, unless they are
encrypted.
Satellite transmission can be
intercepted by other people.
High cost of installation and
operation.
Requires a decoder and parabola
dish.
Delay in receiving the signal.
9.6.6 Infrared
Infrared (IR) technology is a data transmission in the form of infrared radiation,
without going through wires. This approach is limited to only a small area and is
based on the line of sight. The transmission rate is about 10Mbps. This technology
can be used for wireless computer network. Mobile computers and devices such
as the mouse, printer and smartphone may have an IrDA port that enables the
transfer of data from one device to another using infrared light waves. The most
common example of infrared communication is your TV remote control The
infrared signals allow you to change channels, increase or decrease the volume
and perform many of other remote operations without having to leave the couch.
9.6.7 Radio
Radio frequency technology that utilises the wireless transmission is divided into
two types, namely high frequency and low frequency. High frequency radio
technology such as the cellular radio can penetrate office walls but has limited
coverage. Low frequency radio technology utilises the radio spectrum technology,
has a big penetrating power and wide coverage but has a problem of interference.
Radio spectrum technology utilises the normal radio frequency such as amplitude
modulation (AM), frequency modulation (FM) and short wave. This technology is
normally used for pagers.
Cellular radio technology is designed for mobile computing and is mainly used by
mobile phones, also called the cellular telephone. In Malaysia, there are many
cellular telephone operators like Celcom, Digi and Maxis. Cellular technology uses
radio frequency and cell sites. A cell site is a geographical area of a roughly circular
shape where cellular phones can get signal coverage and thus operate within that
specified physical area. Users move from one cell to another cell. Each cell is linked
to the master cell site that provides a link to the normal telephone network.
The radio frequencies which are available to the cellular network are limited.
As such, a key feature of cellular telephone service involves the reuse of
frequencies across different cells in order for an operator to accommodate a large
number of users. Users themselves sometimes resort to installing amplifiers or
boosters on their own phones in order to improve the signal strength of their
equipment.
Cellular radio technology can also use low earth orbit satellite. Examples of cellular
radio satellites are Iridium and Teledesic. Cellular radio technology has seen a lot
of development and various cellular technologies have been introduced of late, for
example, 5G networks.
The sender is the message transmitter or the place where a message begins.
The sender may be a person, software application, machine that can create
messages or replies without human assistance, system user, sensor, staff card
reader or other input devices.
A message can be in the form of a file, request, reply, status, control or mail.
The cellular radio technology concept is becoming more popular now. Many
communication companies like Maxis, Celcom and DiGi use this technology.
INTRODUCTION
We are vigorously going through the process of information revolution where the
development and use of information and communications technology (ICT) has
revolutionised our capability to extract, manipulate, store, communicate and
present information. The main characteristics of this era are a rise in the number
of knowledge workers, a world that has become more open in the sense of
communication and the sharing of data. However, this paradigm shift brings new
ethical problems such as privacy right which is threatened by the risk of the free
flow of information over the networks or devices. This topic will address the
concerns in ethics, privacy and security from the aspect of guidelines, techniques,
risks and safeguards in dealing with the way technology is used.
10.1 ETHICS
The technology revolution has generated a lot of controversy. One of the
controversies concerns questions about what is (and what is not) ethical with
regard to the activities involving information technology. The standards that
determine whether an action is good or bad are known as ethics. Computer ethics
refers to the moral guidelines that govern the use of computers, mobile devices,
information systems and related technologies. Frequently discussed aspects of
computer ethics are information accuracy, intellectual property rights, codes of
conduct, green computing, information privacy, unauthorised use of computers,
software theft and many other concerns on the usage of the various technologies.
The advancement of technology has created a world without borders. We can now
interact with anyone regardless of location. In addition, data can be moved from
one location to another. Even your confidential data that used to be kept in your
drawer, can be easily assessed now if the data has been converted into the
electronic form. Behind the facilities provided by these technologies, we need to
be aware of irresponsible parties who will take advantage of our carelessness when
using IT in our daily activities. Now, more than ever, it is very important to
emphasise computer ethics in the usage of such technologies.
In most organisations, computers are used to help the management ensure smooth
and efficient running of the business operations. Top management also uses
computers to facilitate in making important strategic decisions. Ethical problems
are often discussed in human resource management. This is because information
technology (IT) has opened new ways of conducting ethical and unethical business
processes electronically. Computer users are now confronted with series of ethical
issues especially when they perform duties in the office. Examples of situations
that could raise questions about ethical or unethical use of IT include:
(a) An employee who uses his computer at work to send personal email
messages;
(d) A student who copies text from the Web and uses it in a research paper for
his English composition class;
ACTIVITY 10.1
The following subtopics will discuss ethical issues related to information accuracy,
intellectual property rights, codes of conduct and green computing.
Information accuracy is important because many lives may be dependent on it, for
example, the medical information at hospitals, therefore, the information must be
accurate. To obtain accurate information, we need the right value. If someone gives
inaccurate information, it is difficult to find out who made the mistake. Many
situations or actions can lead to inaccurate information. The most common case is
when the user enters a wrong value or data. Moreover, inaccurate information may
accrue from typographical mistakes. To avoid such mistakes, the organisation
must find hire those with relevant experience and skills in data entry, and it must
use programs which can discover typographical mistakes.
A copyright gives authors, artists and other creators of original work the exclusive
right to duplicate, publish and sell their materials. A copyright protects any
tangible form of expression. A common infringement of copyright is piracy, where
people illegally copy software, movies and music. Many areas are not clear-cut
with respect to the law because copyright law gives the public fair use to
copyrighted material. The issue surrounding the phrase, „fair use‰ allows the use
for educational and critical purposes.
ACTIVITY 10.2
Use the link below to download the full code of conduct shown in
Figure 10.1:
http://www.southsidemontessori.edu.au/uploads/1/0/9/5/10956261
5/code__it.pdf
You may also find examples of codes of conduct online that define acceptable
forms of communications for websites where users post commentary or other
types of communications such as blogs, wikis and online discussions.
Nowadays, IT has radically changed our work and life while enhancing our
productivity, economy and social well-being. However, most people do not realise
that IT has also been contributing to environmental issues. Computers and other
IT infrastructure absorb significant measures of power, and is expanding day by
day, placing a substantial weight on our electric grids and adding to greenhouse
gas (GHG) emissions. In other words, IT is both a solution and a problem for
environmental sustainability.
Conserve Energy:
Use computers and devices that comply with the Energy Star
programme.
Do not leave a computer or device running overnight.
Turn off the monitor, printer and other devices when not in
use.
ACTIVITY 10.3
Today, huge databases store data online. Much of the data is personal and
confidential, and should only be accessible by authorised users. Many individuals
and organisations, however, question whether this data really is private. Some
companies and individuals collect and use this information without your
authorisation. Websites often collect data about you so that they can customise
their advertisements and send you personalised e-mail messages. Some employers
monitor their employeesÊ computer usage and e-mail messages.
Technology has facilitated the process of data collection and storage. For example,
banks store data on every customer. The data includes age, marital status, total
savings, total loans, savings conducts and others. Universities keep student
records, which include academic achievements, co-curricular activities, types of
studies, types of financial support, age, parentsÊ occupations, nationality and many
others. The Road Transport Department (RTD) keeps car ownerÊs names and the
related details. All these are examples whereby individual privacy can be misused
or abused by the keepers of information.
If customers have credit cards, the banks will have data on spending habits,
methods of debt repayments, types of purchases, income and others. Therefore,
bank and road transport officers may use these data to sell to some interested
parties for marketing and other purposes. All the data that are stored in banks,
universities and RTD are personal private data which can be used for evaluating
an individualÊs lifestyle.
(b) Can banks sell personal data of individuals to other companies for marketing
purposes?
(c) Can banks provide information on individual savings to other banks for the
purpose of loan approval?
(d) How can individuals determine that their personal data which is kept by the
authorised parties is accurate? and
(e) Can the RTD commercialise information of its databases concerning cars and
their owners?
The Internet has expanded the issue of privacy even more widely. With the
Internet, users can use e-mails for communications. Privacy issues that may arise
from the use of e-mails include:
(b) Whether the contents of e-mails are regarded as personal items that cannot
be publicised to other parties;
(c) Whether the employer has the right to read e-mails of his employees;
(d) Whether the government has the right to filter e-mail contents; and
E-mails that are sent through the Internet can be read by anyone, anywhere. The
e-mail is like a postcard. All e-mail messages are open for all to read. A number of
techniques have been introduced to ensure the safety of messages in e-mails. One
of the techniques is to encrypt the message, whereby it is converted into a form of
codes. The codes will be reconverted back to the actual message upon reaching its
destination. Research on encryption is still ongoing and various techniques have
been devised to better safeguard against intrusion by irresponsible persons.
Privacy rights is also an ethical issue because many records, which are stored by
non-governmental organisations are not covered by existing laws. In spite of that,
individuals have shown that they are very concerned with the control issue of who
has the right over personal information and how it is used.
10.2.1 Cookie
A cookie is a small text file that a web server stores in your computer. Cookie files
typically contain data about you such as your username, postal code or viewing
preferences. Websites use cookies for a variety of purposes.
Most websites that allow for personalisation use cookies to track user preferences.
These cookies may obtain their values when a user fills an online form which
requests for personal information. Some websites, for example, store usernames in
cookies in order to display a personalised greeting that welcomes the user by name
to the website. Other websites allow users to customise their viewing experience
with preferences such as local news headlines, local weather forecast or stock
quotes.
Some websites use cookies to store usernames and/or passwords so that users do
not need to enter this information every time they sign in to the website. Online
shopping sites generally use a session cookie to keep track of items in a userÊs
shopping cart. This way, users can start an order during one web session and
completes it on another day at another session. Session cookies usually expire after
a certain time, for example, a week or a month.
Some websites use cookies to track how often users visit a site and the webpages
they visited while at the website. Websites may use cookies to target them with
relevant advertisements. These websites store the userÊs interests and browsing
habits in the cookie.
SELF-CHECK 10.1
1. Explain how cookies work and what they are used for.
The PDPA prohibits data users from collecting and processing a data subjectÊs
personal data without his consent. The Act also prohibits data users from
disclosing or making its data available to any third party without the consent of
data subjects. It requires data users to inform data subjects on the purpose of its
data collection, the class of third party who may have access to the data and the
choices that data subjects have on how the data is to be used.
The Act also imposes a duty on data users to put in place adequate security and
indemnity measures to prevent the theft, misuse, unauthorised access, accidental
disclosure, alteration or destruction of data under their care. The Act also provides
for the rights of data subjects to access, modify and update their personal data.
There are exceptions to the PDPA. It does not apply to credit reporting business,
data collected/processed for the prevention or detection of crime, for the purpose
of preparing statistics and research, in accordance with a court order or for the
purpose of discharging regulatory functions.
A digital security risk is any event or action that could cause a loss of or damage
to computer or mobile device hardware, software, data, information or processing
capability. While some breaches to digital security are accidental, many are
intentional. Some intruders do not disrupt a computer or deviceÊs functionality;
they merely access data, information or programs on the computer or mobile
device before signing out. Other intruders indicate some evidence of their presence
either by leaving a message or by deliberately altering or damaging data.
What to Include
Disaster Type What to Do First What Might Occur
in the Plan
Type Description
Cracker Someone who accesses a computer or network illegally but has the
intention to destroy data, steal information or other malicious actions.
Unethical Unethical employees may break into their employersÊ computers for a
employees variety of reasons. Some simply want to exploit a security weakness.
Others seek financial gains from selling confidential information.
Cyber Someone who uses the Internet or the network to destroy or damage
terrorist computers for political reasons. Cyber terrorism usually requires a team
of highly skilled individuals, millions of dollars and several years of
planning.
The next subtopic shall continue the discussion on cyber crimes, focussing on the
types of criminal activities in the cyberspace.
There are several cyber crime activities that can take place such as Internet and
network attacks, unauthorised access and use, software theft and information
theft. The following subtopics will explain them in details.
Copyright © Open University Malaysia (OUM)
230 TOPIC 10 ETHICS, PRIVACY AND DIGITAL SECURITY
(a) Malware
Also known as malicious software, it consists of programs that act without a
userÊs knowledge and deliberately alter the operations of computers and
mobile devices. There are many types of malware, for example, computer
viruses, worms, Trojan horses, spyware and adware. Malware does the
damage after it has been implanted or introduced into a targetÊs computer.
It can trigger in a variety of ways such as when a user opens an infected file,
runs an infected program, connects an unprotected computer or mobile
device to a network or when a certain condition or event occurs, for example,
when the computerÊs clock reaches a specific date that is intended. It can take
the form of executable code, scripts, active content and other software.
(c) Phishing
This attack can be traced as far back as 1987. Since then, the risk of falling
victim to a phishing attack has increased incrementally due to the world-
changing adoption of Internet users and the constant pool of personal
information available through social media. Phishing attacks are an email-
based form of social engineering. Disguised as legitimate communication,
the fraudulent email tricks the recipient into responding by enticing them to
click a link, open an attachment or directly provide sensitive information.
Phishing attacks have become one of the most prevalent methods of
cybercrime because they are effective due to their ability to bypass detection
methods and offer low risk as there is little chance of capture or retribution.
In brief, to safeguard from Internet and network attacks, several prevention can be
practised including the use of antivirus software, be suspicious of unsolicited
e-mail attachments, scan any removable media for malware before using it,
implement firewall solutions and back up regularly.
Some system administrators set up alerts to let them know when there is an
unauthorised access attempt so that they may investigate the reasons. These alerts
can help stop hackers from gaining access to a secured or confidential system.
Many secured systems may also lock out an account that has had too many failed
login attempts.
Unauthorised use refers to the use of a computer or its data for unapproved or
possibly illegal activities. Unauthorised use includes a variety of activities, for
example, an employee using an organisationÊs computer to send personal e-mail
messages, an employee using the organisationÊs word processing software to track
his childÊs soccer league scores or a perpetrator gaining access to a bank computer
and performing an unauthorised transfer.
Among the measures that can be used to curb this activity include activating the
access control that will limit who can have access to the a computer, device or
network, determining when they can access it and what actions they can take while
accessing it. Setting up usernames and passwords or using biometric devices to
grant access control can also be added in.
To protect software media from being stolen, owners should keep original
software boxes and media or the online confirmation of purchased software in a
secure location, out of the sight of prying eyes. All computer users should back up
their files and drives regularly, in the event of theft.
SELF-CHECK 10.2
Ethics is the standards that determine whether an action is good or bad while
computer ethics are the moral guidelines that govern the use of computers,
mobile devices, information systems and related technologies.
A digital security risk is any event or action that could cause a loss of or
damage to computer or mobile device hardware, software, data, information
or processing capability. The common digital security risks are caused by cyber
criminals, computer crimes and calamities.