ICT & Multimedia Fundamentals: Computer Hardware Block Diagram (Above)
ICT & Multimedia Fundamentals: Computer Hardware Block Diagram (Above)
• text
• images
• animations
• video
• audio
Multimedia applications are commonly used for training / education. Compared to learning
from a textbook, multimedia applications allow students to see animations, videos, etc. This can
bring a subject to life and make it much easier to learn.
1|Page
ICT & Multimedia Fundamentals
PROCESS
The processing unit controls all activities within the system. For every instruction, the
control unit repeats a set of four basic operations called the machine cycle:
Fetching
the process of obtaining a program instructions or
data item from memory.
Decoding
the process of translating a program instruction into
signals that the computer can execute.
Executing
the process of implementing the instructions in a
program.
Storing
the process of writing the result to the storage or
memory.
The CPU is the 'brain' of the computer. It is the device that carries out software instructions.
A typical, modern, fast CPU runs at around 2.8GHz. That means it can
perform almost 3 billion actions every second!
Pentium 3, Pentium 4, AMD Athlon, AMD Turon, AMD Phenom, Intel Core i7 and Intel Atom
are examples of a CPU.
CPUs usually plug into a large socket on the main circuit board (the motherboard) of a
computer. They get very hot when they are operating so usually have a large fan attached to
their top to keep them cool.
STORAGE
Storage is a location which data, instruction and information are held for future use. Every
computer uses storage to hold system software and application software. When we issue a
command to start the application software, the operating system locates the program in
storage and loads it into memory.
A storage medium, also called secondary storage is the physical material in the computer
that keeps data, instruction and information. A storage device is the computer hardware
that records or retrieves items to and from storage media. There are two types of storage
which are primary storage and secondary storage.
2|Page
ICT & Multimedia Fundamentals
storage device. This means that if the computer’s power is turned off the contents of
RAM disappear and are lost.
A hard drive, a CD-ROM, a floppy disc and a USB memory stick are all examples of
secondary storage devices. Secondary storage is non-volatile, so data that is stored on
these devices remains there safely.
INPUT
Input is any data or instructions that we enter into the computer system for processing.
There are some common ways of feeding input data into the system, which are:
• typing on a keyboard
• pointing with a mouse
CPU accepts instruction from the user and translates the instruction into readable
information (decode).
OUTPUT
Output is data that has been processed into a useful form, called information. There are four
types of output, which are texts, graphics, audio and video. The text consists of characters
that are used to create texts, sentences and paragraphs. Graphics are digital representations
of non text information such as drawings, charts and photographs. Audio is music, speech or
any other sound. Video consists of images that provide the appearance of full motion.
3|Page
ICT & Multimedia Fundamentals
b. Application Software
Software that is used to help a user perform a task and solve a problem.
An operating system is a special piece of software that manages the general operation of a
computer system:
Without an operating system, a computer is of little use. But, just having an operating system
running alone on a computer is also not very useful - we need to have application software
(such as Microsoft Word, Microsoft Excel, Sony Vegas, Macromedia dreamweaver and etc.) so
that we can actually do useful tasks with the computer.
A utility program which is also called a utility is a type of system software that allows a user to
perform maintenance-type tasks usually related to managing a computer, its devices or its
programs. Types of utility program are antivirus, screen saver, file manager, file compression,
diagnostic utility and disc defragmenter.
Examples of utility program are Winzip, Winrar, Flashplayer, Adobe Reader, CCleaner, iTunes,
VLC Player, Shockwave etc.
Useless!
On its own, the hardware of a computer is a fairly useless lump of plastic and
metal!
It Works!
(But it's not very useful)
Add in an operating system and you have a computer that actually works.
Useful!
To do any useful work you will also have to add application software.
+ +
4|Page
ICT & Multimedia Fundamentals
Software :
• Freeware is software that is available for use at no cost or for an optional fee,but usually
with one or more restricted usage rights. Freeware is in contrast to commercial
software, which is typically sold for profit, but might be distributed for a business or
commercial purpose in the aim to expand the marketshare of a "premium" product.
• Shareware (also termed trialware or demoware) is proprietary software that is provided
to users without payment on a trial basis and is often limited by any combination of
functionality, availability (it may be functional for a limited time period only), or
convenience (the software may present a dialog at startup or during usage, reminding
the user to purchase it ).
• A software suite is a collection of individual programs sold as a single package. The
software suite is designed to enhance the performance of our work. It typically includes
word processing, spreadsheet, presentation and e-mail. Currently, Microsoft Office is a
very popular example of software suite being used. Another examples areMicrosoft
Office, Appleworks, Corel WordPerfect Office, Office.Org, Lotus Smart Suite.
• Groupware refers to programs that help people work together collectively while located
remotely from each other. Programs that enable real time collaboration are
called synchronous groupware. Groupware services can include the sharing of calendars,
collective writing, e-mail handling, shared database access, electronic meetings with
each person able to see and display information to others, and other activities.
b. Spreadsheet
A program that processes information in the form of tables. Tables cells can hold values or
mathematical formula. A spreadsheet is a program that processes information in the form of
grid of columns and rows. It is also called a table. Table cells can hold values or
mathematical formulas. Spreadsheets are indispensable tools for anyone who works with
numbers.
Some features of spreadsheet include:
creating, editing and formatting worksheet in rows and columns
5|Page
ICT & Multimedia Fundamentals
containing formulas which can perform calculations on the data in the worksheet
making charts, which depicts the data graphically such as column charts or pie charts
what-if analysis, the ability of recalculating the rest of the worksheet when data in a
worksheet changes.
Examples : Corel Quattro Pro, Microsoft Excel, Sun StarOffice Calc
c. Presentation
An application software that allows a user to create visual aid for presentation to
communicate ideas, messages and other information to a group. A presentation software
enables users to create transparencies, slides and handouts for presentation. It allows a user
to create visual aids for presentation to communicate ideas, messages and other
information to a group.
Some features of presentation software include:
providing a variety of predefined presentation formats that define the
complementary colours for backgrounds, text and graphical accents on the slides
providing a variety of layouts for each individual slide such as a title slide, a two-
column slide and a slide with clip art, a picture, a chart, a table or animation
enhancing text, charts and graphical images on a slide with 3-D and other special
effects such as shading, shadows and textures
setting the slide timing so that the presentation automatically displays the next slide
after a preset delay
applying special effects to the transition between each slide
inserting images, video and audio clips
Examples : Microsoft PowerPoint, Sun StarOffice Impress, Corel Presentations
d. Graphics Editing
Program that can edit digital representation or non-text information such as drawing, charts
and photograph. Some features of graphics software include:
drawing pictures, shapes and other graphical images with various on-screen tools
such as a pen, brush, eyedropper and paint bucket
modifying the contrast and brightness of an image
cropping unwanted objects
removing “red eye”
adding special effects such as shadows and glows
Examples : Adobe Photoshop, GIMP, Paint, Macromedia Freehand, Corel Draw
For example a network allows computers to share files, users to message each other, a whole
room of computers to share a single printer, etc.
Network connections between computers are typically created using cables (wires). However,
connections can be created using radio signals (wireless / wi-fi), telephone lines (and modems)
or even, for very long distances, via satellite links.
6|Page
ICT & Multimedia Fundamentals
Network Topology
i. Bus Topology
In this type of network, a long, central cable, the
‘bus’ is used to connect all of the computers
together. Each computer has a short cable linking
it to the ‘bus’. Bus topology :
7|Page
ICT & Multimedia Fundamentals
• Can cope with a break in the ring cable since all computers are still joined together
(it is now a bus network)
a. CLIENT/SERVER NETWORK
A client/server network is a network in which
the shared files and applications are stored in
the server but network users (clients) can still
store files on their individual PCs. A server is a computer that shares information and
resources with other computers on a network. These services might include:
b. PEER-TO-PEER NETWORK
Peer-to-peer or P2P network is a network with all the nodes acting as both servers and
clients. A PC can access files located on another PC and can also provide files to other PCs.
All computers in the peer-to-peer network has equal responsibilities and capabilities to use
the resources available on the network. With peer-to-peer network, no server is needed;
each computer in the network is called a peer.
Protocols
Protocols provide the rules on how computers communicate. They define how devices
intercommunicate in a network environment. Some protocols :
8|Page
ICT & Multimedia Fundamentals
• Hypertext Transfer Protocol (HTTP) – This protocol is used to access, send and receive
Hypertext Markup Language files (HTML) files on the Internet.
• Simple Mail Transfer Protocol (SMTP) – This protocol is used for transferring e-mail
between computers.
• File Transfer Protocol (FTP) – FTP is responsible for allowing files to be copied between
devices.
• TCP/IP (Transmission Control Protocol / Internet Protocol) is the internet communication
protocol. It is a standard that sets the rules computers must follow in communicating with
each other on a network. Some refer TCP/IP as the Internet Protocol Suite.
a) Internet
• The Internet, or the Net, is the
worldwide, publicly accessible system of
interconnected computer networks that
transmit data by packet switching using
the standard Internet Protocol (IP). It
consists of millions of smaller business,
academic, domestic and government networks, which together carry various
information and services, such as electronic mail, online chat, and the interlinked Web
pages and other documents of the World Wide Web. Internet is one of the uses of
communication. Through the Internet, society has access to global information and
instant communication.
• Transmission Control Protocol (TCP) and Internet Protocol (IP) are the protocols for
communication on the Internet.
• A stream of data that is sent over the Internet is first broken down into packets by the
TCP.
• Data packets include the receiving computer's address, a sequence number, error
correction information, and a small piece of data.
• IP is responsible for sending the packet to its destination along a route.
• A telephone dial-up account and modem, a cable modem, or a Digital Subscriber Line
(DSL) is required for network connection.
• An ISP (Internet Service Provider) offers one or more Points of Presence (POPs) to
connect to the ISP's server.
• The PPP (Point-to-Point Protocol) and the TCP/IP software are required to connect to the
Internet through an ISP.
• The amount of data expressed in terms of bits per second (bps) is referred to as
bandwidth.
• The greater the bandwidth, the lesser will be the time taken to upload or download
data.
• Low-bandwidth modem connections are a bottleneck for sending multimedia across the
Internet.
• Bandwidth bottlenecks can be avoided using the following options:
o Compress data before transmitting.
o Oblige users to download data only once, and then store that data on the
system's hard disk.
9|Page
ICT & Multimedia Fundamentals
o Design multimedia elements to be efficiently compact.
o Design alternate low-bandwidth and high-bandwidth navigation paths to
accommodate all users.
o Implement incremental streaming methods.
• Each Internet service is implemented on an Internet server by dedicated software
known as a daemon.
• Daemons are agent programs that run in the background and wait to act on requests.
• It supports services such as Hypertext Transfer Protocol (HTTP) and Post Office Protocol
(POP).
• The other services provided by the Internet include https, ftp, gopher, usenet, telnet,
Internet Relay Chat (IRC), Simple Mail Transport Protocol (SMTP), and mud.
• Recognizable documents and formats are required to work with multimedia on the
Internet.
• MIME (Multipurpose Internet Mail Extensions) type is a standard list of file name
extensions.
• It identifies the nature and purpose of the transmitted data.
b) Intranet
An Intranet (intra means within) is an internal network that uses Internet technologies and it
is a small version of the Internet that exists within an organisation. An intranet is a private
computer network that uses Internet protocols, network connectivity and possibly the public
telecommunication system to securely share part of an organisation’s information or
operation with its employees. Intranet generally make company information accessible to
employees and facilitate working in groups.
Simple intranet applications include electronic publishing of organisational materials such as
telephone directories, event calendars and job postings.
c) Extranet
An extranet is a private network that uses Internet protocols, network connectivity, and
possibly the public telecommunication system to securely share part of a business’s
information or operations with suppliers, vendors, partners, customers or other businesses.
Package shipping companies, for example, allow customers to access their network to print
air bills, schedule pickups, and even track shipped packages as the packages travel to their
destinations.
Twisted-Pair Cable - Two insulated copper wires that are twisted around each other. Each
connection on twisted-pair requires both wires.
Coaxial Cable - A cable consisting of a conducting outer metal tube that encloses and is
insulated from a central conducting core, used primarily for the transmission of high-
frequency signals.
10 | P a g e
ICT & Multimedia Fundamentals
Fibre Optic Cable - Glass fibre used for laser transmission of video, audio and/or data.
Communication devices
B. Hub
A hub is a device that
connects a number of computers together to make a LAN. The
typical use of a hub is at the centre of a star network (or as part
of a hybrid network) - the hub has cables plugged into it from
each computer.
11 | P a g e
ICT & Multimedia Fundamentals
A hub is a ‘dumb’ device: if it receives a message, it sends it to every computer on the network.
This means that hub-based networks are not very secure - everyone can listen in to
communications.
Hubs are pretty much obsolete now (you can't buy them
any more), having been superseded by cheap switches.
C. Switch
A switch, like a hub, is a device that connects a number of
computers together to make a LAN.
D. Router
A router is a network device that connects together
two or more networks. A common use of a router is to
join a home or business network (LAN) to the Internet
(WAN). The router will typically have the Internet cable
plugged into it, as well as a cable, or cables to
computers on the LAN.
Alternatively, the LAN connection might be wireless (WiFi), making the device a wireless router.
(A wireless router is actually a router and wireless switch combined)
Routers are the devices that join
together the various different
networks that together make up the
Internet.
E. Bridge
A bridge is a network device that typically links
together two different parts of a LAN. Whereas a
router is usually used to link a LAN to a WAN (such as
the Internet), a bridge links independent parts of a
LAN so that they act as a single LAN.
12 | P a g e
ICT & Multimedia Fundamentals
F. Firewall
A firewall is a device, or a piece of software that is placed between your computer and the rest
of the network (where the hackers are!)
In addition to physical devices, firewalls can also be software. In fact most computer operating
systems have a software firewall built in (e.g. Windows, Linux and Mac OS)
G. Modem
Before the days of broadband Internet
connections, most computers connected to
the Internet via telephone lines (dial-up
connections).
The reason telephone lines were used is that almost every building in the world is already joined
to every other via the telephone system. Using the telephone system for connecting computers
meant that people didn’t have to install new wires to their houses and offices just for computer
use. In the last few years however, this is exactly what people have done. Special cables have
been installed just for Internet access. These special cables are designed to carry digital data, so
no modem is required.
The word modem is an abbreviation of MOdulator DEModulator.
13 | P a g e
ICT & Multimedia Fundamentals
So, simply put, a modem is required because computers are digital devices and the
telephone system is analogue. The modem converts from digital to analogue and from
analogue to digital.
14 | P a g e
ICT & Multimedia Fundamentals
Information is any kind of event that affects the state of a dynamic system. Conceptually,
information is the message (utterance or expression) being conveyed.
Machine Code
The first generation of codes used to program a computer, was called machine language or
machine code, it is the only language a computer really understands, a sequence of 0s and 1s
that the computer's controls interprets as instructions, electrically.
Assembly Language
The second generation of code was called assembly language, assembly language turns the
sequences of 0s and 1s into human words like 'add'. Assembly language is always translated back
into machine code by programs called assemblers.
Early computers were used almost exclusively by scientists, and the first high-level language,
Fortran [Formula translation], was developed (1953–57) for scientific and engineering
applications by John Backus at the IBM Corp. A program that handled recursive algorithms
better, LISP [LISt Processing], was developed by John McCarthy at the Massachusetts Institute of
Technology in the early 1950s; implemented in 1959, it has become the standard language for
the artificial intelligence community. COBOL [COmmon Business Oriented Language], the first
language intended for commercial applications, is still widely used; it was developed by a
committee of computer manufacturers and users under the leadership of Grace Hopper, a U.S.
Navy programmer, in 1959. ALGOL [ALGOrithmic Language], developed in Europe about 1958, is
used primarily in mathematics and science, as is APL [A Programming Language], published in
the United States in 1962 by Kenneth Iverson. PL/1 [Programming Language 1], developed in the
late 1960s by the IBM Corp., and ADA [for Ada Augusta, countess of Lovelace, biographer of
Charles Babbage], developed in 1981 by the U.S. Dept. of Defense, are designed for both
business and scientific use.
BASIC [Beginner's All-purpose Symbolic Instruction Code] was developed by two Dartmouth
College professors, John Kemeny and Thomas Kurtz, as a teaching tool for undergraduates
15 | P a g e
ICT & Multimedia Fundamentals
(1966); it subsequently became the primary language of the personal computer revolution. In
1971, Swiss professor Nicholas Wirth developed a more structured language for teaching that he
named Pascal (for French mathematician Blaise Pascal, who built the first successful mechanical
calculator). Modula 2, a Pascallike language for commercial and mathematical applications, was
introduced by Wirth in 1982. Ten years before that, to implement the UNIX operating system,
Dennis Ritchie of Bell Laboratories produced a language that he called C; along with its
extensions, called C++, developed by Bjarne Stroustrup of Bell Laboratories, it has perhaps
become the most widely used general-purpose language among professional programmers
because of its ability to deal with the rigors of object-oriented programming. Java is an object-
oriented language similar to C++ but simplified to eliminate features that are prone to
programming errors. Java was developed specifically as a network-oriented language, for writing
programs that can be safely downloaded through the Internet and immediately run without fear
of computer viruses. Using small Java programs called applets, World Wide Web pages can be
developed that include a full range of multimedia functions.
Fourth-generation languages are nonprocedural—they specify what is to be accomplished
without describing how. The first one, FORTH, developed in 1970 by American astronomer
Charles Moore, is used in scientific and industrial control applications. Most fourth-generation
languages are written for specific purposes. Fifth-generation languages, which are still in their
infancy, are an outgrowth of artificial intelligence research. PROLOG [PROgramming LOGic],
developed by French computer scientist Alain Colmerauer and logician Philippe Roussel in the
early 1970s, is useful for programming logical processes and making deductions automatically.
There are also procedural languages that operate solely within a larger program to customize it
to a user's particular needs. These include the programming languages of several database and
statistical programs, the scripting languages of communications programs, and the macro
languages of word-processing programs.
Mark-up Language
Mark-up language is a language that annotates text so that the computer can manipulate the
text. Most markup languages are human readable because the annotations are written in a way
to distinguish them from the text. For example, with Hypertext Markup Language(HTML),
Extensible Markup Language(XML), and Extensible Hypertext Markup Language(XHTML), the
markup tags(embeds processing instructions) are < and >.
16 | P a g e
ICT & Multimedia Fundamentals
• HTML
o Basics of Hypertext Markup Language (HTML):
o HTML is a markup language.
o It uses tags to perform functions such as formatting text and embedding media.
o HTML tags are enclosed by angular brackets.
o The tags can be written either in upper case or in lower case. They can be
bounding or stand-alone tags.
o HTML provides tags for inserting media into HTML documents. These are:
The <IMG> tag for inserting inline images.
The <EMBED> and <OBJECT> tags for embedding compound documents.
The <APPLET> tags for code.
Scripting Language
Authoring Tools
Authoring tools (authorware) refers to a program that helps to write hypertext or multimedia
applications, it helps to link the objects together such as paragraph of text, illustration or a
song. Authors (Authoring Tools User) can produce attractive and useful graphic by define the
object’s relationship to each other and sequence them in an appropriate (suitable and fitting)
order. Besides that, it supports scripting language for more sophisticated (ahead in
development) application.
Authoring tools are exclusively for applications that present a mixture of textual, graphical, and
audio data. Types of authoring tools have card-based, icon-based, timebased, and object-based.
Examples for authoring tools are Adobe Authorware, Comil Zamrud and Adobe Flash, Adobe
Director.
The Internet is a world-wide network that has grown and evolved from an experimental
network (ARPANet) created by the US military back in the 1960s. Over the years, as more and
more computers and networks have connected to this network, it has grown into the Internet
that we know today.
The Internet connects millions of people, and thousands of businesses, governments, schools,
universities and other organizations.
17 | P a g e
ICT & Multimedia Fundamentals
• The Hypertext Transfer Protocol (HTTP) provides rules for a simple transaction between two
computers on the Internet.
• Hypertext Markup Language (HTML) is a document format for presenting structured text
mixed with inline images.
• The Internet connects private companies, organizations, universities, and individuals.
• The Internet is a cluster of computers.
• ISPs provide network connections through a dial-up account, a cable modem, or a Digital
Subscriber Line (DSL).
• The Domain Name System (DNS) manages the identities of computers connected to the
Internet.
The small, hand-drawn map above show the plan for the
first connections between four computers on the
ARPANet. It was drawn by one of the engineers who
created the network back in 1969.
INTERNET SERVICES
Internet users can access services like:
Email
E-mail is a system that allows messages to be sent and received by computers. E-
mail is the most common form of electronic communication. E-mail messages are
text-based, but other types of file can also be sent as ‘attachments’. E-mails that
are received wait in a user's inbox until the user is ready to read them. (Unlike a
telephone call, the user is free to ignore e-mails until they have time to deal with
them.)
18 | P a g e
ICT & Multimedia Fundamentals
WWW
The World Wide Web or the Web consists of a worldwide collection of electronic
documents.
Each electronic document on the Web is called a web page which can contain text,
graphics, audio and video.These pages are written in Hypertext Markup Language
(HTML). Every website has an address or Uniform Resource Locator (URL). The URL is
formed by the protocol, domain, directory and the document name.
VoIP
Internet telephony, or 'VOIP', is becoming very popular both for personal use, and
within the workplace. Instead of using the normal telephone network (designed to
carry voices using analogue signals), VOIP systems send voices through the Internet
as digital data, just like any other Internet data (e.g. e-mails, files, webpages, etc.
VOIP systems use your Internet
connection to send and receive phone
calls.
VOIP systems can work in several ways:
Newsgroup
A newsgroup is a discussion about a particular subject consisting of notes written to
a central Internet site and redistributed through Usenet, a worldwide network of
news discussion groups.
Blogging
A blog (web log or weblog) is one of the popular activities on the Internet. Most of
these blogs are publicly shared and the authors frequently update the content on a
regular basis. A blog is usually referred to the text produced by the author about his
19 | P a g e
ICT & Multimedia Fundamentals
or her thoughts, experiences or interests. A blog is usually referred to the text
produced by the author about his or her thoughts, experiences or interests.
Mailing lists
Mailing list is a collection of names and addresses used by an individual or an
organization to send material to multiple recipients.
Instant messaging
Instant messaging (IM) is a form of communication over the Internet, that offers
quick transmission of text-based messages from sender to receiver.
Video Conferencing
Video-conferencing is a system that allows people to have conversations and
meetings with other people in different locations, but without leaving their office.
Note: The camera is usually TV quality - much better than a standard webcam.
The system uses the following hardware:
• Video camera
• Monitor
• Microphone
• Loudspeakers
• High-speed network / Internet
connection
Video conferencing is very popular with
businesses as it means:
• No travel costs
• No time wasted travelling to other cities / countries
• Can organise meetings at short notice
However there are some problems with video conferencing:
20 | P a g e
ICT & Multimedia Fundamentals
12. Describe the evolution of ICT convergence : information ( content ), computer and
communication
Definition Of Computer
An electronic device for storing and processing data, typically in binary form, according to
instructions given to it in a variable program.
21 | P a g e
ICT & Multimedia Fundamentals
Fifth Generation Computers
Fifth generation computing devices, based on artificial intelligence, are still in development,
though there are some applications, such as voice recognition, that are being used today. The
use of parallel processing and superconductors is helping to make artificial intelligence a reality.
Quantum computation and molecular and nanotechnology will radically change the face of
computers in years to come. The goal of fifth-generation computing is to develop devices that
respond to natural language input and are capable of learning and self organization.
Computer category
Computers come in all sorts of shapes and sizes. You are all familiar desktop PCs and laptops, but
did you know that computers can be as small as your mobile phone (in fact your phone is a
computer!) and as large as a room?!
a. Mainframe Computer
A mainframe computer is a large computer, often used by large businesses, in
government offices, or by universities.
From their invention back in the 1940s until the late 1960s, computers were large, very
expensive machines that took up the whole of a room (sometimes several!) These were
the only computers available.
The circuit-boards of these computers were attached to large, metal racks or frames. This
gave them the nickname 'mainframe' computers.
b. Supercomputer
Some of the most powerful mainframe computers can process so much data in such a
sort time, that they are referred to as 'supercomputers'
22 | P a g e
ICT & Multimedia Fundamentals
have their own, personal computer, instead of having to share access to a mainframe.
These computers came to be known as desktop computers, or personal computers
(PCs).
d. Laptop Computer
A 'laptop' computer is a light, compact and portable PC.
Laptops contain a rechargeable battery so that they can
be used even when not plugged in to a mains power
supply. They also have a built-in LCD monitor. To make
them as portable as possible,
most laptops try to avoid any
sort of cable or wire. Instead of a mouse, a trackpad is used.
Instead of a wired connection to a network or printer,
'wireless' radio connections are used.
Early portable computers were far from being 'laptops' - you
would have crushed your legs if you'd tried to put these beasts
on your lap!
e. Palmtop Computer
A palmtop computer is similar to a laptop computer, but smaller.
It's small enough to fit in the palm of your hand (hence the name!)
Palmtops are usually not very powerful since fast CPUs require a
large battery and get hot - both problems in a small device.
23 | P a g e
ICT & Multimedia Fundamentals
f. Personal Digital Assistant (PDA)
A PDA is similar to a palmtop computer, except it is even more
compact, and typically has no keyboard, using a touchscreen for
all data input. Since the screen is so small, many PDAs have a
small stylus (plastic stick) that is used to press things on the
screen.
Most PDAs use some sort of handwriting-recognition system to
allow the user to write on the screen, and have their writing
converted into text. PDAs tend to be used a 'digital diaries'
allowing users to take their e-mail, documents, appointments,
etc. with them wherever they go.
Note: You never see PDAs any more since
modern 'smart' phones can do all of this, and
work as a phone too!
Early PDAs, like early palmtops, were pretty basic. But they were a
revolutionary way to take digital data with you on the move.
In the 1990s every business person either had, or wanted one of these!
PDAs are often called Pocket-PCs (for obvious reasons!)
Real-Time Processing
Sometime we need to process data immediately - we cannot wait and
process it later (e.g. using batch processing). For example, if we want to book a seat on a flight,
the booking must be processed immediately. We can't put it in a pile and do it later, because
other people might be trying to book the same seat!
If an item of input data must be processed immediately, and the result is ready before the next
input data is accepted, this is known as a real-time system. Typical application where real-time
processing must be used:
Batch Processing
Sometimes we have a lot of data to process and it is all of a similar form (e.g. we might have to
calculate the pay for 10,000 employees - the calculations we have to do for each employee are
very similar)
In cases like this, we can prepare the data into a set or 'batch' and hand it over to the computer
to be processed in one go. Once we have prepared the batch of data, no user input is required -
the computer works its way through the data automatically.
This type of data processing is known as batch processing. An advantage of this type of system is
that the processing can occur when the computer is not being used for anything else (e.g. at
night). The job is setup, people go home, and when they return the next morning the work has
been done.
24 | P a g e
ICT & Multimedia Fundamentals
• Payroll processing
• Processing bank cheques
• Printing of bank statements
• Updating of a stock database
On-Line Processing
An on-line system is one where the user is directly interacting with the computer - the user is
'on-line' with the computer.
So, any system where the user is entering data directly into the computer must be an on-line
system. If data is being entered and then processed, it's an on-line processing system.
• All booking systems (e.g. flight booking, cinema seat booking, etc.)
• Computer games (e.g. FPS, driving games, etc.)
References :
http://www.igcseict.info/theory/4/hware/index.html
http://en.wikipedia.org/wiki/Shareware
http://inventors.about.com/od/sstartinventions/a/software.htm
http://www.factmonster.com/ce6/sci/A0840227.html
http://en.wikipedia.org/wiki/Freeware
Multimedia finds its application in various areas including, but not limited to, advertisements, art,
education, entertainment, engineering, medicine, mathematics, business, scientific research and
spatial temporal applications. Several examples are as follows:
Creative industries
Creative industries use multimedia for a variety of purposes ranging from fine arts, to
entertainment, to commercial art, to journalism, to media and software services provided for any of
the industries listed below. An individual multimedia designer may cover the spectrum throughout
their career.
Commercial uses
Much of the electronic old and new media used by commercial artists is multimedia. Exciting
presentations are used to grab and keep attention in advertising. Business to business, and
interoffice communications are often developed by creative services firms for advanced multimedia
presentations beyond simple slide shows to sell ideas or liven-up training.
Entertainment:
Multimedia is heavily used in the entertainment industry, especially to develop special effects in
movies and animations (VFX, 3D animation, etc.). Multimedia games are a popular pastime and are
software programs available either as CD-ROMs or online. Some video games also use multimedia
25 | P a g e
ICT & Multimedia Fundamentals
features. Multimedia applications that allow users to actively participate instead of just sitting by as
passive recipients of information are called Interactive Multimedia.
Education:
In Education, multimedia is used to produce computer-based training courses and reference books
like encyclopedia. A user goes through a series of presentations, text about a particular topic, and
associated illustrations in various information formats.
The idea of media convergence is also becoming a major factor in education, particularly higher
education. Defined as separate technologies such as voice (and telephony features), data (and
productivity applications) and video that now share resources and interact with each other,
synergistically creating new efficiencies, media convergence is rapidly changing the curriculum in
universities all over the world.
Multimedia teaching is more intuitive than old ways; teachers can simulate situations in real life. In
many circumstances teachers do not have to be there, students will learn by themselves in the class.
More importantly, teachers will have more approaches to stimulating students’ passion of learning.
Journalism: News reporting is not limited to traditional media outlets. Freelance journalists can
make use of different new media to produce multimedia pieces for their news stories. It engages
global audiences and tells stories with technology, which develops new communication techniques
for both media producers and consumers.
Multimedia reporters who are mobile (usually driving around a community with cameras, audio and
video recorders, and wifi-equipped laptop computers) are often referred to as Mojos, from mobile
journalist.
Engineering: Software engineers may use multimedia in Computer Simulations for anything from
entertainment to training such as military or industrial training. Multimedia for software interfaces
are often done as collaboration between creative professionals and software engineers.
Industry: In the Industrial sector, multimedia is used as a way to help present information to
shareholders, superiors and coworkers. Multimedia is also helpful for providing employee training,
advertising and selling products all over the world via virtually unlimited web-based technology.
Mathematical and scientific research: In mathematical and scientific research, multimedia is mainly
used for modeling and simulation. For example, a scientist can look at a molecular model of a
particular substance and manipulate it to arrive at a new substance.
Medicine: In Medicine, doctors can get trained by looking at a virtual surgery or they can simulate
how the human body is affected by diseases spread by viruses and bacteria and then develop
techniques to prevent it.
Document imaging: Document imaging is a technique that takes hard copy of an image/document
and converts it into a digital format (for example, scanners).
Disabilities: Ability Media allows those with disabilities to gain qualifications in the multimedia field
so they can pursue careers that give them access to a wide array of powerful communication forms.
26 | P a g e
ICT & Multimedia Fundamentals
H. The Application and impact of ICT and MULTIMEDIA as an enabler in agriculture,
manufacturing, e-government, Internet banking and e-commerce that contribute towards the
socioeconomic
development
Agriculture is define as occupation concerned with cultivating land, raising crops, and feeding,
breeding, raising livestock and farming. By using the ICT and Multimedia application such as
Knowledge Management Systems (KMS) to select the most suitable crop to plant, Global
Positioning Systems (GPS) to predict the weather and observe what happening to surrounding,
Geographical Information Systems (GIS) to select the suitable land for the crop to plant, Decision
Support System (DSS) to help decision makers compile useful information from a combination of
raw data, documents, and personal knowledge, or business models to identify and solve
problems and make decisions, and network tool such as mobile phone, radio and wireless
network to promote your product or contact with the buyer. In this case, the positive impact of
ICT and Multimedia is help agriculture increase the productivity of crop, improving marketing
access, opens up new business opportunities around the world, reducing the product cost and
improve the quality of product.
Manufacturing is the process of converting raw materials, components, or parts into finished
goods that meet a customer's expectations or specifications. Manufacturing commonly employs
a man machine setup with division of labor in a large scale production. So with the application of
ICT and Multimedia , such as Computer-aided design (CAD) to assist in the creation,
modification, analysis, or optimization of a design by using computer system and Computer-
aided manufacture (CAM) to control machine tools and related machinery in the manufacturing
of work pieces or to assist in all operations of a manufacturing plant, including planning,
management, transportation and storage by using computer. In this case it come some positive
impact of ICT and Multimedia is to reduce the product development cost, shorten a product’s
time to market and stay ahead of the competition such as using CAM in automobile. Meanwhile
it give a negative impact too, that is reducing the job opportunity for citizen and just providing
the job opportunity for professional technician to operate the computer system.
Internet banking is a system allowing individuals to perform banking activities at home, via the
internet. Some online banks are traditional banks which also offer online banking, while others
are online only and have no physical presence. Online banking has now become something
which million of people do on a daily or weekly because online banking through traditional
banks enable customers to perform all routine transactions, such as account transfers, balance
inquiries, bill payments, credit card application, view direct debit, view historical statement of
banking for previous six month and so on. The application of ICT and multimedia in internet
27 | P a g e
ICT & Multimedia Fundamentals
banking such as Secure Socket Layer (SSL) used to protect the online transactions between their
customers and so on . The benefit of ICT and Multimedia toward internet banking is eliminates
time and distance as barriers to banking, new and exciting ways of marketing directly to
customers, improve the efficiency and effectiveness of online operations. Meanwhile the
negative impact(threat) of ICT and Multimedia is the attacks on online banking used today are
based on deceiving the user to steal login data with some computer software program such as
Cross-site scripting and keylogger or Trojan horses. For and example of internet banking in
Malaysia is www.maybank2u.com.my , www.citibank.com.my , www.hsbc.com.my and so on.
E-commerce is the buying and selling of products or services over electronic systems such as the
Internet and other computer networks and it also consists of the exchange of data to facilitate
the financing and payment aspects of business transactions. The application of ICT and
Multimedia in ecommerce is online banking, Secure Socket Layer (SSL) to protect the online
transactions between their customers, e-mail and fax. With the above application of ICT and
Multimedia it come a lot of benefit such as effectiveness of online operations and delivery, open
global markets, new and exciting ways of marketing directly to the customers, offer new data
products and services via the Web, helped nations to accelerate their economic growth and to
provide more opportunities for the businesses to grow. At the same time, the opposite impact
of the ICT and Multimedia is concern over privacy of customer, appear scamming case and so on.
I. ICT and multimedia as an industry that contributes towards business opportunity and job
creation
28 | P a g e
ICT & Multimedia Fundamentals
o Salesman
o Software agent
o Hardware agent (supplier of hardware like Kingston, Apple, HP)
o Game programmer
o Web Designer
o Animation Director
o ICT/Computer Lecturer, Teacher, Dean, Senior Lecturer, Professor etc.
o Subject Matter Expert/Content Expert
o Network engineer/Computer technician
o Information System officer (Pegawai Sistem Maklumat)
o System Analyst/Software Manager/Chief Information Officer (CIO)/Chief Knowledge
Officer (CKO)
J. The purpose of acts that govern the usage of ICT and multimedia in Malaysia: Communication
and Multimedia Act 1998, Computer Crimes Act 1997, Telemedicine Act 1997 and Digital
Signature Act 1997
o Cyber Laws
Cyber Laws were formed to promote a high level of consumer confidence and to
protect the information security and network reliability and integrity. Cyber laws
consist of Communication and Multimedia Act 1998 Copyright (Amendment-statement
added to improve document, constitution) Act 1997 Computer Crime Act 1997,
Telemedicine Act 1997, Digital Signature Act 1997
29 | P a g e
ICT & Multimedia Fundamentals
electronic communications especially on Internet. The encrypted code consists of the
user’s name and a hash (mess) of all the parts of the message. By attaching the digital
signature, one can ensure that nobody can eavesdrop (overhear), intercept (seize on its
way) or temper (adding something else) with transmitted data. Hence, DSA97 is about
to provides for regulation of public key infrastructure and also make digital signature
legally valid and enforceable as traditional signature.
Note that the encrypted code is refers to a part of the URL where the code is pointing is
encrypted; it can be used to hide sensitive part of target URL of your code to prevent
users from manipulate. For example, change the values of parameters. This can be
relevance.
o Ethical defined as a guideline is needed to stop the current technology from being
exploited. Example : replicating original CDs and sell it as pirated software .Computer
ethics is a system of moral standards or values used as a guideline for computer users.
o Privacy defined as the state of being private; retirement or seclusion. The state of being
free from intrusion or disturbance in one's private life or affairs: the right to privacy.
Refer to data and information privacy and the right of individuals and companies to
restrict the collection and use of information to others. There are 3 computer
technologies to threaten our privacy: Cookie; Electronic Profile and spyware.
o Obscenity defined as a statement or act which strongly offends the prevalent morality of
the time, is a profanity, or is otherwise taboo, indecent, abhorrent, or disgusting, or is
especially inauspicious. Obscenity is also applied to an object that incorporates such a
statement or displays such an act. In a legal context, the term obscenity is most often
used to describe expressions (words, images, actions) of an explicitly sexual nature.
Example: Pornography
o Internet Crime defined as any crime or illegal online activity committed on the Internet,
through the Internet or using the Internet. Identity theft, Internet scams and cyber stalking
are the primary types of Internet crime. Computer crime refers to any crime that involves
a computer and a network. Issues surrounding this type of crime have become high-profile,
30 | P a g e
ICT & Multimedia Fundamentals
particularly those surrounding cracking, copyright, infringement, child pornography, and
child grooming.
1. Adware
Adware can slow down your PC. It can also slow down your internet connection by
downloading advertisements. Sometimes programming flaws in the adware can make your
computer unstable.
2. Backdoor Trojans
A backdoor Trojan may pose as legitimate software, just as other Trojan horse programs do,
so that users run it. Alternatively – as is now increasingly common – users may allow Trojans
onto their computer by following a link in spam mail.
3. Boot Sector Viruses
Boot sector viruses spread by modifying the program that enables your computer to start
up.
4. Cookies
Cookies are files on your computer that enable websites to remember your details.
5. Denial of Service attack (DoS)
A denial-of-service (DoS) attack prevents users from accessing a computer or website.
6. Document Viruses
Document or “macro” viruses take advantage of macros – commands that are embedded in
files and run automatically.
7. Email Viruses
Many of the most prolific viruses distribute themselves automatically by email.
8. Internet Worms
Worms are programs that create copies of themselves and spread via internet connections.
9.Mousetrapping
Mousetrapping prevents you from leaving a website
10. Parasitic viruses
Parasitic viruses, also known as fi le viruses, spread by attaching themselves to programs.
11. Pharming
Pharming redirects you from a legitimate website to a bogus copy, allowing criminals to steal
the information you enter.
12. Phishing
Phishing is the use of bogus emails and websites to trick you into supplying confi dential or
personal information.
Natural Disaster:
31 | P a g e