Computer Hardware - Module-1
Computer Hardware - Module-1
Concepts of Information
Technology
Module Overview
Welcome to Module 1: Concepts of Information Technology. This
module provides necessary theoretical knowledge to understand the
functioning of a modern computer, its capabilities and applications in
everyday life. It also discusses information networks, data security and
copyright issues.
Terminology
1
Primary Memory Provides temporary storage of programs in
execution and the data being processed.
Read Only Memory Forms the basic instruction set for operating the
(ROM) hardware in the system.
2
Network dedicated tasks (servers) and computers that make
use of the services (clients).
World Wide Web Part of the Internet that consists of all the sites that
can be accessed using a web browser such as
Mozilla, Internet Explorer, Opera or Google
Chrome.
3
Computer Hardware
Section overview
Welcome to this section on Computer Hardware. After studying this
section you will be able to:
• understand the term “hardware”.
• understand what a personal computer (PC) is.
• distinguish between a desktop, laptop and tablet PC.
• identify common handheld devices.
• know the main parts of a computer.
• understand the functioning of the central processing unit (CPU).
• know the factors that affect computer performance.
• know about different types of computer memory, input/output
devices and storage devices.
• know the common input/output ports.
• identify some common input/output devices.
Main Concepts
What is computer hardware?
Personal computers
Desktop PC
A desktop PC is a personal computer that
is designed to be stationary, as part of an
office or desktop, rather than portable.
Typically the computer is housed inside a
metal or plastic case, along with devices
such as the power supply, cooling system
and a CD, DVD and/or USB drive. The
monitor, keyboard, mouse and other
peripherals are usually separate from the main computer.
4
Laptop PC
A laptop PC is designed with portability in mind. The monitor, keyboard
and computer are combined into one unit. This type of computer weighs
much less than a desktop PC and usually fits inside a carrying case and
can be moved easily from place to place.
Laptop PCs often have all of the
features of a desktop PC built in,
including a sound system, network
capability and camera. In addition,
they usually have wireless network
capability so that users can connect to
networks wirelessly when they travel.
Laptop PCs have some limitations due
to their small size. Typically the processors used in Laptop PCs are not as
fast as those in desktop PCs because of overheating concerns. Also,
laptop PCs are often more expensive than a desktop of similar capability.
Tablet PC
Portable media players are a type of handheld device used to play audio
or video files. They typically have an audio port through which
headphones are used and may have a small screen for video. More
commonly, handheld devices are being designed to combine the functions
of a PDA, phone, camera and media player in one device.
5
The main parts of the computer
Computer Performance
Computer performance is characterised by the amount of useful work
accomplished by a computer system compared to the time and resources
used.
6
hardware of the system and is responsible for storing and retrieving
information on disks and other media.
There are three main components to the CPU: the Arithmetic and Logic
Unit (ALU), the Control Unit and Primary Memory.
The actual data processing takes place in the Arithmetic and Logic Unit
(ALU) of a computer. The ALU is responsible for carrying out arithmetic
operations such as (+, -, *, ^, /), logical operations such as (AND, OR,
NOT) and relational operations such as (<, >, <=, >=). All programs
consist of complex sets of arithmetic and logical operations. All
mathematical operations are performed in binary numbers and all logic
operations through binary operations.
Control Unit
The Control Unit controls and coordinates all hardware operations. The
ALU responds to commands from the Control Unit. The primary
functions of Control Unit are to:
• read and interpret machine language instructions
• control transmission of data between ALU, registers, caches,
primary memory and auxiliary memory
• control sequence of execution of program instructions
• direct ALU to mathematical or logic operations
Primary Memory
7
Speed of the CPU: The CPU operates as a result of electronic pulses sent
to it by another device on the motherboard called the clock. The speed of
a CPU is measured by the maximum number of pulses it is able to handle.
This is measured in MHz (megahertz) or GHz (gigahertz):
A good personal computer will use a CPU with a clock speed of over
3 GHz. This means it receives 3 000 000 000 million pulses every second
from the CPU.
Previously CPUs could only do one operation per pulse but with
advances in technology, they have been able to improve this. For
example, they can do one operation at the start of the pulse and one at the
end of the pulse.
8
that needs to be saved for a long time, such as a word document or a
digital photo.
Primary memory and storage memory work together. When you open a
document you have saved on your computer, it is transferred from storage
(e.g. your hard drive) to primary memory. When you are finished
working with the document, it is saved back to the storage memory.
Primary Memory
Primary memory is broken down into Read Only Memory (ROM) and
Random Access Memory (RAM).
9
support the computer’s operation increases. In the year 2000, a PC might
have shipped with 256 MB of RAM, but systems in 2009 typically ship
with 2 GB of RAM or greater.
Cache
Because the CPU can perform its operations much faster than data can be
transferred from RAM, many CPUs have on-board cache memory. This
is a type of RAM that the control unit can access very quickly and use for
intermediate storage. Further, data and instructions can be loaded into
cache before they are actually needed. When they are needed, the transfer
is much faster than it would have been if the main RAM had been used.
Memory Measurements
Bits: In all the components of a computer, data and instructions are stored
as patterns of ones and zeros. These individual ones and zeros are called
bits.
The reason for the use of only ones and zeros stems directly from the fact
that modem circuitry makes use of electronic switches and these can only
be on or off. The term for circuitry based on switches is digital.
Arithmetic based on the use of only ones and zeros is called binary
arithmetic.
Bytes: Bits are grouped together into sets of eight. A set of eight bits is
called a byte.
As there are only 256 possible variations within eight bits, this is not
sufficient to represent other alphabets. As a result a new system, called
Unicode, has been developed to represent all the alphabets of the world.
This makes use of two bytes or sixteen bits. With two bytes 65,536
different characters and symbols can be represented.
10
Units of Memory
When files are stored on disk, the amount of space they occupy is
measured in bytes. The following screen shows a partial listing of files in
a directory. Notice the second column which contains the size of the file
in bytes. (Don’t be concerned with the detail of this screen - it is shown
purely for illustrative purposes.)
11
When we work with files and directories, we often need to know how
large the files are or how much space a directory and it’s files occupies.
• One byte is one character which is a number, letter or symbol. It
consists of eight bits (binary digits) and is the smallest unit of
information a computer can process.
• One kilobyte is 1,024 characters and is approximately equal to
one page of text in double-spacing.
• One megabyte is 1,048,576 characters and is approximately equal
to one book.
• One gigabyte is 1,073,741,824 characters and is approximately
equal to 1000 books.
• One terabyte is 1,099,511,627,776 characters and is
approximately equal to a whole library of books.
Storage
When you load a software program such as Open Office or GIMP, the
time lag you experience is related to the transfer of information from
storage memory to RAM. Some storage devices transfer this information
much more quickly than others.
Storage Devices
Diskette
Diskettes are slow and have a low capacity (1,44 Mb). Since they are
cheap, they still tend to be commonly used for storing small amounts of
data. Another advantage is that they can be used over and over again.
Unfortunately, many are not very good quality and data can become
corrupted and unusable very quickly. The disks can become corrupt
through many causes including disk, heat, magnetism or moisture.
Because of this they are not suited to backup purposes.
12
Zip disk
Data cartridge
CD ROM
13
DVD
14
Flash memory
Flash memory devices are typically quite small and can be made to fit
directly inside digital cameras, video cameras, audio devices, smart
phones and personal data assistants (PDAs). Information can easily be
transferred from these devices to the computer, or between computers, by
moving the flash memory.
At the moment they are more expensive per storage unit than hard drives,
especially the larger capacity devices, but they make up for it in
convenience and portability. They tend to be limited in their storage
capacity, currently to about 32 GB, however this figure can be expected
to increase quite dramatically over time.
This table tells you that it is about 100 times as expensive to store an Mb
of data on a floppy disk as it is on a hard drive.
15
Use this table with caution. Treat the values as very approximate relative
values. In other words use them as comparative values, not as monetary
values.
Formatting disks
A new diskette or hard disk is not able to record data immediately. The
disk first needs to be prepared by a process known as formatting. This
marks out concentric circles called tracks. Each track is divided into a
number of sectors. The tracks and sectors are marked out using magnetic
markers.
Fragmentation slows down the operation of the disk as the system needs
to keep track of all the different segments. A disk may be re-organised to
reduce fragmentation by a process called defragmentation.
There are different file systems available, but in all cases the disk needs
to be prepared with the index area, tracks and sectors through formatting.
16
Input and Output
The central processing unit, memory and storage form the core of your
personal computer, but for a computer to be truly useful there must be a
method to get information in (input) and out (output). This is
accomplished by using a variety of input and out devices that
communicate with the computer through input and output ports.
Input/Output ports
Input/Output ports refer to the memory addresses used by the CPU for
direct communication with input and output devices. The exchange of
commands or data between the processor and the device takes place
through the I/O port address of the device. There is a specific memory
address for each type of device.
Input/Output Devices
Input devices
The most common input devices for modern computers are the keyboard
and mouse. Keyboards have been part of personal computers from the
beginning. Originally, computer operating systems and applications were
17
very text-based. A keyboard enabled a user to input text to operating
systems and applications such as word processers. They are still essential
for inputting text into word processed and other documents.
18
Output devices
Output devices are computer hardware that receive information from the
CPU and present that information to the computer user. Common
examples of output devices include computer monitors, printers and
speakers.
19
• LCD Monitors – liquid crystal displays
(LCDs) use two pieces of polarised glass
with a liquid crystal trapped between
them. The screen is lit from the back and
the crystals align to allow varying levels
of light to pass through. LCD monitors
require much less thickness than CRT
monitors and are therefore typically used
on laptop systems. Also, since they take up less space, generate
less heat and use less electricity, they are becoming the monitor
of choice for desktop systems as well.
Computers have been equipped with sound chips and internal speakers
from very early in their development but because of the limitations of the
hardware, the types of sounds that could be played were simple “beeps”.
The audio suffered from low volume and distortion which required other
system processes to stop while the sound played.
20
Modern computer systems use sound
cards either attached to or integrated
with the computer main board. These
sound cards usually come with their
own memory and therefore don’t take
away processing resources from the
main computer. The sound cards have
ports for attaching speakers,
headphones, microphones and other
devices such as media players. Modern sound cards, when accompanied
by high-end speaker systems, are capable of very good sound
reproduction.
Printers are classified by the type of print technology they use. The most
common types of printers are:
Note: some devices act as both input and output devices. An example is
the touch screen monitor, which has a graphics output function and a
touch pad input function.
21
Summary
In this section, you learned:
22
Software
Section overview
Welcome to this section on Software. After studying this section you will
• understand the term “software”
• distinguish between operating systems software and application
software
• understand reasons for software versions
• understand the main functions of an operating system
• know about different operating systems
• know about graphical user interfaces (GUI)
• know about common software applications such as: word
processing, spreadsheet, database, Web browsing, desktop
publishing, accounting, together with their uses
• know about the process of analysis, design, programming and
testing often used in developing computer-based systems
Main Concepts
What is computer software?
Computer software is the non-physical part of a computer. It is a term
used to describe the programs and documentation that play a part in a
computer system’s operation. It is an integral part of a computer system
since it forms the set of instructions that a computer needs to run.
Without software, a computer system is simply a collection of metal,
plastic and other elements with no function.
Types of Software
Systems software
Systems software is the term used to describe programs that enable the
computer to function, improve its performance and access the
functionality of the hardware. Systems software’s sole function is the
control of the operation of the computer. You can think of systems
software as providing the foundation for applications software.
23
Application software
Application software is the term used for programs that enable the user to
achieve specific objectives such as create a document, use a database,
produce a spreadsheet or design a building.
Versions
A change in the number before the decimal point represents a major new
version while a change in the numbers after the decimal point represents
a less significant change.
The following list names some operating systems. They are grouped
according to similarity.
• Unix; Linux; Free BSD
• Windows 95; Windows 98; Windows Me, Windows NT4
Workstation/Server; Windows 2000 Workstation/Server;
Windows XP; Windows 2003 Server; Windows Vista
• Macintosh OS 9; Macintosh OS X
24
Application Software
The following table lists some types of application software, brand names
and function.
Microsoft Word
Corel WordPerfect
Quattro Pro
Lotus 123
StarImpress
Kpresenter
Microsoft PowerPoint
25
Application Brand names Function
26
There are some disadvantages to using a GUI based operating system.
• Not all the functionality is available. The icon represents the most
commonly used form of a function. A text based system gives
you access to all the options associated with a function. Power
users tend to switch between the GUI and the system prompt as
needed.
• Being graphics based, a GUI runs more slowly than a text based
system. However, with the power and speed of modern
computers this is not the problem it once was.
27
The following screen illustrates the use of a menu:
Speech recognition
Speech recognition software converts spoken word into machine-readable
input that can be opened with text editing software. It is especially useful
for people who have difficulty using their hands because of injury. Other
uses are for transcription, where long recordings of human speech have to
be transcribed to text.
Screen readers
Screen magnifiers
A screen magnifier is a software program that enlarges a portion of the
computer screen for visually impaired people with some visual function.
On-screen keyboard
An on-screen keyboard, or virtual keyboard, is a program that allow users
to enter keystrokes with multiple input devices, such as a computer
mouse, a head mouse, or an eye mouse. It provides an alternative
mechanism for people who cannot use a physical keyboard to enter
characters.
28
System Development
Program Development Life Cycle
The following are often also included as part of the development cycle.
Implementation Once the systems analysts are satisfied that the system is
operating correctly, it is installed and implemented. Usually this
is done using a pilot group. In this implementation, the system is
implemented on a limited scale to start with. If any further bugs
are found, these can be eliminated before full scale
implementation.
Further development Once the system has been in use for a while, further problems,
limitations or performance problems may become apparent. The
system will then be modified and new versions released with the
changes.
29
Summary
In this section, we learned:
• Computer software is the non-physical part of a computer. It is
a term used to describe the programs and documentation that play
a part in a computer system’s operation.
30
Information Networks
Section Overview
Welcome to this section on Information Networks. After studying this
section you will be able to:
• Understand the concept of networks
• Distinguish between Local Area Network (LAN) and Wide Area
Network (WAN)
• Understand the term client/server
• Know the advantages associated with group working such as:
sharing printers, applications and files across a network
• Differentiate between Intranet, Extranet and Internet
• Understand what the Internet is and know some of its main uses
• Understand what the World Wide Web (WWW) is
• Distinguish the WWW from the Internet
• Know about different types of communication technologies
• Understand the terms analogue, digital, modem, transfer rate
• Know about the use of telephone network in computing
• Understand the terms Public Switched Telephone Network
(PSTN), Integrated Services Digital Network (ISDN),
Asymmetric Digital Subscriber Line (ADSL)
Main Concepts
What are computer networks
31
Client-server and peer-to-peer networks
Networks on which all computers have equal status are called peer-to-
peer networks.
A server which is used for the central storage of files is called a file
server. Using a file server, users can access their work from anywhere on
the network. They can also make these files available to users on other
computers. File servers also enable users to co-operate on a task by
centralising the results of their work. Sending files to a server from a
client computer is called uploading, whereas receiving a file from a
server to a client computer is called downloading.
LAN
WAN
32
Advantages of Networking
Sharing Printers and Files
33
Internet Connection Sharing (Proxy Servers)
• Proxy servers contain a repository of Internet sites recently
visited and cached for quicker access at a future date.
• Proxy servers can be configured with firewall software. This
helps protect the network from attack by hackers.
• Files can be filtered for computer viruses before being passed on
to the network.
• Organisations can control access of users to outside sites.
• Since there is only one point of communication there is a large
saving on line costs.
Communication Terminology
Analogue signals
Digital signals
Modems
A modem or modulator-
demodulator is a device connected
between a computer and a
telephone line. Its function is to
convert the digital signals of the
34
computer into a form suitable for transmission over a telephone line. It
must also do the reverse and convert the telephone line signals into a
form suitable for the computer. Note that the modem used to connect to
an ISDN line is different to that used to connect to an analogue line.
1 Mbps = 1 024 kbps = 1 048 576 bps (roughly 1 000 000 bps)
PSTN
35
ISDN
ADSL
36
Extranet
Internet
The Internet is the collection of all computers across the world which can
access each other in some way. The links between computers might
include telephone, fiber optic cable, radio, microwave or satellite. Today
tens of millions of computers are able to access each other. The Internet
has no central organisation which controls its use. Because the Internet
knows no borders, many governments have tried to control the flow of
information across the Internet. However, communications technology is
so varied and so widespread that this is a near impossible task.
Uses of Internet
The World Wide Web or WWW is a part of the Internet. The WWW
consists of all the sites that can be accessed using a web browser such as
Mozilla, Internet Explorer, Opera or Google Chrome. In order for a
browser to access a web site, the web site must contain files that have a
particular format constructed using HyperText Markup Language or
HTML. These sites are typically developed using special web
development applications, but it is possible to create simple web sites
using a word processor by saving the document in HTML format.
The HTML documents are stored as web pages on special servers known
as web servers. These run special web server software such as Apache
Web Server or Internet Information Services.
The WWW enables the free flow of information across the world.
Developments in technology have made access to the Internet easier and
37
faster. As a result the WWW also became known as the Information
Superhighway.
Most of the activities listed under the Internet in the previous section are
now actually carried out using the World Wide Web. In other words, the
sites are created in HTML or a similar format, are installed on web
servers and are accessed by web browsers.
Dial-up connections
Broadband connections
Cable
Cable connections to the Internet work by using the same cable that
carries television signals. The theoretical maximum speed for a cable
38
connection is 30 Mbps, but this is seldom achieved for a variety of
reasons, chief among which is that the more people in close proximity
that are using the Internet at any time, the slower the connection.
However, cable connections provide a much higher speed than dial-up
and are comparable to ADSL.
ADSL
ADSL (asynchronous digital subscriber line) connections work by
splitting your phone line into two separate channels, one for data
(Internet) and one for voice (phone calls). This means you can talk on the
phone and be connected to the Internet at the same time.
The speed of an ADSL connection ranges from between 256 kbps to
8 Mbps, depending on what your Internet Service Provider offers.
Satellite connection
Summary
In this section, we learned that:
39
browser but will usually not be able to access the wider
Internet.
40
The Use of Information Technology (IT) in Everyday Life
Section Overview
Welcome to this section on the use of IT in everyday life. After studying
this section you will:
• understand the use of computers and communication technology
in our everyday life
• be able to identify some situations where a computer might be
more appropriate than a person for carrying out a task and where
not
• know some of the uses of large scale computer applications in
corporate, public, health and education
• understand the term teleworking
• list some of the advantages of teleworking such as reduced or no
commuting time, greater ability to focus on one task, flexible
schedules and reduced company space requirements
• list some disadvantages of teleworking such as lack of human
contact and less emphasis on teamwork
• understand the term electronic mail (e-mail) and know its main
uses
Computers at Work
Computers are ideal for repetitive work requiring speed and accuracy.
This is especially true of those situations where human beings would
become bored or simply cannot work fast enough. Some examples
include:
• corporate data processing including functions such as sorting,
selecting and summarising
• analysis of census and other demographic data
• administration of the national revenue system
• actuarial calculations
• statistical analysis
• corporate accounting functions
• creation of animations for films
• weather forecasting
• forensic analysis such as DNA and fingerprint matching
• manufacture of electronic components and circuitry
41
myriad of other details. Many of these activities are themselves linked in
one or more ways. For example, stock levels of raw materials and
production schedules are very closely linked.
42
electronically by filling in the return online and authorising payment
directly from their bank account.
Other organisations also collect data for specific research purposes. For
example, Medical Research Councils will conduct research to determine
the prevalence of HIV/Aids. This research relies on sophisticated
statistical software to analyse the data.
Vehicle Registration
Voting registers
Electronic voting
43
Health Sector Applications
Patient records
Patient records need to record not only personal details such as name,
address, relatives and employer, but most importantly detailed health
history, record of operations and medication. The more efficiently this
information can be stored and retrieved, the more efficiently the health
care system can be administered.
Scheduling
Diagnostic tools
Other diagnostic tools connect the patient directly to the computer. This
is commonly used in the diagnosis of cardiac problems. Not only are all
the different heart waves displayed on the screen, but the physician has
the option of magnifying or analysing any of the patterns in more detail.
They can also be stored and compared with the heart patterns at a later
stage.
44
Education Sector Applications
Student records
Timetabling
Automated examinations
45
of questions. This would mean that no two students would get the same
set of questions.
Distance learning
It also means it can recruit students from all over the world. Registration
and payment of fees can also be done online.
There are two important aspects to using the Internet to search for
information to do assignments:
2. Sifting the good from the bad: There is no control over the
Internet. People can, and do, deliberately post incorrect or biased
information on the Internet. You need to be able to assess the
quality of what you read. For example, does the site give
references to its sources or is the information corroborated by
that on another independent site. Developing a critical mind in
determining the quality of information is as important as being
able to access information in the first place.
46
Teleworking Applications
Teleworking means literally doing work at a distance. This means instead
of going into an office, you work from home, a holiday cottage, another
country or any other location. When you telework, you can be thought of
as having a virtual office.
Not all occupations lend themselves to teleworking, but there are many
that do. Examples include journalists, writers, computer programmers,
graphic artists, consultants and representatives. Often teleworking is
associated with contract work. Professionals are paid to do specific tasks
and are given deadlines within which these have to be created. Where
they do it is not relevant as long as it is done professionally and on time.
Advantages of Teleworking
Professionals
• Do not waste time on commuting between home and work.
• Are free to undertake work where ever they are.
• Have greater ability to focus on one task.
• Have flexibility to arrange their work time according to their
needs and inclinations.
• Generally have tax advantages as they can claim business
expenses.
Organisations
• Save on office space, equipment and facilities.
Disadvantages of Teleworking
Professionals
• May suffer from lack of human contact.
• Need to be highly self-disciplined.
Organisations
• May not get the benefits of teamwork.
• May have less control over workers.
47
to attend team meetings which focus on planning, allocation of tasks,
feedback or general motivation.
Web based email systems only require that you have access to the
Internet. Many of these such as Yahoo, Hotmail, Gmail and Eudoramail
are free. Web based mail systems act as remote mail clients. Effectively,
you log on to the mail client on the server using a web browser. From that
point on, it acts in much the same way as a mail client installed on your
own computer. You can log on to your web based mail system where
ever in the world you happen to be.
Email Addresses
Advantages of email
• It is very fast and efficient. Mail is transmitted from the sender to
recipient in a matter of seconds. Recipients can reply
immediately. If both happen to be on-line at the same time, they
can conduct a conversation using email.
• Documents and files can be sent with the email. The only
limitation is the maximum size of attachments that your system
will permit.
• It is very cost effective. The cost of sending an email is a fraction
of the price it would be to send it as a letter.
• There is a saving on paper, printing, postage and envelopes.
• Email clients can be organised so that copies of emails that have
been sent can be stored under appropriate directories.
Disadvantages of email
• If there is a problem with the telephone lines/networks, email
cannot be sent or received.
• There are certain security problems such as the interception of
email by hackers. This can be overcome by encrypting email.
This requires the email to be coded into an unintelligible form
48
using a key. The recipients system has access to the key and is
able to decrypt the email.
• Occasionally problems in the complex system between sender
and recipient may occur, causing email to disappear. To know
when this has occurred, it is possible for your system to request a
receipt of delivery from the recipient’s computer.
• Unsolicited email or spam is becoming a problem. Because it is
simple to send thousands of identical emails to users at the same
time, some merchants acquire lists of email addresses and
compile these into distribution lists. They then send the same
advertising email to everyone on the distribution list. To
overcome this, anti-spamming software is now available which
identifies certain addresses as sources of spam and discards any
mail that comes from them.
CNP transactions
49
Purchasers need to be sure that:
• They can afford the goods they are buying. It is very easy to
spend money using a credit card on the Internet.
• The vendor will not abuse the information and make
unauthorised debits. Purchasers should not deal with any
unknown sites.
• The information will not be stolen by employees and used
fraudulently. Once again, well known reputable sites will have
measures in place and will generally take responsibility if
anything does go wrong.
• The information will not be stolen and used by hackers. Only use
sites that are able to encrypt the information you send using a
secure link such as SSL. This eliminates the risk of insecure
payment methods.
• They do not use public accessible computers such as in Internet
cafés to do transactions. People can easily access information
provided through the computer after you have left.
50
Summary
In this section you:
• Discussed the use of computers and communication technology
in our everyday life, including:
o Corporate Applications
o Public Sector Applications
o Health Sector Applications
o Education Sector Applications
• Identified situations where a computer might be more appropriate
than a person for carrying out a task and where not.
• Discussed some of the advantages of teleworking such as reduced
or no commuting time, greater ability to focus on one task,
flexible schedules, reduced company space requirements.
• Discussed some of the disadvantages of teleworking such as lack
of human contact, less emphasis on teamwork.
51
Computer Security
Section Overview
Welcome to this section on computer security. After studying this section
you will:
• understand the term information security
• be familiar with privacy issues in computing
• understand the importance of data backup
• be aware of possible implications of theft of computers
• understand the danger of computer viruses and the best practices
for downloading
Information Security
Because information and information technology are fundamental to just
about all aspects of modern life, the modern era is often referred to as the
Information age. By its very nature, much information is private and
confidential. Information security refers to all the procedures which are
used to protect information for deliberate or accidental misuse or
dissemination. Technically, it refers to the maintenance of the integrity of
information. Integrity means that the information remains correct at all
times and cannot be accessed by unauthorised agents.
Personal privacy
Company confidentiality
52
Protecting company information
Security procedures
Privacy Issues
Information stored on computers
Physical procedures
53
sensitive installations should also have adequate protection from criminal
and terrorist activities.
Laptop computers present the greatest risk. They are not only light and
easy to pick up, but they are also more expensive and valuable than
desktops. The best protection is not to let them out of site. If a manager is
staying at a hotel, he or she can leave the computer in the hotel safe rather
than their room.
Software procedures
Firewalls
Access rights
Access rights can refer to both physical and software. In a physical sense,
these refer to different members of staff who have to gain physical access
to certain areas. For example, access to the room containing the
mainframe may be restricted to operators. Software rights refer to the
level of access different users have to different levels of data and
information. For example, some users may have no access to certain data,
others may only be able to read the data but not change it. Others in turn
may have full rights to create and change data. Access rights are
associated with a user id and password. A user id could be a user name
or a combination of letters and numbers. To log on to a system a user
would need a user id and a password. As other users may know the user
id of colleagues, another level of security in terms of passwords needs to
be added. Passwords are private and should never be divulged to anyone
else. Users could have several user ids, each with a different level of
security. They would log on each time with the lowest level of security
they need to accomplish a given task.
54
Password policies
Data encryption
55
Vulnerability of data (Data Backup)
Data is vulnerable in many ways:
• The system on which it is stored can fail. For example, a hard
drive may crash due to component failure.
• The medium itself may become corrupt. Where data is stored on
a magnetic medium, this can become corrupt due to a number of
factors including moisture, heat, magnetic fields and
electromagnetic radiation. Even optical storage which is highly
reliable should never be regarded as infallible.
• The system can be stolen.
• The system could be physically damaged through war, criminal
activity, vandalism or carelessness.
• The system could be damaged as a result of a natural disaster
such as a flood, fire or earthquake.
• The data could be deleted or changed through criminal activity,
vandalism or carelessness.
No matter what care you may take to protect a system, additional copies
of data need to be made and stored on a regular basis. Copies of data are
referred to as backups. The following are some guidelines to working
with backups.
Once backups have been created, they should be stored in a secure area at
a different site. Never keep backups on the same site as the system. They
could be stolen or destroyed along with the rest of the system.
• Backups should be made on a very regular basis. Even for a small
organisation, this should be done daily. Even the loss of a single
day’s work would be a major problem. In large organisations
backing up may take place on an on-going basis. A schedule of
backing up should be clear policy and strictly adhered to.
• More than one copy of data should be made. If the data is very
valuable, the different copies could be stored in different secure
locations.
• Different versions of the backup should be retained. The
following is an example of a backup schedule that could be
followed.
The cycle of backing up starts on the first Monday of the month. At the
end of each day of the week a backup is made. At the end of the week,
there is a Monday, Tuesday, Wednesday ... Saturday backup. On Sunday
a backup is created and labeled Week 1 backup. This is kept for the rest
of the month. The weekday tapes are then reused and the process
repeated. At the end of the month you end up with a series of weekly
backups. The last one becomes the backup for the month and the process
starts over the next month. At the end of the year you then have a series
of monthly backups.
56
optical storage is becoming more common. For personal use, a
CD or DVD makes an excellent backup. Never use diskettes for
backup purposes. They are not reliable for this purpose. Even
when backing up a PC, make multiple copies and keep them at
another site for safe storage. You could, for example, use a safety
deposit box at a bank.
Often a network server has two identical hard drives, one being a mirror
image of the other. This means that if one fails the other one can take
over. In other words all the software on the first is identical to the
software on the second.
Implication of Theft
Highly portable devices such as cell phones, PDAs and laptop computers
can contain vital and confidential information. Even if the information is
not confidential, it could be vital to your work. Losing your contact list or
diary will very seriously compromise your business operations.
PDAs, cell phones and laptops usually contain contact lists and diaries.
Make sure that copies of these are kept elsewhere. Cell phones and PDAs
come with synchronisation software. This software links the device with
a personal computer or laptop and updates each of them with the latest
data. In other words, if you keep your diary on your PDA, synchronising
will automatically update the diary (and contacts) on the PC or laptop.
You should make sure that your diary and contact list are on two different
devices. These should be kept apart so that they are unlikely to be stolen
at the same time. Ideally, you should make backups of these at the end of
every day and keep these backups in a safe location.
Although you can at least retain your diary, contacts and files through the
use of backups, loss of these can compromise you seriously. If for
example, you keep information of your bank and credit cards details on
your PDA, cell phone or laptop, a criminal could make use of these if
they steal these devices.
Computer Viruses
A computer virus is a program that is deliberately created to cause
annoyance or alter or delete data. Some viruses cause computer systems
to slow down to the point where they are not usable. One of the features
of viruses is that they are designed to replicate and spread.
57
Types of Viruses
Trojan: A Trojan (or Trojan horse) is a virus that hides itself inside
another legitimate program. When the program is used, the virus is
released and can begin its work of replication and annoyance or damage.
Worm: A Worm is a program that replicates itself over and over in the
computer’s memory until the computer can barely function. One of the
signs of invasion by a worm is the slowness of computers.
Time bomb: A time bomb is a virus which lies dormant until a certain
date or time or for a period of time. At this date or time, the virus
suddenly becomes active and carries out whatever task it is programmed
to do. This can include the deletion of everything on the hard drive.
Virus Protection
Anti-virus software
58
It is important to keep in mind that no anti-virus software is perfect. It is
only as good as the techniques it uses for detecting viruses and the
currency of the signature file. There is always the chance that a virus will
go undetected. However, a good anti-virus system installed on your
system is essential and will usually detect most viruses.
When a virus is detected, the software will attempt to remove the virus.
This is called cleaning or disinfecting. It sometimes happens that the
system can detect the virus but not get rid of it. In this case, you will
usually be given the option of deleting or quarantining the infected file.
When a file is quarantined, it is made unusable and so unable to spread
the virus. A future update of the software may be able to remove the
virus. If it can the quarantine is removed.
There are a number of measures you can take to protect yourself from
viruses:
• Install good anti-virus software and update it on a regular basis,
for example at least once a month but preferably once a week.
But always remember, anti-virus software is not perfect. It cannot
be the only measure you take.
• Scan all diskettes before reading them.
• Enable the auto-protection feature on the anti-virus software to
scan emails.
• Be wary of emails from unknown sources, particularly if they
contain attachments. Some very careful users delete emails they
are unsure of without opening them.
• Use an Internet Service Provider that scans emails before
delivery.
• Do not download files/software from unknown Internet sites.
• Be careful of using diskettes from unknown sources.
• Do not install pirated software.
59
Handling Viruses
Because viruses are still uncommon on Linux systems, there has not been
a great deal of development of anti-virus software. One example of open-
source antivirus software that scans computer files as well as incoming
emails is KlamAV.
Users in turn need to download these changes and update their software.
The longer the period between updates, the more vulnerable computer
systems are to the action of new viruses. Updates are often made
available on a daily basis by developers.
Summary
In this section you:
• became familiar with the main aspects of information security,
including:
o Personal privacy
o Company confidentiality
o Staff employment practices
o Security procedures
• understand the importance of data backup
• became aware of possible implications of computer theft
• understand the danger of computer viruses and the best practices
for downloading files.
60
Copyright and the Law
Section Overview
Welcome to this section on Copyright and the Law. After studying this
section you will:
• understand the concept of copyright when applied to software
and different types of electronic information
• know about shareware, freeware and end user license agreement
• be aware of data protection legislation
Copyright Concept
Copyright refers to the legally protected right to publish and distribute
any literary, musical, artistic or software material. This means that only
the developer and authorised sellers have the right to copy and distribute
computer software, video materials, music or text.
Because there is no control over the Internet, there are hundreds of sites
where software, music and videos can be downloaded. Access to
permanent connections makes downloading of large files physically
possible. Many of these sites are located in countries that do not protect
copyright.
Downloading from the Internet is not the only form of software piracy.
Making copies of software, other than for personal use, as well as
installing software on more computers than specified in the licence
agreement are also forms of piracy.
61
Copyright Issues
When you purchase software, you are actually purchasing the right to
install the software on a specified number of machines. Software usually
comes out in two forms, standalone and network. When you purchase
standalone software, you are purchasing the right to install it on a single
machine. Generally there are further restrictions that are specified in the
licence agreement. Licence agreements are covered in the next section.
When you purchase a network version of the software, you purchase the
right to install the software on computers attached to a particular network.
This may give you the right to install it on all the computers on the
network or a certain maximum number.
It is important to realise that you do not purchase the actual program. The
program remains the intellectual property of the developer. The concept
of intellectual property is used as the developer owns something abstract,
something which is the result of considerable intellectual effort. This also
means that you do not have the right to alter the program in any way
other than the configuration allowed in the installation.
However, you may store the program on CD, DVD, zip disk, diskette,
hard drive or tape, the program still remains the intellectual property of
the developer. This does not mean that you may lend the stored program
out to others, though. This would be a breach of copyright. The stored
version is for that purpose only as a backup and for the licensed user
only.
Licencing Issues
Licence agreements
62
Shareware
Freeware
63
The following is an extract from the licence agreement of KOffice,
another Open Source office application suite.
Preamble
The licenses for most software are designed to take away your freedom to
share and change it. By contrast, the GNU General Public Licenses are
intended to guarantee your freedom to share and change free software-to
make sure the software is free for all its users.
For example, if you distribute copies of the library, whether gratis or for a
fee, you must give the recipients all the rights that we gave you. You
must make sure that they, too, receive or can get the source code. If you
link a program with the library, you must provide complete object files to
the recipients so that they can relink them with the library, after making
changes to the library and recompiling it. And you must show them these
terms so they know their rights.
64
The provisions of the act refer to data in whatever way it is stored,
whether electronic or paper.
• Personal data should be obtained in a fair and lawful way.
• Data should be processed in accordance with its original purpose.
If data is to be used for purposes other than for which it is
collected, safeguards need to be put in place to avoid abuse.
• Data must be up-to-date and accurate.
• Data must not be kept for longer than is necessary.
• Appropriate security measures must be in place to prevent:
- unlawful or unauthorised processing;
- accidental loss;
- damage; and
- theft.
• Personal data may not be transferred.
• Data may not be used for certain purposes such as direct
marketing.
In addition, subjects of the data have certain rights. These include the
right to access data held about them.
Summary
In this section, you:
• discussed the concept of copyright when applied to software and
different types of electronic information
• learned about shareware, freeware and end user license
agreements
• learned about data protection legislation
65
Health Safety and Environment
Section Overview
Welcome to this section on Health, Safety and Environment. After
studying this section you will be able to:
Ergonomics
Ergonomics is the science of co-ordination of the physical and
psychological aspects of human beings with their working environment.
Although computers present us with great opportunities for making our
work easier, they do present some health and safety risks if used
incorrectly. The science of ergonomics tells us how to use computers
correctly.
Monitors
If you work with a monitor, tired, sore or blood-shot eyes indicate eye
strain. The following points indicate some aspects of monitors to be
aware of.
• Refresh rate
The refresh rate of a monitor is the rate at which it updates the images on
the screen. When the refresh rate is too low, the screen appears to flicker.
Apart from the annoyance factor, this causes eye strain. The refresh rate
should be at least 72 Hz (72 times a second) and preferably higher.
• Reflection/Glare
• Focus
The image on the screen should be sharp. Poor quality monitors have a
slightly blurred effect. This causes the eyes to continually attempt to
reduce the blur.
• Low radiation
The beam of electrons that strikes the screen to display the image also
sends out electromagnetic radiation. There is some fear that this can be a
66
health hazard, particularly to pregnant women. Use a monitor with low
electromagnetic radiation.
• Position
Place the monitor in a position where you can look into the distance at
regular intervals. To the side of a window is an ideal position. You need
to change the focus of your eyes on a regular basis to prevent eye strain.
• Angle
• Rest
Take regular rest periods where you do not look at the monitor.
Repeated use of the same muscles and joints can result in a type of injury
called RSI or Repetitive Strain Injury. This type of injury can range from
inflammation of joints, to damaged ligaments and muscles or even
hairline fractures in bones. RSI is usually caused by the incorrect use of
the keyboard and mouse.
• Ergonomic keyboards
Ergonomic keyboards are designed in such a way that the strain on the
hands and finger are reduced.
• Touch typing
Learning to touch type can help reduce strain as it distributes the work
evenly between the fingers. Users who can touch type also tend to use far
less force when striking the keyboard.
Mouse mats or pads are available with a cushion for the wrist to rest on.
Repeated clicking of the mouse buttons can lead to inflamed finger joints.
Resting the wrist on the cushion reduces this effect.
67
Desks and chairs
A chair with adjustable height will allow you to find the most appropriate
and comfortable height for your build.
• Posture
The back should be slightly bent forward. Sitting rigidly upright for long
periods can cause stress in the back and shoulders.
• Support
There should be support for the lower back to avoid sitting in a hunched
position.
• Rest
68
Health Issues
Lighting and ventilation
It is important to ensure that there is adequate lighting, but does not cause
a glare on the screen. Another important consideration is whether there is
enough air circulation in the room as computers generate a lot of heat and
if a room is not adequately ventilated it can become stuffy and cause
fatigue. It is also not good for the equipment so most companies make
use of air conditioning.
Precautions
Apart from health issues, there are a number of safety issues associated
with the use of computers.
A faulty grounding system can cause electrical shock. A good system will
be properly grounded and will incorporate earth-leakage detection. If the
system detects a fault that could lead to electrical shock, a switch will trip
before any damage can be done.
Cabling
The Environment
Paper
One of the goals on information technology was the paperless office. The
reality is quite different and users are often careless and wasteful in the
69
use of paper. The cost factor will be considered in the next section. From
an environmental perspective, waste of paper is very damaging. Here are
some things that you can do to reduce the environmental impact.
• Do not throw paper away. Set up a storage area for paper that
cannot be re-used. Have this collected on a regular basis for
recycling.
• Print on both sides of the paper. Unless you are producing a
document in final form, print on the reverse side of used paper.
• Alternatively, look for organisations that can make use of this
paper. Many poor schools would be very glad to get supplies of
paper that can still be used on one side.
Consumables
Often users throw used toner and ink cartridges away. There are two
alternatives. You can have them refilled or if this is not an option because
of guarantee restrictions on printers, you could resell them to companies
which refurbish cartridges for resale. In either case, you reduce the waste
output from your organisation.
Power
Environmental Consciousness
70
Older, used computers present an environmental hazard when they go
directly to a landfill before being processed. Certain chemicals in the
computer’s construction can lead to degradation of land and water.
Research the options in your community for environmentally safe ways
to dispose of old equipment.
Summary
In this section you:
71
Module summary
72