0% found this document useful (0 votes)
8 views24 pages

Computer Communication

The document provides an overview of computer communication, detailing the processes of data transmission, encoding, and decoding, as well as various types of networks and transmission media. It discusses the advantages and disadvantages of different network topologies, types of signals, and protocols, along with the roles of network operating systems and hardware. Additionally, it highlights the internet's significance, uses, and associated challenges.

Uploaded by

rizzyton82
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views24 pages

Computer Communication

The document provides an overview of computer communication, detailing the processes of data transmission, encoding, and decoding, as well as various types of networks and transmission media. It discusses the advantages and disadvantages of different network topologies, types of signals, and protocols, along with the roles of network operating systems and hardware. Additionally, it highlights the internet's significance, uses, and associated challenges.

Uploaded by

rizzyton82
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 24

COMPUTER COMMUNICATION.

This is the transmission of data and information over a channel between two or more
computers.

Data communication.

This is the transmission of data in form of data signals from one computer to another.

Terms used in computer communication.

Encoding; this is the process through which information from the sending device is
converted into signals which the communication medium can carry.

Decoding; this is the process through which signals are converted back into information in its
original form from the receiving device.

Transmission; this is the process through which signals are sent out through the medium to
the receiving device.

Downloading; this is the transfer of a file to your computer from another.

Uploading; this is the transfer of a file from your computer to another.

Digital divide; this is the difference between people who know how to access and use the
computers and internet and those who don’t know.

Digital Migration; this is the transfer from analog to digital signals.

Instant messaging: This is where an individual chats privately with another using a mixture
of e-mail and mobile phone messages.

Telnet. Is an internet feature that allows micro computer users to connect (logon) to remote
computers as if they were directly connected to those computers.

Modem short for modulator demodulator: A device that converts the data signal from one
form to another. The process of converting digital signal into analog form for transmission
over phone lines is called Modulation. A receiving modem converts the analog signal back
to digital signal in a process known as Demodulation

Broadband. Is a high-capacity transmission technique using a wide range of frequencies.


Attenuation.Isthedecreaseinsignalstrengthasitprogressivelymovesalongadatatransmission
medium.

Band width is the amount of data that can be transmitted by a transmission media.

Throughput refers to the rate of how much data is moved during a certain amount of time.

1|Page
Elements of data communication.

 Sender
 Receiver
 Messages
 Protocol
 File transmission
 Data.
Sender Receiver
Transmission medium

Types of data signals.

Analog signals; these represent a continuous movement of signals in form of a wave.

Digital signals; these represent a discontinuous movement of signals expressed as 1s and 0s.

Modes of transmission.

Asynchronous transmission; this is where data is sent one byte/ character at a time.

Synchronous transmission; this is where data is sent in blocks or groups at the same time.

Direction of transmission.

Simplex; this is the transmission of data in one direction only e.g. radios, televisions.

SENDER RECEIVER

Half duplex; this allows data transmission in either direction but only one direction at a time
e.g. radio calls, walkie talkie.
RECEIVER
SENDER

Full duplex; this is where data flows in all directions at the same time e.g. mobile phones.

SENDER RECEIVER

2|Page
Transmission medium (channel)

These are devices used to carry signals or data from one computer to another. They are
divided into two categories;

1. Guided/ wired/bounded/physical transmission media.


2. Unguided/wireless/unbounded transmission media.

Guided/wired transmission media.

This is where communication devices are directly connected with each other by using some
physical media like cables.

Types of guided media.

 Coaxial cables.
 Twisted pair cables.
 Fiber optic cables.

Twisted pair cables; this is a pair of copper wires twisted together and wrapped with a
plastic coating. Twisted pair cables are of two types namely;

1. Shielded twisted pair cables (STP).


2. Unshielded twisted pair cables (UTP).

Advantages of twisted pair cables.

 They are easy to install.


 They are not expensive as compared to coaxial and fiber optical cables.
 They are flexible.

Disadvantages.

 They are subjected to interference.


 They cover a limited distance.

Coaxial cables; they consist of a single copper wire surrounded by 3 layers which include;
insulating material, woven material, plastic outer material.

3|Page
Advantages of coaxial material.

 They are used for long distances.


 They transmit data faster than unshielded twisted pair cables.

Disadvantages.

 They are heavy and bulky.


 They need a booster over long distances.

Fiber optic cables.

Advantages of fiber optic cables.

 They are smaller in size.


 They are faster than the coaxial and twisted pair cables in data transmission.
 They carry more signals than the coaxial and twisted pair cables.

Disadvantages.

 They are expensive.


 They have a poor flexibility.
 They are not easy to install and modify.

Unguided/Wireless/Unbound transmission media.

These are communication devices that transmit data by sending electromagnetic signals
through free space.

Examples/ types include;

 Microwave.
 Bluetooth
 Infrared
 Use of the satellite.
 Radio waves etc.

COMPUTER NETWORK

A computer network is a connection of two or more computers for the purpose of sharing
data and other resources.

Types of networks.

1. Local area network (LAN)


2. Wide area network (WAN)
3. Personal area network (PAN)
4. Metropolitan area network (MAN)
5. Campus area network (CAN)

4|Page
 Local area network (LAN).

This is a type of network that covers a small geographical area e g. computer lab, office etc. it
is divided into two;

 Client/ server network


 Peer to peer network.

Client/ server network; this is a computer that requests and receives data on a network.
Client/server network consists of a requesting computer called client computer and supplying
computers that provide data and information called servers.

NB: A server; is a computer that manages shared devices like printers.

Advantages of a client / server network

 Provides better security


 Easier to administrate when the network is large because administration is centralized.
 All data can be backed up on one central location

Disadvantages of a client / server network

 Requires expensive, more powerful hardware for the server machine


 Requires expensive specialized network administrative and operational software
 Requires a professional administrator
 Has a single point of failure.
 User data is unavailable if the server is down.

Peer to Peer network; it allows every computer to communicate directly with each other on
a network without relying on a server.

Advantages of a peer to peer network

 Less expensive to implement


 Does not require additional specialized network administration software.
 Does not require a dedicated network administrator.
Disadvantages of a peer – to – peer network

 Does not scale well to large network and administration became unmanageable
 Each user must be trained to perform administrative tasks
 Less secure
 All machines sharing the resources negatively impact the performance.

5|Page
 Wide area network.

This is type of network that covers a wide geographical area e.g. a country.

Differences between LAN and WAN

Local Area Network (LAN) Wide Area Network (WAN)

It covers a limited geographical area It covers a wide geographical area

Data transmission is very high Data transmission is low

It always uses physical wires to connect It may have no physical connection between
computers and other network resources various computers

 Metropolitan area network.

This is a network that connects two or more local area networks that work together but cannot
extend beyond the boundaries of the immediate town.

 Campus area network.

This connects two or more area networks together with limited specific geographical area e.g.
campus, military base.

Elements/ components of a network.

1. Computers.
2. Network interface card.
3. Network operating system (NOS)
4. Cabling system (Ethernet cables)

Merits of computer networking.

 It allows sharing of data and information.


 It facilitates communication between two or more computers.
 Allows sharing of hardware.
 Allows sharing of software.
 It enables online employment.
 It enables online learning and research.

Demerits of computer networking.

 It is expensive to set up and maintain.


 There is rapid spread of computer viruses.
 Automatic downloads which lead to unpredictable behaviors like using all the space
on a hard disk.
 There is a danger of hacking.

6|Page
NETWORK OPERATING SYSTEM (NOS)

This is system software that organizes and coordinates activities on networks.

Functions of network operating systems.

 Monitors operation on a network.


 It enables computers on a network to communicate.
 Monitors security on a network.
 Provides access to network resources e.g. printers.
 It helps in file management.

NETWORK HARDWARE.

These are devices that facilitate the use of computer network by enhancing data transmission
and sharing of resources on a network.

 Network interface card (NIC)/ network adapter;


This is a computer hardware that allows computers to communicate over a network. It
is also known as a network adapter.
 Hub/switch; this is a network device that contains multiple ports that enable more
than one computer to inter-connect on a network.
 Bridge; this is a device that connects a local area network to another local area
network that uses the same protocol.
 Router; this is a device that connects networks together e.g. LAN to WAN to access
the internet.
 Repeater; this is an electronic device that receives weak signals and re-transmits
them at a higher power level over a long distance.
 Gateway; this is an interface that enables dissimilar networks to communicate. Such
as LAN with WAN, CAN with MAN etc.

NETWORK PROTOCOL.

These are set rules and procedures that govern communication between two different
computers or devices on a network. They include;

 File transfer protocol (FTP)


This is an internet protocol used to download a file from a server using the
internet.
 Hypertext transfer protocol (HTTP)
It allows web browsers and servers to send and receive web pages.
 Transmission control protocol/internet protocol (TCP/IP)
This is a communication protocol used to connect posts on the internet. It is
responsible for delivery of data over the network hosts.
 Post Office Protocol (POP).
This is designed for receiving incoming emails
7|Page
 Simple Mail Transfer Protocol. (SMTP)
This is designed to send and distributed outgoing emails.
 Gopher.
Is a collection of rules implemented for searching, retrieving as well as
displaying documents from isolated sites.

NETWORK TOPOLOGY.

It refers to the layout of connected devices on a network.

Or

It refers to the physical layout of devices connected on a network.

Types of topologies.

1. Bus topology.
2. Star topology.
3. Ring topology.
4. Mesh topology.
5. Tree topology.

BUS NETWORK TOPOLOGY (uses peer to peer network)

This is a type of network technology where each of the computer and network devices are
connected to a single cable or backbone.

Advantages of bus network topology.

 It is easy to install.
 It is easy to implement.
 It is cheaper than other topologies.
 Easy identification of faults.

8|Page
Disadvantages.

 It has limited cable length.


 It has slower data transfer rate.
 There is no host computer to control the network.

STAR TOPOLOGY.

This is a type of network topology where all computers and other communication devices are
connected to a central server/hub.

Advantages.

 It is easy to install.
 Easy to detect faults and remove parts.
 The fault on one of the computers or communication devices will not affect other
computers or communication device.

Disadvantages.

 It requires more cable length than bus topology.


 When the central server or hub fails, the entire network shuts down.
 It is expensive because it requires a hub or switch.

RING TOPOLOGY.

This is a type of network topology where each node is connected to one another in form of a
closed rope. There is no central server/hub in this topology.

9|Page
Advantages

 It transfers data faster than bus topology.


 Each device on the network has equal opportunity to transfer data.
 It does not require a network server to manage connectivity between computers.
 It covers a large geographical area compare to a bus topology.

Disadvantages

 Failure of one node leads to shutdown of others.


 It is difficult to add or delete a node because of the physical layout.
 It is more difficult to identify the fault if the entire network shuts down.

TREE TOPOLOGY.

This is a network topology that integrates multiple star network topologies on a bus.

Advantages.

 It is supported by several hardware and software components.


 It allows expansion of the network much better than other topologies.

10 | P a g e
Disadvantages

 It is difficult to configure.
 If the backbone line breaks, the entire network shuts down.

MESH TOPOLOGY.

This is a network topology whereby each node or computer has a direct connection with the
rest of other computers on the network.

Advantages.

 Failure of one node doesn’t affect the entire system.


 It is more secure as data travels along a dedicated line.

Disadvantages.

 It is more expensive due to the many cables used.


 Many of the cables serve no major purpose.

INTERNETWORKING.

This is the connection of two or more separate computer networks via a common routing
technology. There are at least 3 different forms of internetworks which include;

1. Intranet.
2. Extranet.
3. Internet.

Intranet; this is a corporate network that uses the infrastructure and the standards of the
internet and World Wide Web (www).

11 | P a g e
Extranet; this is an extended internet connectivity, connecting not only inter-personal but
also selected customers, suppliers and other strategic offices.

NOTE:

Packet switching; this is a technique of dividing electronic messages into packets for
transmission over a wide area network to their destination through the best route.

A packet; is a unit of data that is routed between an origin and a destination on the
internet.

Circuit switching; this is a telecommunication technology by which two network


nodes establish a dedicated communication channel before the nodes may
communicate.

INTERNET

An internet is an international network of networks that connects computers worldwide.

Or

This is a global connection of computer networks.

Or

This is a worldwide connection of networks that links millions of businesses, government


offices, educational institutes and individuals.

Basic requirements for internet connection.

1. Internet service provider (ISP)


2. Communication software.
3. Communication media or devices.
4. Computers with good specifications e.g. high processor speed, high capacity of RAM
etc.
5. Modem in case of dial up connectivity.

Methods used to connect to the internet.

Dial up connection; this is a connection that requires users to link their phone line to a
computer in order to access the internet.

Dedicated connection; this refers to the permanent connection of internet services at all
times.

Wireless connection; this refers to use radio frequency bands instead of telephone/cable
networks.

12 | P a g e
Mobile connection; this is the using of mobile broad band technology to provide wireless
high speed internet access through portable devices.

Main uses of the internet.

 It is used for electronic commerce. (e-commerce) i.e. buying and selling of goods
online.
 It is used for e- learning (electronic learning) i.e. gathering of information about
various topics from the internet.
 It eases communication i.e. people from different parts of the world can send and
receive messages through the internet e.g. using e-mails, social media platforms etc.
 It provides online employment opportunities.
 It has helped in mass media i.e. a person can get the latest news from the internet.
 It is a tool of entertainment through online games and video clips.
 It is used for online payments.
 It helps in file transfer i.e. data can be transferred across the internet from one side to
your personal computer.

Disadvantages of using the internet.

 The internet is a center pornography which has led to moral decay.


 It has led to high spread of computer viruses from un-trusted websites, fake games
etc.
 Hacking of individual information i.e. accessing someone’s information illegally.
 Internet addiction leads to wastage of time.
 It is expensive in terms of mobile data.
 It has led to online terrorism whereby terrorists detonate bombs using the internet.

Factors that affect the internet speed.

 The distance that data travels; the shorter the cables of computers to the routers, the
faster the connection speed and vice versa.
 Natural conditions/ hazards; like strong winds lead to instability in connection speed.
 Modem speed; if the modem speed is sub-standard/ non compatible with your internet
service provider, the internet speed will be slow.
 Computer viruses; when computer viruses attack your computer, they also affect the
internet speed slowing it down.
 Heavy traffic on the network; the greater the number of computers of the network, the
more the internet speed reduces and vice versa.

INTERNET SERVICE PROVIDER (ISP);

This is a company that supplies connection to the internet at a given fee.

Examples include;

 MTN
13 | P a g e
 Airtel
 Africell
 UTL
 Vodafone
 Safaricometc

Factors to consider when using an ISP.

 Time in service; how long has the internet service provider been in business.
 Speed of the modem; check whether the speed of the modem matches with that of
your computer.
 Cost of the internet service provider; in terms of mobile data and setup charges.
 Compatibility; make sure the software of the inter service provider is compatible with
that of your computer system.

ELECTRONIC MAIL (E-MAIL)

This refers to the sending and receiving of messages via the internet.

Email Address; this directs the computer on the internet to the destination of the e-mail
message.
An e-mail address consists of two parts i.e.
 Username
 Domain name; is a unique name that identifies an internet resource such as a website.
Elements of an email

1. Password
2. Username
3. Domain name/address
4. An extension e.g. com, ug
5. Separator (@)

For example;

[email protected]

 kapata –username
 @ --separator
 gmail.com –domain name
 .com –top level domain
 gmail –second level domain

14 | P a g e
Basic email features/ components

Inbox; received messages.

Sent; it keeps messages for reference purposes.

Outbox; it keeps messages that have been composed but not yet sent.

Send; it sends messages that have been composed.

Compose; it activates the screen on to which a message to be sent is type set.

Attachment; it helps attach other files and folders.

To; this is where the e-mail address of the receiver is typed.

Subject; this is where the subject or title of the message is typed.

Carbon Copy (CC); this enables copies of the e-mail to be sent to third parties while
notifying/acknowledging other recipients.

Blind carbon copy (BCC); this enables copies of an e-mail to be sent to the third party
without notifying/acknowledging any other recipients.

Advantages of an e-mail

 There is immediate feedback.


 It is available 24hours i.e. you can access your e-mail at any time where there is
internet.
 It is cheap i.e. once you are online, there is no added charge.
 It stores messages for future reference.
 It is speedy i.e. an e-mail message can be sent in schools across the world.
 It is international/global i.e. you can access your e-mail from any part of the world.
 It supports sending of one message to different recipients at the same time.
 It supports attachments like multi-media, pictures etc.

Disadvantages of using e-mails.

 Pressure to reply; there is pressure to reply while using e-mail for the messages being
sent to your inbox.
 Viruses; an email leads to spread of viruses which tend to destroy and corrupt the
email messages which were kept for future reference.
 Hacking; while using an e-mail in communication, one can access your messages
illegally by using hacking cards hence limiting privacy.
 It’s time wasting when it comes to reading a lengthy mail.
 Information overload; when too many people send too much information.

15 | P a g e
Benefits for sending documents using ordinary post
1. Good for sending physical items
2. Good for sending legally binding documents
3. Good for sending bulky/large documents
4. Cheaper method of sending documents
5. Convenient for all categories of people
6. Safer delivery of sent documents
7. Legal documents with original signatures can be sent
8. No loss of mail due to viruses
9. Lower chances of eavesdropping
10. Documents can be traced while in transit
11. Possibility of checking documents before sending, during transit and at the destination for
security purposes

NETIQUETTES

This is a code of acceptable behaviors users should follow while on the internet.

Examples of netiquettes include;

 Avoiding impersonating of other people’s identities.


 Be polite and avoid offensive words.
 Avoid sending abusive language.
 Use abbreviations for popular phrases e.g. btw to mean by the way etc.
 Never read someone’s e-mail message.
 Read frequently asked questions (FAQ).
 Don’t use all capital letters which means shouting.
 Use proper grammar and spellings.
 Don’t assume all material is accurate and updated.
 Use short messages.

WORLD WIDE WEB (WWW)

This is a multi-media service that runs the internet.

Or

It is a collection of host computers that deliver documents, multimedia and graphics to users
via the internet.

Or

Is an information space where documents and web resources are identified by Uniform
Resource Locators and accessible via the internet.

Terminologies;
16 | P a g e
Website; this is a collection of web pages.

Webpage; this is an online document designed by Hyper Text Markup Language (HTML)
and viewed by a web browser.

Web browser; this is a software program used to access and view web pages. Examples
include; internet explorer, Mozilla Firefox, Google chrome etc.

Web master; this is an individual responsible for developing Webpages and monitoring a
website.

Web server; this is a computer that delivers Webpages requested by users.

Web portal; this is a special well designed web page at a website which brings information
together from a diverse source to a uniform way.

Web publishing; this is the development and maintenance of Webpages.

Web aggregator; this refers to a website that combines a specific type of information from
multiple online sources.

Search engine; this is a software program that can be used to find websites, web pages and
files on the internet. Examples include; Google, Ask.com, Bing

Wiki; this is a web application that allows people to add, modify and delete content in
collaboration with others.

Blog; this is basically a journal available on the internet.

Hypertext; this is information organized by inter-connected documents/WebPages by the use


of hyperlinks.

Hyper link; this is the reference of data that a user can link to as linked documents/ webpage.

Multimedia; refers to an application that integrates test with one of the following documents;
sound, graphics, video etc.

Content aggregator; refers to a website or computer software that combines a separate type
of information from multiple online sources.

UNIFORM RESOURCE LOCATOR (URL)


A URL is an address that points to a specific resource on the web. Webpage URLs are of
the following formats;
http://www.google.com,https://www.bbc.com,ftp://www.brightss.ac,ftp://ftp.ura.go.

Parts of a Uniform Resource Locator


A URL like; http://www.brightss.ac.ug/index.php/admissions.html, has got the
following parts;

1. http:// This is a communications standard for the web


17 | P a g e
2. www.pettass.ac.ugThisis the domain name. It identifies the website on the World Wide
Web.
3. index.php This is the directory path. It identifies the location of the webpage on the
web server.
4. admissions.html This is the document name. It identifies the webpage

OR
Parts of a uniform resource locator

"http://www.webopedia.com/browser.html"

The Protocol: "http"

The server name: www.webopedia.com


The file name, which follows the server name: "browser.html"

SOCIAL NETWORKING SITES

These are online platforms which people use to build social relationships with other people
who share similar personal or career interests, activities, backgrounds or real life connections.
Common examples of social networking sites include; facebook, whatsApp, instagram ,
twitter, skype, viber, snapchat, telegram, youTube, wechat, myspace, skyrock, tiktok, reddit,
badoo, kiwibox etc
Social networking is a recent invention that has the Internet still at the edge of its seat due to
its popularity with people. This is mostly because it really is for the people. Bringing every
kind of social group together in one place and letting them interact is really a big thing
indeed.

Advantages
• Opportunity to connect with family and friends via a different medium
• Create new friendships with people around the globe and learn more about life in
other countries. An alternative source of entertainment as well
• Facilitates open communication, leading to enhanced information discovery and
delivery.
• Allows employees to discuss ideas, post news, ask questions and share links.
• Provides an opportunity to widen business contacts.
• Targets a wide audience, making it a useful and effective recruitment tool.
• Improves business reputation and client base with minimal use of advertising
• Expands market research, implements marketing campaigns, delivers communications
and directs interested people to specific web sites.
• Free Business Promotion - This is probably the biggest advantage for business
owners using social networking sites. Facebook, Twitter, and
many others are great forums for you to talk about your business, your services and
even exhibit your industry expertise.
18 | P a g e
• Low Cost Advertising - Some social networking sites provide a business owner with
the opportunity to advertise to a very specific demographic for very little money. So
you can advertise to exactly the customer that you want to attract and save money
versus other forms of advertising.
• Build your credibility - By consistently interacting and posting a person can build trust
and credibility amongst their audience which in turn can lead to more business.
• Ease of Communication - Social networking sites allows you a fast and free resource
for communicating with your customers and potential customers. Announce sales,
promotions, special events and more by simply typing your message and posting it to your
page or profile.

Disadvantages
• A compromise of privacy
• Opens up the possibility for hackers to commit fraud and launch spam and virus
attacks.
• Increases the risk of people falling prey to online scams that seem genuine, resulting in
data or identity theft
• May result in negative comments from employees about the company or potential legal
consequences if employees use these sites to view objectionable, illicit or offensive
material
• Potentially results in lost productivity, especially if employees are busy updating
profiles, etc.
• Everything Is Public - The nature of social networking sites is that they are 'well' social,
so things get shared. And one small mistake can morph into a public relations nightmare.
• Negative Publicity - People really like to use social networking sites as a place to express
their frustration and disapproval of a business that, they feel has wronged them in some
way. Being on the receiving end of this negative publicity can have dire consequences.
• Time Consuming - Social networking sites can suck you in and before you know it you've
spent hours looking at pictures, videos, and reading clever, posts.

EMERGING TECHNOLOGIES
Are new technologies that are currently developing, which will substantially alter the
business and social environment.
Examples include;
 Digital forensics,
 Virtualization,
 Quantum computing,
 Biometrics
 Robotics
 Quantum cryptography
 Computer assisted translation
 3 D and holographic imaging
 Virtual reality
 Digital forensics

19 | P a g e
Artificial Intelligence: Is the process of building computer systems that simulate human
thought process and actions, which include reasoning and learning from past mistakes.

Artificial intelligence includes:


Games playing: programming computers to play games such as chess and checkers
Natural language: programming computers to understand natural human languages
Robotics: programming computers to see, and hear and react to other sensory stimuli
Currently, no computers exhibit full artificial intelligence (that is. are able to simulate human
behavior).The greatest advances have occurred in the field of games playing.

Examples artificial intelligence systems include;


Expert systems,
Artificial neural networks
Robots.
Cloud Computing: Is the practice of using a network of remote severs hosted on the
internet to store, manage and process data, rather than a local sever or a PC.
OR
Cloud computing

Cloud computing is a type of computing that relies on sharing computing resources rather
than having local servers or personal devices to handle applications.

Risks exposed to cloud computing users

1. Exposing the user to potential violation of privacy


2. Freely collecting public data and privately storing it on the cloud‟s archives. No
guarantee is given to the users for free future access.
3. A malfunction can affect a larger number of users at once because these services are often
shared on a large network.
4. There is no defined standard between the operators and any change is extremely complex
therefore there are data migration problems when changing the cloud provider.

Advantages of cloud computing

1. Cloud computing is probably the most cost effective method to use, maintain and upgrade
information systems.
2. Almost unlimited storage for information in the cloud gives you unlimited storage
capacity.
3. Because all the data is stored in the cloud, backing it up and restoring the same is
relatively much easier that storing the same on a physical device.
4. Software integration is usually something that occurs automatically so you do not need to
take additional efforts to customize your applications.
5. Once you register yourself in the cloud, you can access the information from anywhere
where there is an internet connection.
20 | P a g e
6. Cloud computing is easily scalable so companies can add or subtract resources based on
their needs.

Disadvantages of cloud computing

1. Storing information on the cloud can render the data and information vulnerable to
external hack attacks and threats.
2. Long term dependency on the cloud host for maintenance of your information is another
short coming of cloud computing.
3. Dependency on the third party to ensure confidentiality of data and information is another
limitation of cloud computing.
4. There is less control that comes when handing over all your data and information to the
cloud providers.

Quantum cryptography: is an emerging technology that allows messages and data to be


sent with complete privacy
Virtualization: Is the process of creating logical computing resources from available
physical resources.
• Digital forensics: This is the process of uncovering and interpreting electronic data for
use in courts of law.
• Virtual Reality (VR): Is the use of computers to create an artificial environment that
appears and feels like a real environment.
• Quantum Computation: Is a branch of computing focused on developing computer
technology based on the principles of quantum theory, which explains the nature and
behavior of energy and matter on the quantum level, i.e. on the atomic and subatomic
level.
• Robotics: This is a branch of computing that deals with the design, construction,
operation, and application of robots. A robot is a computer controlled device that can
move and react to instructions from the outside world.
• Simulation: This refers to computer-based models of real-life situations. Simulations
often replace costly and sometimes hazardous demonstrations in teaching and
learning.
• Green Computing: This is the use of computers and related resources in an
environmentally responsible manner.
OR
Green computing is the practice of manufacturing using and disposing off computers and
associated
Subsystems such as monitors, printers, storage devices, etc in an environmentally
responsible manner or way.

The goal of green computing


To cut down to as little as possible the amount of energy used
To extend as far as possible the life of the equipment.
It promotes recyclability of default products
Reduces the use of hazardous materials.
21 | P a g e
Achieving Green Computing involves the following/suggestion to green computing.
• Using energy efficient processors
• Using servers and peripheral devices that are economical in power consumption
• Use LCD monitors instead of CRT monitors.
• Recycle papers
• Recycle toner cartridges
• Ensuring proper disposal of electronic waste (e-waste) like used up printer cartridges and
spoilt devices
• Turning off your computer and peripherals when you are not using them.

COPYRIGHTS, TRADEMARKS, INTELLECTUAL PROPERTY

Copyright is the exclusive legal right that prohibits copying of one’s original property/work/
material without his/her permission.

Trademarks protect company logos and brand names.

Intellectual property refers to work created by inventors, authors and artists.

Intellectual property rights refer to protection to which creators are entitled for their work.

Need for the copyright law in the modern computer era.

1. Protection of consumers against fake computer products.

2. To grant ownership to inventors, authors and artists.

3. Prohibit unfair profiting from other people’s work/efforts.

4. Encourage authorship.

5. Encourage creativity by ensuring that creative people receive financial benefits from their
work.

6. Ensure good international relations and image since a country without copyright protection
is viewed as one which encourages stealing.

7. Ensure good quality computer products as producers try to guard their copyrights
jealously.

8. Allow payment of damages to copyright owners.

ERGONOMICS
Ergonomics refers to incorporating comfort, efficiency and safety into the design of hardware
in a work place.

22 | P a g e
Five aspects of ergonomics
1. Safety
2. Comfort
3. Ease of use
4. performance
5. Aesthetics (beauty)
Some keyboards have built-in wrist rests.

Most display devices have a tilt and swivel base and controls to adjust the brightness,
contrast, positioning, height and width of images.

Most cathode ray tube monitors today also adhere to the MPR II standard which defines
acceptable levels of electromagnetic radiation.

DIGITAL FORENSICS

Digital forensics (also called Computer forensics or cyber forensics) is the process of
uncovering and interpreting electronic data for use in a court of law. It involves application
of computer investigations and analysis techniques to gather evidence suitable for
presentation in a court of law.
OR
Digital forensics is a branch of forensic science concerned with the use of digital information
(produced, stored and transmitted by computers) as source of evidence in investigations and
legal proceedings.

OR

Is the use of scientifically derived and proven methods towards the preservation, validation,
identification, analysis, interpretation, documentation and presentation of digital evidence
derived from digital sources for the purpose of facilitating or furthering the reconstruction of
events found to be criminal, or helping to anticipate unauthorized actions shown to be
disruptive to planned operations.

Applications of digital forensic include;

 Mobile forensic
 Network forensic
 Computer forensic

The goal of the process is to preserve any evidence in its most original form while performing
a structured investigation by collecting, identifying and validating the digital information for
the purpose of reconstructing past events.

It involves application of computer investigations and analysis techniques to gather evidence


suitable for presentation in a court of law. The goal of computer forensics is to perform a
structured investigation while maintaining a documented chain of evidence to find out exactly
what happened on a computer and who was responsible for it.

23 | P a g e
END

24 | P a g e

You might also like