It Lo1
It Lo1
DIPLOMA
UNIT TITLE:
INFORMATION TECHNOLOGY:
APPLICATIONS SOFTWARE 1
UNIT CODE:
D75X34
FLEETWOOD
NAUTICAL
CAMPUS
SQA HND Nautical Science
Part One
Goals
To give the individual familiarity with the laws and regulations affecting the
use of, and the users of, computers and information storage systems
• Core hardware
• Peripheral hardware
• Software and I or Firmware
Core hardware
refers to any part Moni or ..""
n
of the actual <::
computer which
has a 'real world'
existence, that is
to say it can be
seen and touched.
Peripheral
hardware is
hardware that is
attached to the
computer but is
0\1
not essential for
its operation, such AROUND YOUR PC
as a printer, a
scanner or a flash
drive
Motherboard-
This is the main circuit board to
which all of the other internal
components connect. The 'Chipset'
is a group of chips consisting of the
North and South Bridges, and _
ancillary chips that tell the South Bndge
motherboard what it is, how it works, and what type of CPU it is looking for.
Memory - This is very fast storage used to hold data. It has to be fast
because it connects directly to the microprocessor. There are several specific types of
memory in a computer:
• Random-access memory Small Outline Dual lnline
(RAM) - Used to temporarily Memory Module (SoDIMM) RAM Memory
store information with which the
computer is currently working
• Read-only memory (ROM) - A
permanent type of memory
storage used by the computer for
important data that doesn't
change
• Basic input/output system (BIOS) - A type of ROM that is used by
the computer to establish basic communication when the computer is
first powered on
• Caching - The storing of frequently used data in extremely fast RAM
that connects- directly to the CPU
• Virtual memory- Space on a hard disk used to temporarily store data
and swap it in and out of RAM as needed
• Flash memory - a solid state storage device, Flash memory requires
no moving parts and retains data even after the computer powers off
Ports-
In computer hardware terms, a port is Accelerated Graphics Port
an interface that allows a computer to (AGP)
communicate with peripheral equipment.
USB Port-
The most common type of port today is
the Universal Serial Bus Port (USB)
which is used to connect virtually every
peripheral device possible printers, '·-
mouse, keyboard, scanner, flash memory
etc etc.
USB
Connector
Power supply-
All electrical transformer, diode bridge rectifiers
and Field Effect Transistors (FET) regulate the
electricity used by the computer. The type of
power supply used is called Switch Mode
which diverts the most current to where it
is needed for a given load. This makes it
potentially dangerous to handle when
exposed as the device can deliver
lethal currents. Never work on a live
computer PSU unless you have been
specifically trained to do so.
Peripheral Devices
There are a great many peripheral devices that are attached to computers. Some
are requirements, some are optional but so common as to be virtually a requirement,
some are very specialised and only needed by certain groups of people for particular
purposes.
Strictly speaking the mouse is a Pointing Device which is used to tell the computer to
'look at' some item of data; however, that item of data may be a set of instructions to
the computer, so it is included as a 110 device.
Of these, the only truly essential device is a keyboard, without which the majority of
modern PCs will not start. It is perfectly feasible to control your computer without a
mouse, and provided you have a printer attached you can set the machine to output
not to a screen but instead to a printer. However, this would be extremely
inconvenient, and we can only imagine the frustrations of those early
computer programmers who had to work with punched cards and printers as their
only I/O devices.
Today, the Graphic User Interface (GUI) provides us with on screen Icons (small
images representing actions or files) which we can point at with the mouse and
control the computer in a largely intuitive fashion. Touch screen technology has seen
the introduction of so called ‘Metro’ tiles, which, when combined with various hand
movements across the screen allows the monitor to function as a mouse and a virtual
keyboard. Google, Windows 10 and other software now allows voice control of the
computer as an option.
The Internet lets us connect to any machine in the world. Because of the relationship
between your computer, the ISP and the Internet, it is no longer appropriate to
send individual characters. Instead, your modem is routing TCPIIP (Transfer
Control Protocol I Internet Protocol) digital data packets (a datagram) between you and
your ISP.
The standard technique for routing these packets through your modem is called
the Point-to-Point Protocol (PPP). The basic idea is simple -- your computer's TCPIIP
stack forms its TCPIIP datagrams and then the datagrams are handed to the modem
for transmission to the ISP. The ISP receives each datagram and routes it
appropriately onto the Internet. The same process occurs to get data from the ISP
to your computer.
Operating Systems
An operating system creates the ability to:
• serve a variety of purposes
• interact with users in more complicated ways
• keep up with needs that change over time
All desktop computers have operating systems. The most common are the Windows
family of operating systems developed by Microsoft, the Macintosh operating
systems developed by Apple and the UNIX family of operating systems (which
have been developed by a whole history of individuals, corporations and
collaborators). There are hundreds of other operating systems available for
special-purpose applications, including specializations for mainframes, robotics,
manufacturing, real-time control systems and so on.
In any device that has an operating system, there's usually a way to make changes to
how the device works. This is far from a happy accident; one of the reasons
operating systems are made out of portable code rather than permanent physical
circuits is so that they can be changed or modified without having to scrap the whole
device.
For a desktop computer user, this means you can add a new security update, system
patch, new application or even an entirely new operating system rather than junk your
computer and start again with a new one when you need to make a change (although it
must be said that occasionally radical redesign of an OS makes it impractical to perform
an upgrade install and a clean install from a reformatted hard disk is required – for
example upgrading from Windows XP to Windows 8. In order to do this, all files must be
safely backed up, the hard disc wiped, the new OS installed and all files and applications
reinstalled). As long as you understand how an operating system works and how to get at
it, in many cases you can change some of the ways it behaves.
Programming
Once upon a time, if you wanted your computer to actually do something, you had to
write a program. A program is just a series of code instructions that tell the computer
what to do and in what sequence.
The computer does not understand English or any other human language, only a
series of 'On' and 'Off' instructions (Binary Code), represented by 1 and 0. In order to
turn a human language into something the computer does understand, an
intermediate program is required, known as a Compiler. A High Level Compiler
takes instructions in a language (a High Level Language) that looks vaguely like
English (or French or whatever) – and turns it into a code called Machine Code which
a Low Level Complier turns into Binary Code.
Many computer languages have been developed over the years, many for specific
purposes (Cobol, C++, Java, HTML) and some for generic programming uses (Pascal,
Basic).
Here is a simple code fragment from Visual Basic for Applications (VBA) to stop an
Access Database showing warnings when an event occurs:-
VBA is a High Level Language, and you can clearly see that it is indeed almost
English, certainly close enough to be able to understand what it says. However, the
specific format of the instruction (the syntax) is always critical.
Today most programming applications allow the user to select actions from a menu,
or even to copy keystrokes from the keyboard, and the application writes the
code for you. Once the province of highly trained programmers, now even Primary
School students can create websites with no knowledge of programming HTML
whatsoever.
Data Storage
We have so far considered only how data is stored in a physical medium such as a
Hard Disk; we have not looked at what form that storage takes or how we can store and
subsequently access our data.
In the ASCII character set, each binary value between 0 and 127 is given a specific
character. The first 32 values (0 through 31) are codes for things like carriage return
and line feed. The space character is the 33rd value, followed by punctuation, digits,
uppercase characters and lowercase characters.
Most computers extend the ASCII character set to use the full range of 256 characters
available in a byte. The upper 128 characters handle special things like accented
characters from common foreign languages.
Computers store text documents, both on disk and in memory, using these codes.
For example, if you use Notepad in Windows to create a text file containing the
words, "Now is the winter of our discontent," Notepad would use 1 byte of
memory per character (including 1 byte for each space character between the
words -- ASCII character 32). When Notepad stores the sentence in a file on disk,
the file will also contain 1 byte per character and per space.
Try this experiment: Open up a new file in Notepad and insert the sentence, "Now is
the winter of our discontent" in it. Save the file to disk under the name henry.txt. Then
use the Explorer and look at the size of the file.
You will find that the file has a size of 35 bytes on disk: 1 byte for each character.
If you add another word to the end of the sentence and re-save it, the file size will
jump to the appropriate number of bytes. Each character consumes a byte.
If you were to look at the file as a computer looks at it, you would find that each
byte contains not a letter but a number -- the number is the ASCII code
corresponding to the character. We could expand these decimal numbers out to
binary numbers (so 32 = 00100000) if we wanted to be technically correct-- that is
how the computer really deals with things.
Files
A file is just a collection of Bytes arranged in sequence with a title which the
computer can use to identify and locate it. Earlier Operating Systems used a File
Allocation Table (FAT) to connect a file specifically to an area on the storage
medium (a Sector). A large file may spread over several sectors. Modern file
handling techniques, such as the Windows New Technology File System (NTFS)
instead index the file and keep track of it by its index. An analogy would be an
old Librarian knowing the position of every book on the shelf while the young upstart
finds the book by looking in the filing system. The great advantage of indexing is
that, provided the index, which is attached to the file, is not deleted, the file can
always be found; were the FAT to become corrupted no file could ever be
found. However, if the physical storage location, such as a cluster on a hard drive,
were to be damaged then either system would be unable to access the file.
Each system has its limitations; NTFS is not cross platform, Apple and Android use their
own file systems, and Linux, while able to read NTFS also has its own methods. FAT32
is cross platform, but Windows will only format a hard drive with FAT32 to a maximum of
32Gb. Many cross platform multimedia devices such as PVR television recorders,
Games Consoles, Music storage streamers etc. rely on the versatility of FAT32 but
special Third Party software is required to format the very large drives (up to 4Tb [4
million, million bytes]) required by these systems. Filenames are made up of three parts;
the file path, the filename and the extension.
The File Path tells the computer where to look for the file. The first part identifies the
physical location, such as C:\ (usually the main Hard Disk) or www:\ (the World Wide Web).
Subsequent parts identify the route to the file along the Directory Tree.
Whereas once it was necessary to locate a file from the directory structure,
most modern GUIs allow some sort of direct access from the start screen,
called the Desktop, to folders containing the files required. Applications are
typically started directly from icons on the desktop
The Filename
The filename is the actual name by which the user knows his or her file. Older file
systems limited the name to 8 characters, but now it is permissible to have longer
and more descriptive names up to a maximum of 64 characters. The entire path,
name and extension must not exceed 255 characters. The filename itself must not
include any of the following:-
Backslash \
Less than <
More than >
Asterisk *
Full Stop .
Question Mark ?
Quotation Mark “
Colon :
The Macintosh Desktop
Semi Colon ;
Pipe |
The Filename
The filename is the actual name by which the user knows his or her file. Older file
systems limited the name to 8 characters, but now it is permissible to have longer and
more descriptive names up to a maximum of 64 characters. The entire path, name
and extension must not exceed 255 characters. The filename itself must not include
any of the following:-
Backslash \
Less than <
More than >
Asterisk *
Full Stop .
Question Mark ?
Quotation Mark "
Colon :
Semi Colon ;
Pipe |
It is of no benefit to save backup files to the same location as the working files.
Some people have a secondary hard drive in their computer which 'ghosts' the
primary hard drive by automatically copying all the data from the master. This is all
well and good, but were there to be a fire, flood or other physical catastrophe the
backup would be lost along with the master drive.
Autosaving
Most commercial applications today have autosave facilities which periodically save the
latest version of a file being used. The interval at which these saves occur can be
specified by the user. However, whilst this is a useful facility it is still a sensible
precaution to manually save your work at frequent intervals, and especially if large
changes have been made.
Power Failures
In the event of a power cut the working memory of the computer will be cleared
and unsaved data will be lost. Whilst regular backups and saves will minimise the
disruption, continuity of activity can only be assured by the use of an Uninterruptible
Power Supply (UPS) which uses batteries to back up mains power supplies until
either the computer can be shut down properly or the mains power is restored.
Viruses
Viruses and other malicious code (Malware) can cause enormous damage to data.
Virus severity ranges from mere inconvenience (the NIMDA virus, whilst being a pain
in the proverbial does little or no damage to the host) to the devastating destruction of
hard disks and all the data it contains.
• True Viruses A true virus can only spread from one computer to
another (in some form of executable code) when its host is taken to the
target computer; for instance because a user sent it over a network or
the Internet, or carried it on a removable medium such as a floppy disk,
CD, DVD, or USB drive. Viruses can increase their chances of
spreading to other computers by infecting files on a network file system
or a file system that is accessed by another computer
• Tapeworms (or worms). These exist mainly to self- replicate using
your machine as a host. They make numerous copies of themselves,
filling up the hard disk and slowing the computer to a crawl, and then
email themselves to everyone in your address book. They exploit
vulnerabilities in security settings and systems to propagate and, unlike
a true virus, does not need the host to be taken to the target.
• Trojans. Named after the famous strategy of the Trojan Horse, these
viruses conceal themselves inside other, legitimate programs and
strike at the appropriate moment. Like worms, they replicate and spread
through emails, shared files, networks and other contacts
• Spyware. Spyware is a form of malicious code that loads as a Trojan
and resides on your computer, monitoring all forms of activity such as
keystrokes and internet addresses. The spy at the other end can, for
example, watch as you key your credit card number into the computer
for an online_ transaction. While the term spyware suggests software
that secretly monitors the user's behavior, the functions of spyware
extend well beyond simple monitoring. Spyware programs can also
interfere with user control of the computer in other ways, such as
installing additional software and redirecting Web browser activity.
Spyware is known to change computer settings, resulting in slow
connection speeds, different home pages, and/or loss of Internet or
functionality of other programs. In an attempt to increase the
understanding of spyware, a more formal classification of its included
software types is captured under the term privacy-invasive software.
Not all spyware is malicious - data m1n1ng uses your browsing history to suggest
sites or products that may be of interest to you, and cookies (small items of code
stored on your computer) help sites to remember you and streamline your browsing
experience. These are known as Spy Robots (Spybots). When you visit a site such
as Amazon and it opens with "Hello Fred Bloggs, we have recommendations for
you" what you are seeing is Cookies and Data Mining in action. Not all of
these are desired and an excellent freeware product, Spybot Search and Destroy,
will kill them very easily.
Some Trojans are of the type called Not Usually Required (NUR) software; A common
form is encountered when downloading and installing fre'eware. Unbeknown to the
installer there is a Trojan (or several) bundled into the free ware package which
typically includes a Browser Hijacker, which replaces your own Internet Browser, for
example Chrome, with something like Babylon. These hijackers do not do any
damage but they ruin your browsing experience with endless unwanted
advertisements. They are generally very difficult to remove as they user RootKits to
embed themselves in the operating system so they can avoid antivirus software. A
Registry Cleaner with anti-rootkit features is usually needed. Other hijackers
commonly found are media player hijackers, email system hijackers and cloud storage
hijackers.
Virus Protection
Anti-virus protection can and should be installed on all computers to safeguard
against damage. As new viruses are being created and defeated on a daily basis it
is essential to keep the protection up to date. A good virus protection package will
monitor all activity, scan new files or sited for known viruses, quarantine or deleted
detected threats and warn about potential spy and other malware.
The extent to which an operator has access to data will depend upon the Permissions
the Administrator has granted to that particular individual. Most computer systems
will keep a log of who has accessed, or attempted to access, what. Permissions
can range from Full Administrator Access, which allows access to all data and
functionality, to limited Read Only Access in which the user is only able to open and
read certain files but cannot make any changes to them.
Most software packages also incorporate some form of Password facility in order to
allow the creator of a file a measure of control over who reads or modifies the data
contained within it.
• Secure premises are required for storage of both computers and data
• Good programs of backup protection should be followed
• Backup copies need to be stored securely away from main copies
• Access control is implemented via passwords and other security
measures
• Data access should be limited to those with a 'need to know'
• Data encryption will help to limit unauthorized access
• Contingency plans are in place for power loss or other catastrophe
• Up To Date Anti-Virus software is an essential not a luxury
The Digital Millennium Copyright Act (DMCA) is a United States copyright law that
implements two 1996 treaties of the World Intellectual Property Organisation
(WIPO). It criminalizes production and dissemination of technology, devices, or
services intended to circumvent measures (commonly known as Digital Rights
Management or DRM) that control access to copyrighted works. It also
criminalizes the act of circumventing an access control, whether or not there is
actual infringement of copyright itself. In addition, the DMCA heightens the
penalties for copyright infringement on the Internet.
In the UK, the Copyright, Designs and Patents Act 1988 sets out the rights of the
creator or inventor of a literary, dramatic or musical work, and the Copyright
(Computer Programs) Regulations 1992 extends the definition of literary work to include
computer programs. These regulations state that "The owner of the copyright in a
work of any description has the exclusive right to do the acts specified in Chapter II
as the acts restricted by the copyright in a work of that description" The acts specified
in Chapter II are:-
On 1 June 2014 three new statutory instruments came into force in the UK, amending
the Copyright, Designs and Patents Act 1988. Implementing EU Directive 2001/29,
these statutory instruments updated the exceptions and limitations to the rights of
performers and copyright around Research, Education, Libraries and Archives;
Disability; and Public Administration. The updated Research, Education, Libraries and
Archives regulation extends the copyright exception for students and libraries from just
literary and artistic works to all forms of copyright works. Text and data-mining will also
be permitted for non-commercial research purposes, where the researcher has the
right to access the material. The existing exception for fair dealing for instruction
purposes is extended to include copying of small amounts of material using modern
technology, rather than just by hand.
On May 22, 2001, the European Union passed the EU Copyright Directive or EUCD,
which addresses some of the same issues as the DMCA. But the DMCA's principal
innovation in the field of copyright, the exemption from direct and indirect liability of
internet service providers and other intermediaries (Title II of the DMCA), was
separately addressed, and largely followed, in Europe by means of the separate
Electronic Commerce Directive.
The copyright law of the European Union has arisen in an attempt to harmonise the
differing copyright laws of European Union member states. It consists of a number of
Directives, which the member states are obliged to enact into their national laws, and by
the judgments of the European Court of Justice and the Court of First Instance.
The first major step taken by the European Economic Community to harmonise copyright
laws came with the decision to apply common standard for the copyright protection of
computer programs, enacted in the directive on the legal protection of computer
programs (91/250/EEC) in 1991. A common term of copyright protection, 70 years
from the death of the author was agreed in 1993 as the directive harmonizing the term
of protection of copyright and certain related rights (931981EEC).
Software programs are copyrighted and it is illegal to copy them, or part of them,
without permission. It is also illegal to attempt to decompile them to see what 'makes
them tick' or attempt to reverse engineer the code to make it do something else. All
these prohibitions and conditions of use are set out in the End User Licence
Agreement (EULA) that is displayed as part of the installation process.
• Hand over I receive all original disks and any backup copies
• Hand over I receive all original manuals and licence certificates
• Hand over I receive any online registration numbers or documents
• Where the product was originally purchased on line and downloaded,
notify the manufacturer of the change of ownership so that their
registration records can be amended.
Most modern software is aware of itself, that is to say it knows its own serial number and
identity. An illegal copy of, for example, Microsoft Word will be detected as soon as you
log onto the Microsoft Website, leading to at the least a refusal by Microsoft to offer any
assistance, and at the worst, prosecution.
Plagiarism
Chambers Dictionary defines a plagiarist as a kind of thief:
"one who steals the thoughts or writings of others and gives them out as his
[sic] own".
The Act works in two ways. Firstly, it states that anyone who processes personal
information must comply with eight principles, which make sure that personal
information is:
The second area covered by the Act provides individuals with important rights,
including the right to find out what personal information is held on computer and
most paper records.
The Data Protection Act doesn't guarantee personal privacy at all costs, but aims to
strike a balance between the rights of individuals and the sometimes competing
interests of those with legitimate reasons for using personal information.
This short checklist will help you comply with the Data Protection Act. Being able to
answer 'yes' to every question does not guarantee compliance, and you may need
more advice in particular areas, but it should mean that you are heading in the right
direction.
The principal purpose of having notification and the public register is transparency
and openness. It is a basic principle of data protection that the public should know (or
should be able to find out) who is carrying out the processing of personal information
as well as other details about the processing (such as for what reason it is being
carried out).
23
Version 3.0 ©Blackpool and the Fylde
Revision Date 06/01/2014 College Fleetwood Nautical
Campus aVon datasystems
2009 2014
SQA HND Nautical Science
• Access to Information
This allows you to find out what information is held about you on a computer
and within some manual records, such as medical records, files held by public
bodies and financial information held by credit reference agencies.
• Correcting information
This allows you to apply to a court to order a data controller to correct, block,
remove or destroy personal details if they are inaccurate or contain
expressions of opinion based on inaccurate information.
• Claiming compensation
This allows you to claim compensation through the courts from a data
controller for damage, and in some cases distress, caused by any breach of
the act.
• Exempt information
This allows you to ask the ICO to investigate and assess whether the data
controller has breached the act. Please read our, how to complain section,
which explains how to do this.
Definitions
Hazards of DSE
• Postural Problems
• Visual Problems
leading to
• Work Related Upper Limb Disorders (WRULDS)
• Spinal damage
• Eyesight effects
• Epilepsy
• Fatigue and Stress
Research has shown that while there is little chance of eyesight being
damaged by DSE, failure to take proper precautions, especially regular rest periods,
can result in temporary trouble in focussing, sore eyes, headaches and adopting
poor postures to gain a better view of the screen
Toxicity
Toxicity is the ability of a substance to produce injury once it reaches a site on the body.
The degree of harmful effect depends on:-
Routes of Entry
The toxic agent can enter the body in one of four ways:-
In 1985, the National Science Foundation (NSF) created NSFNET, a series of networks for
research and education communication. Based on ARPANET protocols, the NSFNET
created a national backbone service, provided free to any U.S. research and educational
institution. At the same time, regional networks were created to link individual institutions with
the national backbone service.
NSFNET grew rapidly as people discovered its potential and as new software applications
were created to make access easier. Corporations such as Sprint and MCI began to build
their own networks that they linked to NSFNET. As commercial firms and other regional
network providers have taken over the operation of the major Internet arteries, NSF has
withdrawn from the backbone business.
NSF also coordinated a service called InterNIC, which registered all addresses on the
Internet so that data could be routed to the right system. This service has now been taken
over by Network Solutions, Inc. and other registration services in cooperation with NSF.
In the real world you can travel to different places over the same network of roads using different
modes of transportation. You might use a car for one purpose and a truck for something else.
Getting around on the Internet works much the same way.
Some programs, such as Microsoft Internet Explorer, contain more than one kind of application.
For instance, Explorer has a web browser, a newsreader, and a media player. You can also use
more specialized and sophisticated software, such as RealPlayer, a stand-alone media player or
combine different software programs together into a system that works for you.
These various components act together to make the web work, like this:-
Web pages are stored on web servers located around the globe.
Entering the Uniform Resource Locator (URL) of a web page in your web browser or
clicking a link sends a request to the server, which hosts the page.
The server sends the web page to your computer and your web browser displays it on
your screen.
Looking at the way these various components function, both individually and as integrated
systems will allow a better understanding of what the web is actually doing when you access
it.
The key to the whole system is the Universal Resource Locator, usually called the URL or
Web Address. It serves exactly the same purpose as a house address. If you have a sofa for
sale, but I do not know where you live, it will be impossible for me to buy it. What you need to
do is tell me where I can find you, so that we can get in touch and make arrangements, and in
such a way that we both understand what we mean.
http:// -- Short for HyperText Transfer Protocol, this indicates a hypertext document or
directory.
https:// -- Secure encrypted protocol, such as might be used for online banking
www. -- This indicates a page on the World Wide Web. (Sometimes "www" is missing.)
anyolddomain.com/ -- Called the domain name, it often tells you the name of a company,
university, or organization. It can also tell you the country of origin, for example .bt indicates
Bhutan!
english/ -- This is directory or folder on the web server that contains a group of related web
pages within the website.
start.htm -- This is a web page inside the folder. (The same file can be named start.html –the
extra “l” indicates a secure site) A URL doesn't always include the name of the web page.
29
Version 3.0 ©Blackpool and the Fylde
Revision Date 06/01/2014 College Fleetwood Nautical
Campus aVon datasystems
2009 2014
SQA HND Nautical Science
A website is one or more web pages that relate to a common theme, such as a person,
business, organization, or a subject, such as sports.
A web page is an electronic document written in a computer language called HTML
(HyperText Markup Language).
Web pages can contain text, graphics, video, animation, and sound, as well as interactive
features, such as data entry forms
The first page is called the home page, which acts like an index, indicating the content on the
site.
From the home page, you can click hyperlinks to access other web pages
A URL usually has no spaces.
A URL always uses forward slashes (//).
URLs aren't case sensitive. So typing "http://www.anyolddomain.com" or
"HTTP://WWW.ANYOLDDOMAIN.COM" or any variation of upper and lower case letters
takes you to the same page.
If you type a URL incorrectly, your browser will not be able to locate the site or resource you
want. Should you get an error message or access the wrong site, make sure you spelled the
address correctly.
You can find the URL behind any link by placing your cursor over the link. The pointer turns
into a hand and the URL appears in your browser's status bar, usually located at the bottom
of your browser window.
Hyperlinks
Still in the market for a sofa, now imagine that we have made
contact and discovered that you live in a block of flats, and all I
have is the address of the block. When I arrive at the block, I will
still not know how to find you. The doorman, however, may have
a list of residents, and, by
asking him, I can find you.
To determine if a graphic is hyperlinked, move your cursor arrow over the image. You know
the item is hyperlinked if:
Imagine now that the sofa you wanted is no longer for sale. You are still in the market for a
sofa, but do not know where to find one or who has one. There are two ways of going about
this. You could either buy a magazine to check out the advertisements: this would be the
same as using a Search Engine. Alternatively you could wander around the town looking into
hopeful places where sofas might be sold (speculative Surfing).
This is the function of the Web Browser, and, just as a shop that does not sell sofas may be
able to tell you where there is one that does, Web Browsers often contain Search Engines
themselves.
A web browser is a software program used to access the World Wide Web.
A browser (also known as client software) retrieves data from remote web servers
and displays a web page.
The most popular browsers come from Motzilla (Firefox), Google (Chrome) and
Microsoft (Internet Explorer).
Browsers basically work the same way. Once you know one, you can easily learn the
other.
Choosing an ISP is like buying a car; what do you intend to do with it? Do you want a
racy sportster that gives you performance but costs a fortune, or do you want a luxury
sedan loaded with features, also at a price, or will you be satisfied with an old banger?
Most ISPs that you can subscribe to in this country come well loaded with features
– E-mail, your own website (if you know how to create one, that is – most people
don’t, which the ISP relies upon to reduce their running costs), search engines,
news services and so forth. Generally they will also try to seduce you with ‘free’
time, but beware – there is no such thing as a free lunch. The ‘free time’ usually
means that the ISP is not charging you, but the telephone company is, or there
are limitations on when that time can be used, or the ‘free time’ is only an
introductory trial and the company makes its money back once you start paying.
The best advice is to look carefully into the market, and see what is what and
what it offers you.
For users and small businesses, the most popular options include dial-up, DSL (typically
Asymmetric Digital Subscriber Line, ADSL), broadband wireless, cable modem, fiber to
the premises (FTTH), and Integrated Services Digital Network (ISDN) (typically basic
rate interface).
Dial-up
DSL
Broadband wireless access
Cable Internet
FTTH
ISDN
Wi-Fi
DSL
SHDSL
Ethernet technologies
Broadband Internet access, often shortened to just broadband, is a high data rate
Internet access—typically contrasted with dial-up access over a 56k modem.
Dial-up modems are limited to a bitrate of less than 56 kbit/s (kilobits per second) and
require the full use of a telephone line—whereas broadband technologies supply more
than double this rate and generally without disrupting telephone use.
Data rates are defined in terms of maximum download because several common
consumer broadband technologies such as ADSL are "asymmetric"—supporting much
slower maximum upload data rate than download.
Most ISPs today provide a CD-ROM which contains all the necessary software to
connect your computer to their server, or the software may be intrinsic in the modem
supplied. This Plug and Play capability means that the simple act of connecting the
modem to the computer starts the installation process. Changing ISP can also generally
be done once you are ‘on line’.
ISP software bundles also usually contain some utilities software, perhaps even a
rudimentary virus checker, and most will include Microsoft Internet Explorer. You will
need to check what you actually require from the disc, as the offered IE, for example,
may be an older version than the one you have, or may be a newer version that is not
supported by your machine’s architecture or your Operating System.
Start the installation process according to the provided literature, and thereafter simply
follow the onscreen instructions
Should everything not proceed smoothly, the ISP will have a telephone help line you can
call, but beware: the ‘free support’ means they do not charge you for the advice. You
are charged for the phone call, and these are often premium rate lines at £££ per minute
or more, although some do include genuinely free support on a freefone number for an
initial period.
You will be asked to provide a logon User Name and Password. Common names such
as Fred Smith will already have been used, and the ISP may suggest an alternative such
as Smith1125. Many people use a pseudonym, somewhat like Citizens Band Radio
‘Handles’.
Do not use an obvious password such as your birthday, but equally do not use one so
obscure that you can never remember it. If you do forget it, the ISP will have on record
some security questions that they can ask you to prove your identity, and then either tell
you your password in an e-mail, or allow you to set a new one.
Once you have selected and signed up with your ISP, you will need to select a start up
page for your Internet access. This is the page that your browser will always load when
you start an Internet session.
During the process of connecting to your ISP they will have almost certainly set their
home page to be your start up page. This is not unreasonable, but if you wish to have a
different start up page that is easy to do. Many people have their preferred Search
Engine as a homepage. Your browser will include a Settings or Options tab which will
allow you to set your home page. Alternatively, most sites will offer the option on Right
Click of the mouse to set that site as your home page. Beware of Browser Hijackers
downloaded with freeware which will autonomously set themselves as your homepage.
Indexes like AltaVista and Google find individual pages of a website that match your search
criteria, even if the site itself has nothing to do with what you are looking for. You can often
find unexpected gems of information this way, but be prepared to wade through a lot of
irrelevant (and frequently undesirable – there’s a lot of filth out there) information too.
Search results may be ranked in order of relevancy--the number of times your search term
appears in a document--or how closely the document appears to match a concept you have
entered. This is a much more thorough way to locate what you want.
Let's perform an online search using three popular search engines--Yahoo!, Google, and Ask
Jeeves--so you can see how they work and how you can develop an efficient search strategy.
Here's the challenge: You are planning a trip to Blackpool and you've always wanted to ride
the Big One Roller Coaster. Is it operational? Is the Pleasure Beach open in January? How
can you find out?
First we'll try Yahoo! One trick when searching is narrow your focus.
Entering "Blackpool" in the search box results in over 59,600,000
sites related to the ‘Paris of the North’. Entering "Pleasure Beach"
results in 47,300,000 sites, many of which have nothing to do with Blackpool. By combing the
terms "Blackpool” and “Pleasure Beach”, the search returns 1,480,000 sites, along with a brief
description of each one. Now you have to visit each site to see if there's any information about
operational status and opening times.
Bear in mind that websites tend to change often. These changes are not always reflected in
the search engine database, particularly for directories. Typically, websites are registered with
search engines when they first go online. After that, changes are not reported generally. To
find the most recent information, your best bets are search engines that use Web-indexing
robots, software that constantly searches the Internet, recording additions and changes.
Regardless of which search engine you use, it really pays to find out the particulars of how it
works. Take the time to read the search tips on the respective sites. For instance, how does
the engine handle searches that include more than one word? Most engines, but not all, return
results that include any of the words. Because there is so much information online, you will
usually want to limit the scope of your searches. How do you do this?
Boolean Logic
The English mathematician, George Boole, developed an algebra of logic, which has become
the basis for computer database searches. Boolean logic uses words called operators to
determine whether a statement is true or false.
37
Version 3.0 ©Blackpool and the Fylde
Revision Date 06/01/2014 College Fleetwood Nautical
Campus aVon datasystems
009 2014
SQA HND Nautical Science Computing
The most common operators are AND, OR and NOT. These three little words can be
enormously helpful when doing online searches. A few examples show why.
Blackpool AND
Documents with both words
Pleasure
Blackpool OR
The greatest amount of matches; documents with either word
Pleasure
Blackpool NOT Documents about Blackpool, but not including any containing
Pleasure the word Pleasure; a good way to limit the search.
The exact syntax each engine uses varies, so familiarize yourself with each one's unique
properties.
Perhaps the most useful feature in defining search criteria, Boolean operators provide you with
powerful control over the search engine logic. The Boolean operators AND, OR, NOT (or AND
NOT in some engines), NEAR and parentheses are in many ways analogous to mathematical
operators in how they shape the execution of a complex equation. Here's what these Boolean
operators do for you:
AND
If you want a document that contains all of your keywords, use the capitalized word AND
between keywords. The engine will only find documents that have both words. Here's an
example: Using the search criteria Manchester AND United would return all documents that
contain both words. Be sure to capitalize all letters in the word AND, otherwise the search
engine will treat it as a keyword, not as an operator.
MANCHESTER UNITED
If the left oval represents all documents containing the word Manchester and the right oval
represents all documents containing the word United, the intersection of those ovals, the
green area, represents all documents containing both words. You can see how this operator is
useful in narrowing your results.
38
Version 3.0 ©Blackpool and the Fylde
Revision Date 06/01/2014 College Fleetwood Nautical
Campus aVon datasystems
009 2014
SQA HND Nautical Science Computing
OR
If you want to broaden your search to find documents that contain either of the keywords, use
the OR operator between words. This is very useful when searching for terms that have
synonyms. An example is children OR kids, which would return any document that had either
of the words.
If the left oval represents all documents containing the word children and right oval represents
all documents containing the word kids, the green area represents documents that contain
either word or both words. You can see how this operator broadens your search, obtaining
more results.
NEAR
This operator is a more specific form of the AND operator. It ensures that the document
contains both terms and that they are located near each other. In many lengthy documents,
just using the operator AND might not provide useful results as the two keywords may be
located in very different parts of the document and might not be related to one another.
Using the capitalized AND NOT preceding a search term eliminates documents that contain
that term. Why would you want to do this? If you want to find information on Manchester and
do not want documents that include information relating to Manchester United you could use
"Manchester" AND NOT “United”
MANCHESTER UNITED
39
Version 3.0 ©Blackpool and the Fylde
Revision Date 06/01/2014 College Fleetwood Nautical
Campus aVon datasystems
009 2014
SQA HND Nautical Science Computing
Metasearches
Rather than search each directory or index individually, you can submit your query
simultaneously to multiple search engines by doing a metasearch.
Capital Sensitivity
If a search keyword is capitalized the search engine will return only documents containing the
capitalized word. For example, if you were interested in documents relating to the country of
China, capitalizing the word and using an engine that supports capital sensitivity narrows
down the number of results returned, eliminating documents that relate to china dishes or
cookery. Note however, that in many instances it is better to leave keywords uncapitalized to
allow the engine to return results that contain keywords in either form.
40
Version 3.0 ©Blackpool and the Fylde
Revision Date 06/01/2014 College
Fleetwood Nautical Campus
aVon datasystems 2009 2014
SQA HND Nautical Science Computing
Phrase Searching
When using search terms containing more than one word in a specific order, if you enclose the
words in quotation marks, the engine returns only documents containing the exact phrase.
Here's an example: When searching for information on gun control legislation, using "gun
control" will eliminate those documents that contain the words gun and control, but not in that
order; possibly in entirely different paragraphs and maybe not even relating to the topic of gun
control.
Truncation
If you are looking for information on gardening, you could use it as your keyword. However, if
your results are limited in number (though not likely with gardening) and you want to broaden
your search, use a root part of the word and abbreviate it with an asterisk (garden*). The
engine will return links to documents containing gardens, garden, gardener, gardeners, and so
on.
Parentheses
The operators AND, NEAR, OR and AND NOT are powerful in their own right, but when used
in conjunction with parentheses, they offer substantial control over the search logic executed
by the engine. Parentheses are used in Boolean logic similar to the way they are used in a
mathematical equation, limiting and ordering relations between variables.
Here's an example: If you want to find a Web-based Internet tutorial you might use the search
criteria Internet AND (tutorial OR lesson). The documents returned must contain both of the
words Internet and tutorial or Internet and lesson. Essentially, the parentheses are used as
they are for the distribution property in mathematics--to distribute the keyword Internet to
either of the two "OR" words inside the symbols.
The most common use of parentheses is to enclose two possible keywords separated by an
OR operator and then linking those enclosed/possible keywords with other criteria using AND.
However, there are times and instances where the reverse arrangement might prove useful.
For example, if you were looking for information on gun control you might want to use "gun
control" OR (legislation AND gun), which would return documents with the words "gun control"
or documents containing the word gun and the word legislation.
You can further refine the search. Since the word "law" is a synonym of legislation you can
even nest one set of parentheses inside another to distribute gun to either legislation or law
and while we're at it, truncate "law" with an asterisk to also distribute gun to the variation--
laws.
Here's how it would look: "gun control" OR (gun AND (law* OR legislation)). Note that each left
side parentheses must be paired with a right side one somewhere in the Boolean expression
or the search engine will get confused
41
Version 3.0 ©Blackpool and the Fylde
Revision Date 06/01/2014 College Fleetwood Nautical
Campus aVon datasystems
2009 2014
SQA HND Nautical Science Computing
Some engines offer a variation of the Boolean operators AND and NOT. A + symbol preceding
a word (with no space between) requires that the word be present in documents. A - symbol
preceding a keyword ensures that the word is not present in returned documents. Note that all
words that must be in the document should be preceded by a + symbol, even the first word.
Here's an example: +fraud +election ensures that fraud is also in all the documents.
Some engines offer limited Boolean logic with radio buttons or pull-down menu choices such
as:
Documents must include "All terms" (equivalent to using the operator AND between all terms).
Documents must include "Any terms" (equivalent to using OR between all terms).
Date Capability
Many search engines offer the ability to limit searches by web page creation dates. This is a
very useful tool for people doing continuing research on a specific topic. It enables them to
limit the results to pages created since their last search. It is also useful when searching for
current event topics.
Note that the implementation of this feature varies widely. Some search tools like Yahoo! offer
radio buttons or pull-down menus, while AltaVista and HotBot provide the ability to specify
dates or time frames. Also, date sensitivity is related to the web page creation date, not some
historical time frame. For instance, it would not be useful to use an engine's date capability to
search for 1907 and information relating to the Wright brothers, since there were no web
pages created in 1907!
Some engines can limit searches to specific areas, the most common being the document title
and URL. Here's an example of a title search: If you are looking for information on alternative
medicine and believe that there are entire web pages devoted to your subject that have the
keywords in the titles, you could use the syntax: title: alternative AND medicine.
An example of URL search would be if you are looking for Apple Computer web pages. You
could use: url: apple, which would return web pages created by the computer maker Apple
(and others).
42
Version 3.0 ©Blackpool and the Fylde
Revision Date 06/01/2014 College Fleetwood Nautical
Campus aVon datasystems
2009 2014
SQA HND Nautical Science Computing
Some engines allow you to limit your searches to "just the Web" or just "newsgroups" , or
“Pages from the UK”
Both Google and AltaVista allow you to search for various types of media, including audio,
video, and graphics.
The Internet may not be the best place to find certain information. While it abounds with
computer-related subjects, it is not as good for historical information.
In addition much of the information is, like the “Hitchhikers Guide to the Galaxy”, ‘apocryphal
or at least wildly inaccurate’. This is because there is no control over what is uploaded to
websites.
For some areas of research, a telephone and a sharp reference librarian may still be your best
bet.
Downloading refers to the method by which you access digital information from a remote
computer. As it turns out, almost everything you do on the Web is some form of downloading -
-it's as simple as clicking your mouse. When you access a web page, for instance, you are
actually downloading the document and all of its associated graphics from a web server. Once
the digital data arrives, your web browser looks at the file extension. If it recognizes the type of
file, it will display it. If it doesn't recognize it, it will ask you if you want to configure a viewer (tell
the browser which software program to use to view the file). You also have an option to save
the file to your hard drive.
43
Version 3.0 ©Blackpool and the Fylde
Revision Date 06/01/2014 College Fleetwood Nautical
Campus aVon datasystems
2009 2014
SQA HND Nautical Science Computing
The exception is files with an .exe (DOS/Windows) extension which are self-extracting. These
files do not require a separate software program to run.
44
Version 3.0 ©Blackpool and the Fylde
Revision Date 06/01/2014 College Fleetwood Nautical
Campus aVon datasystems
2009 2014
SQA HND Nautical Science Computing
Once the page you wish to save is displayed on your monitor, it is easy to save by simply
calling up the File Menu. This can be done by either using the drop down menu in the
Browser Toolbar, or
by right clicking on the web
page itself
The Save Web Page dialogue box illustrated above will open up, giving you a number of
save choices:-
45
Version 3.0 ©Blackpool and the Fylde
Revision Date 06/01/2014 College Fleetwood Nautical
Campus aVon datasystems
2009 2014
SQA HND Nautical Science Computing
The file formats offered will allow you to save the file data in a number of ways:-
1. Web Page Complete. This format saves each file in its original format, and saves all
of the files needed to display this page, including graphics, frames, and style sheets
2. Web Archive. To save all of the information needed to display this page in a single
MIME-encoded file, click Web Archive. This option saves a snapshot of the current
Web page
3. Web Page HTML only. This option saves the information on the Web page, but it
does not save the graphics, sounds, or other files.
4. Text only. This option saves the information on the Web page in straight text format
With Web Page, complete and Web Archive, you can view all of the Web page offline, without
adding the page to your Favourites list and marking it for offline viewing.
When you choose Web Page, complete, only the current page is saved. If you want to view
Web pages and the pages they link to while offline, click Related Topics below.
Saving an Image
46
Version 3.0 ©Blackpool and the Fylde
Revision Date 06/01/2014 College Fleetwood Nautical
Campus aVon datasystems
2009 2014
SQA HND Nautical Science Computing
As well as saving text and graphic files that you have downloaded, you can also download
software onto your computer from the net. Software comes from many sources: Microsoft and
other major software developers offers downloadable upgrades to their products, anti virus
software providers offer the latest virus pattern updates to ensure the most up to date
protection, and other software developers offer applications, plug-ins, patches and games to
download.
Not all downloadable software is ‘Freeware’, that is offered free of charge. Program upgrades
are usually only offered to registered users, anti virus updates are generally on a subscription
basis, and many of the applications and games are either trial versions that only run for a
certain length of time unless you have paid for the full product (e.g. WinZip) or partial
programs that only perform certain defined tasks (e.g. Adobe Acrobat Reader). A lot of
offered software is ‘Shareware’, which requires the user to send a nominal registration fee to
the provider.
We expect other drivers to observe the rules of the road and the same is true as we travel
through cyberspace. Here are a few pointers to help you out:
To add humour and personality to your messages, use smileys, also known as
emoticons, or expressions you create from the characters on your keyboard A few
popular ones include:
Remember that anything you post to a newsgroup or type during a chat session is a public
comment. You never know who's reading it, or who may copy it and spread it around.
47
Version 3.0 ©Blackpool and the Fylde
Revision Date 06/01/2014 College Fleetwood Nautical
Campus aVon datasystems
2009 2014
SQA HND Nautical Science Computing
When posting a message to a public bulletin board, forum, or newsgroup, stick to the topic.
Don't indiscriminately post unrelated comments, or worse--advertisements--to every
newsgroup you can think of.
This practice, known as spamming, will quickly lead to another unpleasant Internet practice,
flaming. What is flaming? Sometimes you might offend someone unintentionally. Be prepared
to receive some angry e-mail or be treated rudely in a public discussion. This is called being
flamed. If you attack back, you will spark a flame war. To contain the heat, the best response
usually is no response at all.
If you post an ad to a newsgroup, or send it in an e-mail, clearly identify it in the subject line.
That way people who aren't interested can delete it.
Netiquette isn't something you learn overnight, so don't let your fear of not knowing cyber-
protocol hold you back: for a short and friendly summary, try the “UK Beginners' Guide to
Good Manners.”
The Internet has made it possible for people all around the world to connect with each other in
meaningful ways. Whether for research, education, business, or fun, the Internet has changed
how many of us live, work, and play, in ways we may not even be fully aware of.
As the Internet continues to evolve, so do the issues that impact the way we use it. From
privacy, security and freedom of speech, to honesty and consideration in the way we interact
with others, we all have a responsibility to preserve and protect its unique character. That
means recognizing that while the medium is in many ways a reflection of the physical world, it
is in other ways, fundamentally different--manifesting its own customs and practices.
48
Version 3.0 ©Blackpool and the Fylde
Revision Date 06/01/2014 College Fleetwood Nautical
Campus aVon datasystems
2009 2014
SQA HND Nautical Science Computing
to name but a few. Many of the activities of these individuals are illegal in either the country of
origin, or this country, and persons accessing sites of an illegal nature are breaking the law,
even if the activity is legal in the country of origin. It is all too easy to link to a site that contains
offensive material; most Internet users have done it unintentionally at least once. The best
advice is, as soon as you realise what you have found, get out at once. If the site is known by
you to contain illegal material (for example Paedophile material) use your History folder to note
the URL that took you there, and report it to the Police.
49
Version 3.0 ©Blackpool and the Fylde
Revision Date 06/01/2014 College Fleetwood Nautical
Campus aVon datasystems
2009 2014