Incom Input and Output
Incom Input and Output
ARAW
LESSON 3
COMPUTER
COMMUNICATION
COMMUNICATIO
N
Computer communications
is the process of sharing data,
programs, and information
between two or more
computers.
E-mail. Provides a fast, efficient alternative to
traditional mail by sending and receiving
electronic documents.
Texting. Provides very efficient direct text
communication between individuals using shot
electronic messages.
Internet telephone. Provides a very low-cost
alternative a long-distance telephone calls
using electronic voice and video delivery.
Electronic commerce. Buying and selling goods
electronically.
CONNECTIVITY
Connectivity is a concept related to using
computer networks to link people and
resources. For example, connectivity
means that you can connect your
microcomputer to other computers and
information sources almost anywhere.
With this connection, you are linked to the
world of larger computers and the
COMMUNICATION SYSTEMS
Communication systems are
electronic systems that
transmit data from one
location to another. Whether
wired or wireless, every
communication system has
four basic elements.
COMMUNICATION CHANNEL
Communication channel. This
is the actual connecting or
transmission medium that
carries the message. This
medium can be a physical wire
or cable, or it can be wireless.
COMMUNICATION SYSTEMS
Communication channels are an
essential element of every
communication system. These
channels actually carry the data from
one computer to another. There are
two categories of communication
channels. One category connects
sending and receiving devices by
providing a physical connection, such
PHYSICAL CONNECTIONS
Physical connections use a
solid medium to connect
sending and receiving devices.
These connections include
telephone lines (twisted pair),
coaxial cable, and fiber- optic
cable.
Twisted-pair cable consists of pairs of copper wire
that are twisted together. Both standard telephone
lines and Ethernet cables use twisted pair. Ethernet
cables are often used in networks and to connect a
variety of components to the system unit.
Coaxial cable, a high-frequency transmission cable,
replaces the multiple wires of telephone lines with a
single solid-copper core. In terms of the number of
telephone connections, a coaxial cable has over 80
times the transmission capacity of twisted pair.
Coaxial cable is used to deliver television
signals as well as to connect computers in a
network.
WIRELESS
A wireless modem is a device that combines
MODEM
the functions of a modem and a wireless
router, allowing for both wired and wireless
internet connections.
CONNECTION SERVICE
This type of service has been replaced by
higher-speed connection service including
DLS, cabl , satellite, and cellular services.
DSL
A Digital Subscriber Line (DSL) is a
SERVICE
technology used to provide high-speed
internet access over traditional telephone
lines.
CABLE
It is a type of broadband service, meaning
SERVICE
it offers faster speeds and more reliable
connections compared to traditional dial-up
or even some DSL services.
SATELLITE CONNECTION
Satellite connection service involves the
SERVICE
use of satellite technology to provide
various types of communication services,
including internet access, television, and
radio.
CELLULAR SERVICE
Cellular service providers offer mobile
PROVIDERS
communication services, including voice
calls, text messaging, and mobile data.
BANDWIDT
Bandwidth is a term used in
H
telecommunications and computing to
describe the maximum amount of data that
can be transmitted over a network or
communication channel in a given period of
time. It is typically measured in bits per
second (bps), kilobits per second (Kbps),
megabits per second (Mbps), or gigabits
per second (Gbps).
VOICE BAND
The term "voice band" refers to a specific
range of frequencies within the
electromagnetic spectrum that is used for
MEDIUM
transmitting voice signals.
The term "medium band" refers to a range of
BAND
frequencies used in various communications
and broadcasting applications. It is typically a
frequency band that falls between the low-
frequency (LF) and high-frequency (HF) bands.
BROADBAN
Broadband is a type of internet connection
D
that's fast and always on. It’s quicker than
old dial-up connections and lets you do
things like stream videos and play games
smoothly. There are different kinds, such as
fiber-optic, cable, and wireless.
BASEBAN
Baseband is a type of communication where
D
a single signal uses the entire bandwidth of
a cable or channel. It’s simpler and used for
things like traditional Ethernet networks,
where one signal travels at a time.
PROTOCOL
Protocols are sets of rules that determine
S
how data is transmitted and received over a
network. They ensure that devices can
communicate effectively and understand
each other.
IDENTIFICATIO
Identification, in a broad sense, involves
N
recognizing or verifying the identity of a
person, device, or system. It’s about
figuring out who or what something is.
PACKETIZATION
Packetization is the process of breaking
down data into smaller chunks, called
packets, for transmission over a network.
COMPUTER
A computer network is a system of
NETWORK
interconnected computers that can
communicate and share resources with
each other. TERM
• NODE-ANY
• CLIENT-A S
• SERVER-A
NODE-ANY
Device that is connected to a network. It could
be a computer, printer, or data device.
CLIENT-A
Node that request and uses resources
available from other nodes. Typcally, a
client is a user’s microcomputer.
SERVER-
A node that shares resources with other
A
noddes. Dedicated servers specialize in
performing specific tasks. Depending on the
specific task, they may be called an
application server, communication server,
database server, file server, printer server,
or web server.
WAN (Wide Area Network)
As the term implies, a WAN
spans a large physical
distance. The internet is the
largest WAN, spanning the
Earth.
MAN (Metropolitan Area Network)
A network spanning a physical area
larger than a LAN but smaller than a
WAN, such as a city. A MAN is typically
owned and operated by a single entity
such as a government body or large
corporation.
PAN (Personal Area Network)
A network that surrounds an
individual. A wireless PAN (WAN)
might be created between Bluetooth
devices.
Campus area network (CAN)
Local area network (LAN)
Metropoliton area notwork (MAN)
Wireless LAN (WLAN)
Wide area network (WAN)
Personal area network (PAN)
NETWORK ARCHITECTURES
Network architecture describes how a
network is arranged and how resources are
coordinated and shared. It encompasses a
variety of different network specifics,
including network topologies and
strategies. Network topology describes the
physical arrangement of the network.
Network strategies define how information
and resources are shared.
TOPOLOGIES
A network can be arranged or
configured in several different ways.
This arrangement is called the
network's topology. Five of the most
common topologies are ring, bus, star,
tree, and mesh.
Bus network
each device is connected to a
common cable called a bus or
backbone, and all
communications travel along
this bus.
Ring network
each device is connected to two other
devices, forming a ring. When a
message is sent, it is passed around
the ring until it reaches the intended
destination.LA
Star network-each device is connected
directly to a central network switch.
Whenever a node sends a message, it
is routed to the switch, which then
passes the message along to the
intended recipient.
The star network is the most widely
used network topology today. It is
applied to a broad range of
applications from small networks in
the home to very large networks in
major corporations.
Tree network-each device is connected
to a central node, either directly or
through one or more other devices. The
central node is connected to two or
more subordinate nodes that in turn are
connected to other subordinate nodes,
and so forth, forming a treelike
structure. This network, also known as
a hierarchical network, is often used to
share corporatewide data.
Mesh network-this topology is the newest type and
does not use a specific physical layout (such as a
star or a tree). Rather, the mesh network requires
that each node have more than one connection to
the other nodes. The resulting pattern forms the
appearance of a mesh. If a path between two nodes
is somehow disrupted, data can be automatically
rerouted around the failure using another path.
Wireless technologies are frequently used to build
mesh networks.
Client/server networks
use central computers to coordinate and supply
services to other nodes on the net-work. The server
provides access to resources such as web pages,
databases, application software, and hardware. This
strategy is based on specialization. Server nodes
coordinate and supply specialized services, and
client nodes request the services. Commonly used
server operating systems are Windows Server, Mac
OS X client Server, Linux, and Solaris.
LESSON 4
PRIVACY
As you have seen, computing
technology makes it possible to collect
and use data of all kinds, including
information about people. The websites
you visit, the stores where you shop,
and the television shows you watch are
all examples of information about you.
There are three primary privacy
issues:
o Accuracy relates to the responsibility
of those who collect data to ensure
that the data is correct.
o Property relates to who owns data
and rights to software.
o Access relates to the responsibility of
those who have data to control who
is able to use that data.
LARGE DEBATES
Large organizations are constantly compiling
information about us. The federal government alone
has over 2,000 databases. Every day, data is
gathered about us and stored in large databases. For
example, telephone companies compile lists of the
calls we make, the numbers called, and so on. A
special telephone directory (called a reverse
directory) lists telephone number sequentially.
It's important to know that you have
some recourse. The law allows you to
gain access to those records about you
that are held by credit bureaus. Under
the Freedom of Information Act, you are
also entitled to look at your records held
by government agencies. (Portions may
be deleted for national security reasons.
PRIVATE NETWORKS
Suppose you use your company's electronic mail
system to send a co-worker an unflattering
message about your supervisor or to send a
highly personal message to a friend. Later you
find the boss has been spying on your exchange.
This is legal, and a recent survey revealed that
nearly 75 percent of all businesses search
employees' electronic mail and computer files
using so-called employee-monitoring software.
These programs record virtually everything
you do on your computer. One proposed law
would not prohibit this type of electronic
monitoring but would require employers to
provide prior written notice. Employers also would
have to alert employees during the monitoring
with some sort of audible or visual signal. If you
are employed and would like to know your
company's current policy on monitoring electronic
communication, contact your human relations
department.
THE INTERNET AND THE WEB
When you send a email on the internet
or browse the web, do you have any
concerns about privacy? Most people
do not. they think that as long as they
are using their own computer and are
selective about dis closing their names
or other personal information.
History files include the locations, or
addresses, of sites that you have
cations, insisted.
Temporary Internet files, also known
as the browser cache, contain web
page content and instructions for
displaying this content.
ONLINE IDENTITY
Another aspect of Internet privacy
comes from online identity, the
information that people voluntarily post
about themselves online. With the
popularity of social networking,
blogging, and photo- and video-sharing
sites, many people post intimate details
of their lives without considering the
consequences.
MAJOR LAWS ON PRIVACY
Some federal laws governing privacy
matters have been created, For
examples the gram - leach brilley act
protects personal financial
information.
SECURITY
Security involves protecting individuals
and organizations from theft and
danger. compater security specifically
focuses on protecting information,
hardware, and software from
unauthorized use, as well as preventing
or limiting the damage from intrusions,
sabotage, and natural disasters.
CYBERCRIME
cybercrime or computer crime is any
criminal offense that involves a
computer and a network Cybercrimes
can take various forms including the
creation of malicious programs, denial
of service attacks, Internet scams, theft,
and data manipulation.
Malicious Programs
A cracker is someone who creates
and distributes malicious programs.
These programs are called malware,
which is short for malicious soft-
ware.
Viruses are programs that migrate
through networks and operating
systems, and most attach
themselves to different programs
and databases.
Worms are programs that simply replicate
themselves over and over again. Once active in
a network, the self-replicating activity clogs
computers and networks until their operations
are slowed or stopped. A recent worm traveled
across the world within hours, stopping tens of
thousands of computers along its way. Unlike a
virus, a worm typically does not attach itself to a
program or alter and/or delete files. Worms,
however, can carry a virus.
Trojan horses are programs that come into
a computer system disguised as something
else. Trojan horses are not viruses. Like
worms, however, they can be carriers of
viruses. The most common types of Trojan
horses appear as free computer games
and free screen saver programs that can
be downloaded from the Internet. When a
user downloads one of these programs, a
virus is deposited on the computer system.
Zombies are computers infected by a
virus, worm, or Trojan horse that allows
them to be remotely controlled for
malicious purposes. A collection of
zombie computers is known as a
botnet, or robot network. Botnets
harness the combined power of many
zombies for malicious activities like
password cracking or sending junk e-
mail.
Denial of Service A denial of service
(DoS) attack attempts to slow down or
stop a computer system or network by
flooding a computer or network with
requests for information and data. The
targets of these attacks are usually
Internet service providers (ISPs) and
specific websites.
Once under attack, the servers at the ISP
or the website become overwhelmed with
these requests for service and are unable
to respond to legitimate users. As a result,
the ISP or website is effectively shut down.
Internet Scams A scam is a fraudulent or
deceptive act or operation designed to trick
individuals into providing personal
information or spending their time and
money for little or no return.
An Internet scam is simply a scam
using the Internet. Internet scams are
becoming a serious problem and have
created financial and legal problems for
many thousands of people.
A technique often employed by
scammers is phishing (pronounced
"fishing"). Phishing attempts to trick
Internet users into thinking a fake but
official-looking web-site or e-mail is
legitimate. Phishing has grown in
sophistication, replicating entire
websites like PayPal to try to lure users
into divulging their financial information.
Ethics, as you may know, are standards
of moral conduct. Computer ethics are
guidelines for the morally acceptable
use of computers in our society. Ethical
treatment is critically important to us all,
and we are all entitled to ethical
treatment. This includes the right to
keep personal information, such as
credit ratings and medical histories,
from getting into unauthorized hands.
These issues, largely under the control
of corporations and government
agencies, were covered earlier in this
chapter. These issues and many more
have been addressed in the Ethics
boxes throughout this book. Now will
examine two important issues in
computer ethics where average users
have a role to play.
Copyright and Digital Rights Management
Copyright is a legal concept that gives content
creators the right to control use and distribution
of their work. Materials that can be copyrighted
include paintings, books, music, films, and even
video games. Some users choose to make
unauthorized copies of digital media, which
violates copyright. For example, making an
unauthorized copy of a digital music file for a
friend might be a copyright violation.
Software privacy is the
unauthorized copying and/or
distribution of soft-ware.
According to a recent study,
software piracy costs the
software industry over $30 billion
prosecution.
Cyberbullying includes sending repeated
unwanted e-mails to an individual who has
stated that he or she wants no further
contact with the sender, ganging up on
victims in electronic forums, posting false
statements designed to injure the
reputation of another, Rogue Wi-Fi
Hotspots Free Wi-Fi networks are available
almost everywhere from libraries to fast-
food restaurants and coffee shops.
Rogue Wi-Fi hotspots imitate these free
networks. These rogue networks
operate close to the legitimate free hot-
spots and typically provide stronger
signals that many users unsuspectingly
connect to. Once connected, the rogue
networks capture any and all
information sent by the users to
legitimate sites including user names
and passwords.
Theft can take many forms-of hardware, of
software, of data, of computer time.Thieves
steal equipment and programs, of course,
but there are also white-collar crimes.
These crimes include the theft of data in
the form of confidential information such as
preferred client lists. Another common
crime is the use (theft) of a company's
computer time by an employee to run
another business.
Data Manipulation Finding entry into
someone's computer network and
leaving a prankster's message may
seem like fun, which is why hackers do
it. It is still against the law. Moreover,
even if the manipulation seems
harmless, it may cause a great deal of
anxiety and wasted time among
network users.
The Computer Fraud and Abuse Act
makes it a crime for unauthorized persons
even to view-let alone copy or damage
data using any computer across state
lines. It also prohibits unauthorized use of
any government computer or a computer
used by any federally insured financial
institution. Offenders can be sentenced to
up to 20 years in prison and fined up to
$100,000.
To prevent copyright violations,
corporations often use digital rights
management (DRM). DRM
encompasses various technologies that
control access to electronic media and
files. Typically, DRM is used to (1)
control the number of devices that can
access a given file and (2) limit the
kinds of devices that can access a file
Although some companies see DRM as
a necessity to protect their rights, some
users feel they should have the right to
use the media they buy-including
movies, music, software, and video
games-as they choose.
The Digital Millennium Copyright Act
makes it illegal to deactivate or
otherwise disable any antipiracy
technologies including DRM
technologies. The act also establishes
that copies of commercial programs
may not be legally resold or given away.
It further makes It a crime to sell or to
use programs or devices that are used
to illegally copy software.