0% found this document useful (0 votes)
239 views375 pages

IT102 Final Copy Complete-1

This document provides an overview of a module on introduction to computing. It includes a course syllabus and table of contents that outlines 4 units which will cover basic concepts of computing, data processing, storage devices, operating systems, networks, and the internet. The module aims to give students a general understanding of computers and lay the foundations of the science of computing by examining topics such as what a computer is, its components, how data is processed and stored, operating systems, and networking basics. It will provide students with basic knowledge of key computing concepts and technologies.

Uploaded by

Thriz
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
239 views375 pages

IT102 Final Copy Complete-1

This document provides an overview of a module on introduction to computing. It includes a course syllabus and table of contents that outlines 4 units which will cover basic concepts of computing, data processing, storage devices, operating systems, networks, and the internet. The module aims to give students a general understanding of computers and lay the foundations of the science of computing by examining topics such as what a computer is, its components, how data is processed and stored, operating systems, and networking basics. It will provide students with basic knowledge of key computing concepts and technologies.

Uploaded by

Thriz
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 375

BULACAN STATE UNIVERSITY

COLLEGE OF INFORMATION AND


COMMUNICATIONS TECHNOLOGY

IT 102

INTRODUCTION
TO COMPUTING
AUTHORS:
Mr. Luis S. Mallari
Dr. Josephine R. Bayonito
Mrs. Michelle Tansinsin
Mrs. Ma. Lourdes Tiongson
Ms. Ruffa Ribot

0
Overview of the Module

INTRODUCTION
The module ―IT102 - Introduction to Computing‖,
aside from the course description, aims to give general
overview of what a computer is and lay foundation of the
science of computing. The module contents examines the
overall aspect of computing, its relationship to Information
Communication Technology, components, operating
systems, future trends and technologies, and internal
organization of the computer system which include CPU
elements, memory, internal storage, and input/output units.
The module includes concepts of computer storage
devices, its functionality, the CPU terminology, memory
functionality, future trends and concepts, monitor and their
controllers, video graphic, driver software et cetera. Basic
knowledge of data representation, data communication,
networking, operating systems, database systems, artificial
intelligence, webserver and its properties, internet
communication and its security will also be acquired in this
module.

1
BULACAN STATE UNIVERSITY
City of Malolos, Bulacan

MODULE CONTENT CHECKLIST


Module Title: IT102-Introduction to Computing____________________________
Writer/s: Mr. Luis S. Mallari, Dr. Josephine R. Bayonito, Mrs. Michelle___
Tansinsin, Mrs. Ma. Lourdes Tiongson, Ms. Ruffa Ribot________
_________________________________________________________
Date Submitted: _________________________________________________________

Indicators Yes No Comments/Recommendations


1. The syllabus is included in the first part

of the module.
2. The following parts are included in the
Module per unit:

2.1 Preliminaries
2.1.1 Title page 
2.1.2 Overview of the module 
2.1.3 Table of Contents 
2.1.4 Course syllabus 
2.1.5 Pre-test 
2.2 Contents
2.2.1 Unit title 
2.2.2 Title of the lesson 
2.2.3 Duration 
2.2.4 Introduction 
2.2.5 Objectives/Competencies 
2.2.6 Pre-test 
2.2.7 Lesson Proper/Course 
Methodology (followed the
Kolb’s Experiential Learning
Cycle/ 4As Model)
2.2.8 Reflection/Learning Insights 
2.2.9 Post-test 
2.2.10 Final Requirement 
2.3 Other Parts
2.3.1 Suggested Readings and

Websites
2.3.2 Glossary 
2.3.3 Answer Key 
2.3.4 References 
2
3. Illustrations/Tables/Graphs complement 
to the contents.
4. The given format was used, to wit:
4.1 Font (Arial) 
4.2 Font Size (12) 
4.3 Margin (Left-1.5; top, bottom & 
right – 0.5”)
4.4 Justified Alignment 
4.5 Paper Size (A4) 
4.6 Portrait Orientation 

Indicators Yes No Comments/Recommendations


5. All resources and activities on the 
module are clearly described for the
students
6. The contents of the module relate 
directly to learning objectives
7. The contents of the module are 
organized and sequenced clearly and
consistently.
Source: Module Writing Guidelines from the OVPAA

Other recommendations:
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
__________________

Checked by:
____________________________
Content Editor

3
Table of Contents

Cover Page…………………………………………………………………...................1
Overview of the Module………………………………………………………………...2
Module Content Checklist……………………………………………………………...3
Table of Contents……………………………………………………………………….4
Course Syllabus………………………………………………………………………..11

Unit -01-BASIC CONCEPTS OF COMPUTING……………………………………24


Lesson 1: Basic Definitions
Introduction…………………………………………………………………………25
Objectives/Competencies…………………………………………………………26
Pretest of computer knowledge…………………………………………………26
1.1 Data and information………………………………………………………….27
1.2 ICT: Information and Communication Technology………………………...29
1.3 What is Computer?....................................................................................30
1.4 Analog, Digital and Hybrid Computers……………………………………..39
1.5 Different types of computers (microcomputers,
minicomputers, mainframes, supercomputers, etc.)……………………….47
1.6 The applications of ICT……………………………………………………….52
Post Test for Lesson 1………………………………………………………….…59
Final Requirements………………………………………………………………..62
Suggested Readings……………………………………………………………...62
References………………………………………………………………................63

Lesson 2: Basic operations and Components of a Computer System


Introduction………………………………………………………………………..65
Objectives/Competencies………………………………………………………..66
Pretest of prior knowledge……………………………………………………....66
2.1 Basic operations of a computer system…………………………………...67
2.2 Data Processing Cycle………………………………………………………70

4
2.3 Basic components of a computer system……………………………….72
Post Test for Lesson 2………………………………………………………….82
Final Requirements…………………………………………………………….84
Suggested Readings…………………………………………………………...84
References………………………………………………………………...........86

Lesson 3: Processing data


Introduction…………………………………………………………………….87
Objectives/Competencies…………………………………………………….88
Pretest of Data and Information knowledge ……………………………….88
3.1 Transforming data into information……………………………………..89
3.2 How computers represent data………………………………………….91
3.3 How is an image stored on a computer?.............................................92
3.4 How computers process data…………………………………………...97
3.5 Machine Cycles………………………………………………………….102
3.6 Computer Memory……………………………………………………….103
Post Test for Lesson 3………………………………………………………111
Final Requirements………………………………………………………….112
Suggested Readings………………………………………………………..112
References……………………………………………………………….......114

Lesson 4: Storing data


Introduction…………………………………………………………………...115
Objectives/Competencies…………………………………………………...116
Pretest of your computer storage devices knowledge …………………..116
4.1 What is Storage Device…………………………………………………117
4.2 Type of digital storage devices…………………………………………118
4.3 Data storage management……………………………………………..132
4.4 Measuring and Improving drive performance ………………………..138
Post Test for Lesson 4………………………………………………………142
Final Requirements………………………………………………………….143
Suggested Readings………………………………………………………..144
References……………………………………………………………….......145

UNIT 02 – OPERATING SYSTEMS, NETWORKS AND THE INTERNET


5
Lesson 5:Operating Systems
Introduction………………………………………………………………….147
Objectives/Competencies………………………………………………….148
Pretest of computer knowledge …………………………………………..148
5.1 What is Operating System…………………………………………….149
5.2 Core Functions of of OS……………………………………………….154
5.3 Details of Operating System‘s Memory Management…………….156
5.4 Common Operating System…………………………………………..165
Post Test for Lesson 5……………………………………………………..167
Final Requirements………………………………………………………..168
Suggested Readings………………………………………………………168
References……………………………………………………………….....170

Lesson 6: Networking basics


Introduction…………………………………………………………………171
Objectives/Competencies…………………………………………………171
Pretest of computer networks knowledge ……………………………...172
6.1 What is a computer network…………………………………………173
6.2 Common types of networks………………………………………….175
6.3 Networks topology…………………………………………………….178
6.4 Network media………………………………………………………...183
6.5 Network Devices ……………………………………………………..190
Post Test for Lesson 6……………………………………………………199
Final Requirements……………………………………………………….200
Suggested Readings……………………………………………………..201
References………………………………………………………………...202

Lesson 7: Data communications


Introduction………………………………………………………………..203
Objectives/Competencies………………………………………………..203
Pretest of data communication knowledge ……………………………204
7.1 Difference between Computer Network and
Data Communication………………………………………………...205
7.2 Telephone Network Communication Lines………………………..208
7.3 Satellite Communications …………………………………………..210
Post Test for Lesson 7…………………………………………………...213
6
Final Requirements………………………………………………………215
Suggested Readings…………………………………………………….215
References………………………………………………………………..216

Lesson 8: Presenting the Internet


Introduction……………………………………………………………….218
Objectives/Competencies……………………………………………….219
Pretest of computer Internet and network knowledge ………………219
8.1 Evolution of the Internet…………………………………………….221
8.2 Introduction to TCP/ IP……………………………………………...223
8.3 The Internet and the World Wide Web……………………………224
8.4 Searching the web………………………………………………….228
8.5 Types of Websites…………………………………………………..230
8.6 Email and other programs………………………………………….237
8.7 Online business…………………………………………………….240
Post Test for Lesson 8………………………………………………….242
Final Requirements……………………………………………………..243
Suggested Readings……………………………………………………243
References……………………………………………………………….245

UNIT 3– APPLICATION SOFTWARE, PROGRAMMING & DATABASE


CONCEPTS
Lesson 9: Working with application software
Introduction………………………………………………………………245
Objectives/Competencies………………………………………………247
Pretest of application software knowledge …………………………..248
9.1 Application software………………………………………………..249
9.2 Kinds of software: commercial, freeware,
public domain, open-source………………………………………..249
9.3 Business software and Other Software …………………………..250
9.4 Graphics and Multimedia Software………………………………..252
9.5 Lesson 9.5 - Internet Software…………………………………….258
9.6 Negative Application Softwares…………………………………...259
Post Test for Lesson 9………………………………………………….261
Final Requirements……………………………………………………..261
Suggested Readings……………………………………………………261
7
References……………………………………………………………….263

Lesson 10: Introduction to Programming


Introduction………………………………………………………………264
Objectives/Competencies………………………………………………265
Pretest of computer programming knowledge ………………………265
10.1 What is a computer program?...................................................266
10.2 Hardware/Software interaction…………………………………..266
10.3 Compilers and Interpreters……………………………………….274
10.4 Intro to Web Programming……………………………………….278
Post Test for Lesson 10………………………………………………..281
Final Requirements…………………………………………………….284
Suggested Readings…………………………………………………..284
References……………………………………………………………...285

Lesson 11: Introduction to Databases and Data-mining


Introduction……………………………………………………………..287
Objectives/Competencies……………………………………………..287
Pretest of Database and Data Science knowledge ……………….288
11.1 What is Database………………………………………………..289
11.2 Databases Types………………………………………………...289
11.3 Database Management System………………………………..290
11.4 Data Warehousing Concepts …………………………………..292
11.5 Introduction to data mining……………………………………...294
Post Test for Lesson 11……………………………………………….300
Final Requirements……………………………………………………301
Suggested Readings………………………………………………….301
References……………………………………………………………..302

UNIT 4 – INFORMATION COMMUNICATION TECHNOLOGY, ETHICS & BEYOND


Lesson 12: Information and Communication Security
Introduction…………………………………………………………….304
Objectives/Competencies…………………………………………….304
Pretest of Information and Communication Security knowledge ..305
12.1 InfoSec Basic Terminologies …………………………………..306
12.2 Malware…………………………………………………………...307
8
12.3 What is Spoofing Attack…………………………………………...311
12.4 Denial of Service (DoS) Attack……………………………………313
12.5 Social Engineering ………………………………………………...316
12.6 Protecting the Network…………………………………………….318
Post Test for Lesson 12…………………………………………………321
Final Requirements……………………………………………………...322
Suggested Readings…………………………………………………….322
References………………………………………………………………..323

Lesson 13: Information, Communication and Computer Ethics


Introduction……………………………………………………………….324
Objectives/Competencies……………………………………………….325
Pretest of ICT ethics knowledge ……………………………………….325
13.1 What is Ethics and Why Is It Important?.....................................326
13.2 Scope of Ethics …………………………………………………….326
13.3 Importance of Ethics……………………………………………….328
13.4 Computer and Information Ethics………………………………...329
13.5 Network Etiquette ……………….................................................331
13.6 ACM (Association of Computing Machine) Code of
Ethics and Professional Conduct…………………………………333
13.7 Organizational Leadership Imperatives………………………….341
Post Test for Lesson 13………………………………………………….344
Final Requirements………………………………………………………345
Suggested Readings……………………………………………………..345
References………………………………………………………………...346

Lesson 14: Future trends in ICT


Introduction………………………………………………………………...348
Objectives/Competencies………………………………………………...349
Pretest of knowledge in the future of ICT ………………………………349
14.1 Artificial Intelligence…………………………………………………351
14.2 Applications of AI ……………………………………………………352
14.3 Pervasive Computing ……………………………………………….356
14.4 Next Generation Networks (NGN) …………………………………360
9
14.5 Cloud computing…………………………………………………..…363
14.6 Grid computing……………………………………………………….365
14.7 ICT for development…………………………………………………366
Post Test for Lesson 1……………………………………………………..371
Final Requirements………………………………………………………..373
Suggested Readings……………………………………………………...373
References………………………………………………………………....374

10
COURSE SYLLABUS
Introduction to Computing
First Semester, AY 2020-2021

COLLEGE : College of Information and Communications


Technology
DEPARTMENT : Bachelor of Science in Information Technology
COURSE CODE : IT 102
COURSE TITLE : Introduction to Computing
CREDIT UNITS : 3-unit Lecture
PRE-REQUISITE/S : None
FACULTY :
CONSULTATION HOURS :

COURSE DESCRIPTION:

This course includes provides an overview of the Information Communication


Technology, Computing Industry and Computing profession, including Research and
Application of Computing in different fields such as Biology, Sociology, Environment
and Gaming; an Understanding of ACM Requirements; an Appreciation of the history
of computing; and Knowledge of the Key Components of the Computer Systems
(Organization and Architecture), Malware, Computer Security, Internet and Internet
protocols, Artificial Intelligence, Machine Learning, and future applications of ICT for
humanity.

University Vision
Bulacan State University is a progressive knowledge-generating institution,
globally-recognized for excellent instruction, pioneering research, and responsive
community engagements.

University Mission
Bulacan State University exists to produce highly competent, ethical and
service-oriented professionals that contribute to the sustainable socio-economic
growth and development of the nation

Core Values: SOAR BulSU!

Service to God and Community


Order and Peace
Assurance of Quality and Accountability
11
Respect and Responsibility
The BulSU Ideal Graduates Attributes (BIG A) reflect the graduate‘s capacity as:
a. highly and globally competent;
b. ethical and service-oriented citizen;
c. analytical and critical thinker; and
d. reflective life-long learner.

Program Educational Objectives (PEO)

University Mission
Program Educational Objectives (PEO)
AIG-a AIG-b AIG-c AIG-d

PEO1. Advance their careers through activities


such as participation in professional
 
organizations, attainment of professional
certification and seeking higher education.

PEO2. Pursue lifelong learning in generating


innovative solutions using complex problem-  
solving skills.

PEO3. Demonstrate technical competency and



leadership leading to a successful career.

PEO4. Demonstrate commitment towards


sustainable development for the betterment of 
society.
PEO5. Acquire new skills as technology evolve
and be more proficient in developing computing   
solutions.
PEO6. Create sustainable linkages with other
agencies and institutions for the promotion of 
instruction, research, extension programs.
PEO7. Adhere to ethical standards in the

practice of the computing profession.

Program Outcomes (PO)


On completion of the course, the student is expected to be able to do the following:

Program Educational Objectives


PROGRAM OUTCOMES
PEO1 PEO2 PEO3 PEO4 PEO5 PEO6 PEO7
a. Explain fundamentals principles,
concepts and evolution of corrupting  
systems as they relate to different fields.

12
b. Understand best practices and
 
standards and their applications.

c. Expound on the recent developments in


 
the different computing knowledge area.

d. Identify and analyze user needs and


take them into account in the selection,

creation, evaluation, and administration of
computer-based systems.
e. Design, implement, and evaluate
computer-based systems, processes,
components, or programs to meet desired 
needs and requirements under various
constraints.
f. Analyze solutions employed by
organizations to address different  
computing issues.
g. Apply knowledge through the use of
current techniques, skills, tools, and 
practices necessary for the IT profession.
h. Function effectively as a member or a
leader of a development team recognizing

the different roles within a team to
accomplish a common goal.
i. Assist in the creation of an effective IT
 
project plan.
j. Communicate effectively with the
computing community and with society at
large about complex computing activities   
through logical writing, presentations, and
clear instructions.
k. Analyze the local and global impact of
computing information technology on  
individuals, organizations, and society.
l. Understand professional, ethical, legal,
security, and social issues and  
responsibilities in the utilization of ICT.
m. Recognize the need for and engage in
planning self-learning and improving
  
performance as a foundation for continuing
professional development.
n. Preserve and promote “Filipino historical
 
and cultural heritage.”

13
Course Outcomes and Relationship to Program Outcomes

Course Outcomes Program Outcomes

After completing this course,


a b c d e f g h i j k l m n
the student must be able to:

LO1. Explain fundamentals


principles, concepts and
evolution of corrupting systems I I I
as they relate to different
fields.

LO2. Expound on the recent


developments in the different I I I
computing knowledge area.

LO3. Analyze solutions


employed by organizations to
I E I D
address different computing
issues.

LO4. Identify various


components of a computer I E E
system.

LO5. Exhibit discipline towards


the achievements of
professional competencies, I E E E
integrity, moral and ethical
values.

LO6. Define the basic terms


associated with
I I I
communications and
networking.

LO7. Understand different


E I E
terms associated with ICT.

LO8. Identify the various


categories of software and I I E D
their usage.

LO9. Understand different


terms associated with the I E E E E
Internet and World Wide Web
14
and Artificial Intelligence.
Note: (I) Introductory Course to an Outcome (E) Enabling Course to an Outcome (D) Demonstrative
Course to an Outcome

LEARNING EPISODES:
Learning Topics Week Learning Activities
Outcomes No.
LO6 Discussion of BulSU 1 Oral Participation
Foundational Statement
LO1 and Vision, Mission, Goals
and Objectives of the
LO2 College

Unit -01-BASIC CONCEPTS OF COMPUTING


Lesson 1: Basic Definitions Oral Participation

1.1 Data and information


1.2 ICT: Information and
Communication Technology
1.3 What is Computer
1.4 Analog, Digital and
Hybrid Computers
1.5 Different types of
computers
(microcomputers,
minicomputers,
mainframes,
supercomputers, etc.)
1.6 The applications of ICT
LO3 Lesson 2: Basic operations 2 Oral Participation
LO4 and Components of a Quiz
Computer System

-Basic operations of a
computer system
-Data Processing Cycle
-Basic components of a
computer system
LO7 Lesson 3: Processing data 3 Oral Participation
Transforming data into Quiz
information

-How computers represent


data
-How computers process
data
-Machine Cycles
-Memory
LO7 Lesson 4: Storing data 4 Internet Research
15
LO8 Group Discussion
-What is Storage Device
-Type of digital storage
devices
-Data storage management
-Measuring and Improving
drive performance
UNIT 02 – OPERATING SYSTEMS, NETWORKS AND THE INTERNET
LO9 Lesson 5:Operating 5 Oral Participation
Systems Quiz

-What is Operating System


-Types of Operating
Systems
-Core Task of OS
-Common Operating
System
LO6 Lesson 6: Networking 6 Group Internet
LO5 basics Research

-What is a network
-Uses of networks
-Common types of networks
-Networks topology
-Network media
-Network hardware
LO6 Lesson 7: Data 7 Oral Participation
LO9 communications Quiz
LO10
-Data communication on
telephone lines (usage of
modems)
-Using digital data
connections
-Wireless Networks
LO9 Lesson 8: Presenting the 8 Internet activity
LO10 Internet Group Discussion

-Evolution of the Internet


-Introduction to TCP/ IP
-The Internet and the World
Wide Web
-Searching the web
-Types of Websites
-Email and other programs
-Online business
Midterm exam week 9
UNIT 3– APPLICATION SOFTWARE, PROGRAMMING & DATABASE
CONCEPTS
LO8 Lesson 9: Working with 10 Demonstration
application software Oral Participation
Quiz
-Application software
16
-Kinds of software:
commercial, freeware,
public domain, open-source
-Business software and
Other Software
LO8 Lesson 10: Introduction to 11-12 Oral Participation
LO9 Programming Written Activity
LO10
-What is a computer
program?
-Hardware/ software
interaction: code, machine
code
-Compilers and Interpreters
-Generations of
Programming Languages
-Planning a computer
program
-Intro to Web Programming
LO6 Lesson 11: Introduction to 13 Oral Participation
LO7 Databases and Data-mining Quiz
LO8
-Intro to Database
-What is Database
-Where are Databases
Used
-Databases Types
-Database Management
System
-Popular databases
-Data Warehouse
-Introduction to data mining

UNIT 4 – INFORMATION COMMUNICATION TECHNOLOGY, ETHICS & BEYOND


LO6 Lesson 12: Information and 14 Oral Participation
LO7 Communication Security Written Activity
LO10
-Information and
Communication Security
-Basic Terminologies
-Malware
-Spoofing Attack
-Network-based Attack
-Denial of Service (DoS)
Attack
-Social Engineering
-Protecting the Network
LO5 Lesson 13: Information, 15 Reaction Paper
LO7 Communication and
Computer Ethics

-What is Ethics and Why Is


It Important?
17
-Computer and Information
Ethics
-Network Etiquette
-ACM Code of Ethics and
Professional Conduct
LO2 Lesson 14: Future trends in 16 Group Discussion
LO7 ICT Case Study

-Artificial Intelligence
- Applications of AI
-Pervasive Computing
personal area networks
wireless sensor networks
RFIDs

-Next-generation
Networking (NGNs)
-Cloud computing
-Grid computing
-ICT for development
Final Exam Week 17
Submission of Final 18
Requirements, Remedial
Exams, Consultations, Etc.

FINAL COURSE OUTPUT:

As evidence of attaining the above learning outcomes (LO), the student is


required to accomplish and submit the following during the indicated period/dates
within the term.
In order to assess the understanding of the concepts, students will be
submitting term paper/synopsis, research works and reflections papers on the
important ICT concepts. At the end of the paper, students will be presenting their
conclusions and perceptions about the topics.

RUBRIC FOR ASSESSMENT:


CATEGORY 4 3 2 1
INTRODUCTION Well-developed Introduction Introduction Background
Background/introduction creates interest. adequately details are a
History engages the Paper clearly explains the random
reader and states the background, but collection of
creates interest. position. may lack information,
CONCLUSION Contains Conclusion detail. Paper unclear, or not
detailed effectively states the related to the
background summarizes position. topic. Paper is
information. topics. Conclusion is vague or
Paper clearly recognizable unclear.
states a and ties up Conclusion
significant and almost all loose does not
compelling ends. summarize

18
position. main points.
Conclusion
effectively
wraps up and
goes beyond
restating the
thesis.

MAIN POINTS Well-developed Three or more Three or more Less than three
Body main points main points are main points are main points,
Paragraphs directly related related to the present. The and/or poor
to the topic. topic, but one narrative shows development of
Supporting may lack the events, but ideas. The
examples are details. The may lack narrative is
concrete and narrative shows details. undeveloped,
detailed. events from the and tells rather
The narrative is author's point of than shows, the
developed with view using story.
a consistent some details.
and effective
point-of-view,
showing the
story in detail.
ORGANIZATION Logical Logical Organization is No discernable
Structure progression of progression of clear. organization. Tr
Transitions ideas with a ideas. Transitio Transitions are ansitions are
clear structure ns are present present. not present.
that enhances equally
the throughout
thesis. Transiti essay.
ons are mature
and graceful.
STYLE Writing is Writing is clear Writing is clear, Writing is
Sentence flow, smooth, skillful, and but sentences confusing, hard
variety and sentences have may lack to
Diction coherent. Sent varied variety. Diction follow. Contain
ences are structure. Dictio is appropriate. s fragments
strong and n is consistent. and/or run-on
expressive with sentences.
varied structure. Inappropriate
Diction is diction.
consistent and
words well
chosen.
MECHANICS Punctuation, Punctuation, A few errors in Distracting
Spelling, spelling, spelling, punctuation, errors in
punctuation, capitalization capitalization spelling, punctuation,
capitalization are correct. No are generally capitalization. spelling,
errors. correct, with few (3-4) capitalization.
errors. (1-2)

19
OTHER REQUIREMENTS AND ASSESSMENTS:

Aside from the final output, the student will be assessed at other times during
the term by the following:
 Regular Class Attendance / Work Ethics
 Research/Reflection Activities
 Major Examinations (Midterm and Final Term)
 Projects / Machine Problems
 Quizzes

GRADING SYSTEM:

SL/AOL
Major Examinations (Midterm and Final Exam) 30%
Quizzes/Activities 40%
Projects/Research Works 20%
Attendance/Work Ethics/Class Participation 10%
TOTAL 100%

RPL
Major Examinations (Midterm and Final Exam) 30%
Quizzes/Activities 40%
Projects/Research Works 20%
Attendance/Work Ethics/Class Participation 10%
TOTAL 100%

Final Grade = Midterm Grade + Tentative Final Grade Period


2

Range Grade

97-100 1.00

94 – 96 1.25

91 – 93 1.50

88 – 90 1.75

85 – 87 2.00

82 – 84 2.25

79 – 81 2.50

76 – 78 2.75

75 3.00

74 and below 5.00

20
REFERENCES:
1. Bynum, T. (2008). Information and Technology and Moral Philosophy. .
Cambridge : Cambridge University Press
2. Matthew, S. (2008). Identity and Information Technology . Cambridge :
Cambridge University Press
3. Shelly, Gary et al.(2012). Discovering Computers, Complete: Your Interactive
Guide to the Digital World . CENGAGE Learning

ONLINE RESOURCES:

1. http://techopedia.com
2. http://www.tutorialspoint.com
3. http://compnetworking.about.com
4. http://computer.howstuffworks.com

Class Policies:

1. The University rules and regulations will be observed.


2. The students‘ listed in the master list from the MIS office shall be permitted to
attend the class.
3. Enrolled students must go to the class promptly. Must come to each class
prepared.
4. Students are expected to take all examinations on the date scheduled and
participate actively in the discussion as well as the different activities involved
on the subject and the college as well.
5. Cheating is equivalent to lower grade to a failing grade in the subject.
6. Requirements e.g. project, term paper, case study etc. which not submitted on
or before the due date will no longer be accepted.
7. The use of electronic gadgets like cell phones, tablets, laptops, mp3, etc. are
not allowed during class hours unless needed.
8. Sit in students may attend the class upon the approval of the subject teacher.
9. Always maintain the cleanliness and orderliness of the room before and after
the class.

21
Prepared by:
Luis S. Mallari
Instructor

Evaluated by:
Raquel C. Adriano, Ph.D.
Program Chair, BSIT Program

Approved:
Ma. Magdalena V. Gatdula, DT.
Dean

22
Declaration
I have read and understood the above syllabus in full and in participating in this course I agree to the
above rules. I have a clear understanding of the policies and my responsibilities, and I have discussed
everything unclear to me with the instructor.
I will adhere to the academic integrity and policy and I will treat my fellow students and my teacher
with due respect.
I understand that this syllabus can be modified or overruled by announcements of the instructor in
class or on any social media site at any time
______________________________________ ____________________ _______________
Student’s Printed name Signature Date

______________________________________ ____________________ _______________


Parent’s Printed name Signature Date

Student’s Copy

-------------------------------------------------------Cut here----------------------------------------------------------

Declaration
I have read and understood the above syllabus in full and in participating in this course I agree to the
above rules. I have a clear understanding of the policies and my responsibilities, and I have discussed
everything unclear to me with the instructor.
I will adhere to the academic integrity and policy and I will treat my fellow students and my teacher
with due respect.

I understand that this syllabus can be modified or overruled by announcements of the instructor in
class or on any social media site at any time
______________________________________ ____________________ _______________
Student’s Printed name Signature Date

______________________________________ ____________________ _______________


Parent’s Printed name Signature Date
Instructor's Copy

23
UNIT 01
BASIC CONCEPTS in COMPUTING

Unit-01: Lessons Composition

I. Lesson 1: Basic Definitions


Duration: 3 Hours per week (Week 1)

II. Lesson 2: Basic operations and Components of a


Computer System
Duration: 3 Hours per week (Week 2)

III. Lesson 3: Processing Data: Transforming Data


Into Information
Duration: 3 Hours per week (Week 3)

IV. Lesson 4: Storing Data


Duration: 3 Hours per week (Week 4)

24
INTRODUCTION
Lesson 1, Basic Definitions, aside from the course description, aims to give a
general overview of what a computer is and lay the foundation of the science of
computing. The module contents examine the overall aspect of computing, its
relationship to Information Communication Technology, components, operating
systems, and internal organization of the computer system, which include CPU
elements, memory, internal storage, and input/output units. The module contains
concepts of computer storage devices, its functionality, the CPU terminology,
memory functionality, trend and concepts, monitor and their controllers, video
graphic, driver software, et cetera. Basic knowledge of data representation, data
communication, networking, operating systems, database systems, web server and
its properties, internet communication, and security will also be acquired in this
module.

ICT has become a necessary and acknowledged piece of regular day to day
existence for some individuals. ICT is expanding in significance in individuals' lives,
and it is expected that this pattern will proceed, to the degree that ICT education will
turn into a useful necessity for individuals' work, social, and individual lives.

In the previous decades, data and correspondence advancements have


furnished society with a vast range of new correspondence abilities. For instance,
individuals can impart progressively with others in various nations utilizing
innovations, for example, texting, voice over IP (VoIP), and video-conferencing.
Interpersonal interaction sites like Facebook permit clients from everywhere
worldwide to stay in contact and convey consistently.

Present day data and technology advances have made the world a "global
village," in which individuals can speak with others worldwide as though they were
living nearby. Hence, ICT is regularly concentrated with regards to how present day
correspondence innovations influence society.

25
OBJECTIVES/COMPETENCIES:

 Explain why computer literacy is important to success in today‘s world.


 Define the terms, Information Communication Technology, computer, and
describe the relationship between data and information.
 Describe the different computer components: input
devices, output devices, system unit, storage devices,
and communications devices.
 Explain the importance of different type types of
computers.
 Discuss the advantages and disadvantages that users experience when
working with computers.
 Explain the main primary components of the computer and its use.
 Analyze the future impact of computing on humanity.

A pre-test of your computer knowledge…

 Observing the lives in your community, could you describe how computers
affect the lives of the people?
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________

 Could you describe life without any smart device and the Internet?
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
26
Lesson 1.1 - DATA AND INFORMATION

Data as a general concept refers to the fact that some existing information or
knowledge is represented or coded in some form suitable for better usage or
processing. It is a series of observations, measurements, facts, and communication.
Computer data are information that is stored or saved inside a computer or a
computing device.1 There are multiple types of data. Some of the more common
types of data include the following:

• Single character
• Boolean (true or false)
• Text (string)
• Number (integer or floating-point)
• Picture
• Sound
• Video

Data is raw, unorganized facts that need to be processed. Data can be


something simple and seemingly random and useless until it is organized. Each
student's test score is one piece of data.2 When data is processed, organized,
structured, or presented in a given context to make it useful, it is called information.
The average score of a class or the entire school is information that can be derived
from the given data. The word comes from a singular Latin word, datum, which
originally meant "something given." Its first usage dates back to the 1600s. Over time
"data" has become the plural of datum. "Information" is an older word that dates
back to the 1300s and has Old French and Middle English origins. It has always
referred to "the act of informing," usually regarding education, instruction, or other
knowledgecommunication.

Data and Information – Input, Storage (Volatile/Non Volatile), Process, Output


27
Information is something that can be measure quantitatively. In the computing
world, information often means as computer data. The primary unit of computer
information is a bit. One bit of data consists of two values: 1 and 0. All computer data
or information are converted to 1‘s and 0‘s, which can be understood and the
process by any computing devices. A representation of computer information is
shown below:

Information

1 0

“Hello World” 101100011010000111010100011101010010100101000

0011010001010100101010011110000110101011000110100
0011101010001110101001010010101100110000110011110
0111001001100100100010010011100000011111101010101
010100001100101000101000101001000

Representation of computer information in terms of 1‘s and 0‘s.

Information is also organized or classified data, which has some meaningful


values for the receiver. Information is the processed data on which decisions and
actions are based 3.

For the decision to be meaningful, the processed data must qualify for the following
characteristics:

 Timely − Information should be available when required.


 Accuracy − Information should be accurate.
 Completeness − Information should be complete.4

28
Lesson 1.2 - What is Information Communication
Technology (ICT)?
ICT stands for "Information and Communication Technologies." It refers
to technologies that provide access to information through telecommunications 4. It is
similar to Information Technology (IT) but focuses primarily on communication
technologies. ICT includes the Internet, wireless networks, cell phones, and other
communication mediums.

In the past few decades, information and communication technologies have


provided society with a vast array of new communication capabilities. For example,
people can communicate in real-time with others in different countries using
technologies such as instant messaging, voice over IP (VoIP), and video-
conferencing. Social networking websites like Facebook allow users from all over the
world to remain in contact and communicate regularly 6.

Modern information and communication technologies have created a "global


village," in which people can communicate with others across the world as if they
were living next door. For this reason, ICT is often studied in the context of how
modern communication technologies affect society.

Figure: The vastness of Information Communication Technology that affects the


lives of the people7 29
Lesson 1.3 - What is a Computer?

A computer is a machine or device that


performs processes, calculations, and operations
based on instructions provided by a software or
hardware program. It can accept data (input),
process it, and then produce outputs. Computers can
also store data for later uses in storage devices and
retrieve them whenever it is necessary.

Modern computers are electronic devices used for a variety of purposes


ranging from browsing the web, writing documents, editing videos, creating
applications, playing video games, etc.8

Basic Parts of Computer

A PC is comprised of various parts. These parts cooperate to do specific


tasks. These parts are called ―devices,‖ and they are:

1.3.1 - The Input devices;

1.3.2 - The System Unit or Processing device;

1.3.3 - The Output devices;

1.3.4 - The Storage devices.

30
Lesson 1.3.1 - The Input Devices

In a computer system, the input devices are hardware peripherals that are
used for communication between humans and computers. Input devices send signal
to the computer as input to command a computer machine what to do. Some of the
popular input devices are:

 KEYBOARD
The keyboard is one of the many ways to
communicate with a computer. It looks like a
typewriter, has many buttons and are called
―keys‖. You use the keyboard to type letters,
numbers, and symbols to give instructions to the
computer.

 MOUSE
The mouse is another important tool for
communicating with computers. Commonly known as
a pointing device, it lets you point to objects on the
screen, click on them, and move them. The mouse
allows you to control the movement of an on-screen
pointer, and when you move the mouse, the cursor
will also move. You can use the mouse to tell the
computer what to do.

 MICROPHONE
A microphone is a sound-detecting device that can be
attached to a computer. It allows you to input sounds like
speech and songs into the computer. You can record your
voice with the help of a microphone.

31
 WEB CAMERA
A web camera is used to take live photos videos. You can
save them in the computer. All cameras are made of
semiconductor device called CCD, which means, Charged
Coupled Device. It is the sensor that sense images and convert it
to digital signals.

 JOYSTICK
A joystick makes computer games a lot more fun. When it is
moved, it passes information to the computer. Most joysticks are
used in game applications and program simulation of animations.

 SCANNER
A Scanner scans and copies pictures and pages, and
turns them into images that can be saved on a computer. It is
often part of a printer and one of the features of it. Scanners
are like Xerox machines that can directly duplicate text and
images.

Things to explore…

 Do you wonder how those input devices operate?


 Could you try to open any input devices (e.g. mouse, keyboard, & joystick)
and identify its internal electronics parts?
 Could you do a research work and document what sensors are used in the
different input devices that humans used to communicate to a computer?
32
Lesson 1.3.2 - The System Unit or Processing Device

The System Unit or Processing device is the metal and plastic box that
contains the main components of the computer, including the motherboard,
memories, central processing unit (CPU), on/off button, and power supply. When you
think, you use your brain. In the same manner; system unit has the CPU as the main
brain of the processing device. It tells the other parts of the computer what to do. It is
the controlling part of a computer that controls all the input and out peripheral
devices.

A system unit and its basic components. Figure courtesy of


sites.google.com/ComputerSavvy.

Lesson 1.3.3 - The Output Devices

An output device is a part of a complete computer hardware that receives


data and signals from a system unit and then translates that data into another form.
That form as output may also be data or signals like audio, video, character texts, or
paper hard copy printed as document. The difference between an output device and
an input device is that an input device sends data into the computer, whereas an
output device receives data and signals from the system unit. Some examples are:

33
 MONITOR
The monitor works with a video card, located
inside the computer case, to display images and text on
the screen. Most monitors have control buttons that
allow you to change your monitor's display settings, and
some monitors also have built-in speakers. The monitor is
like a window or a rectangular screen that are made of special
semiconductors that light when a signal is triggered by the system unit. Inside
the screen are texts and graphics that perform interaction between human
and the computer.

 PRINTER
A printer prints the results of your work from the
computer screen on a sheet of paper. This is called a
printout. It takes data from the system unit and output
those data as printed document. Those printed
documents are composed of texts and images.

 SPEAKERS/HEADPHONES
The speakers and headphones are the output
devices that produce different types of sounds processed
by the computer. Speakers are made of electrical
components called transducers that convert electrical
signal from the processing unit to audible signals. You
can listen to songs or speeches stored in the computer
with the help of speakers.

A wonder of electronics to explore…


 Could you do a simple research of how does a printer or a monitor converts
data from a system unit to their corresponding output?

34
Lesson 1.3.4 - The Storage Devices

The storage devices that are used in computers are special devices made of
special materials. Some are made of special mechanical devices that are coupled
with magnetic materials. Many years ago, data was stored in papers and
cardboards. Nowadays, most storage devices are made of special semiconductor
materials using special and advanced physics technology. Both of the mechanical
and semiconductor types of storage materials used these advanced technologies to
store data and digital signals. Below are some of these storage devices.

 HARD DISKS
The hard disk is a part of a computer which is
used for storing data. Storing data devices are called
storage devices. These medium of storage are semi-
magnetic disks that are called platter. They help in
storing any work done on a computer permanently.
Inside the system unit is a hard disk that is made up
of one or more metallic disks. It stores a large
amount of information.

 FLOPPY DISKS
A floppy disk stores small amounts small
amounts of information. It works when it is inserted
into the floppy drive. The floppy drive is fixed in the
system unit. It is also made of magnetic devices
formed in a thin film type disk-shaped inside the disk
cartridge. Currently, floppy disks are not used
anymore because of its small storage capacity.

A little break…

Are you wondering how those little digital molecular bits stored in many storage
devices? You can do a simple research document on those memory technology.
35
 COMPACT DISKS
A Compact Disk or CD stores many times
more information than a floppy disk. It is made
using glass and laser technology. Data are stored
using sophisticated light technology and light
beam aimed into the glass disk by mechanical
precision achieving high data storage capacity. This compact disk works when
it is inserted into the CD drive wherein a laser reader and sensor read the
data impose from the compact disks. The CD drive is fixed in the CPU. Take
note that compact disk is a light sensitive storage device and improper
handling of it may result in the loss of data stored.

 USB FLASH DRIVE


A USB Flash Drive (Universal Serial Bus) is a
portable storage device, small and lightweight enough
to be transported on a keychain or in a pocket. It is
made of a special type of semiconductor device using
advanced semiconductor doping technology. The
average USB flash drive can hold about 2 billion
characters. Flash drive is also called thumb drive.

 RAM or RANDOM ACCESS MEMORY


A RAM (Random Access Memory) is the
internal, physical memory hardware device
installed in the motherboard of the system unit.
This storage device helps the central
processing unit (CPU) in the execution of the operating system (OS),
application programs and other data application. Like the flash drive, RAMs
are made of special semiconductor materials that stores electrical signals as
digital data. Random Access Memory is a volatile memory material meaning
data will be lost if the system‘s power is not present.
36
Lesson 1.3.5 Characteristics of Computer
Below are most of the characteristics of a computer.

 It is an inanimate object.
o It needs outside intervention for it to run.
o It can only do things for which it is intended.

 It is electronic.
o It is made up of electronic circuits.
o It is powered by electricity.

 It is automatic.
o It can set up its internal operations on its own.
o The various functions are executed automatically by way of a stored
computer program.

 It can manipulate data.9


o Following specific rules, it can perform arithmetic functions such as
addition, subtraction, multiplication, division, and other complex
mathematical operations.

 It has a memory.
o It can remember what it has done.
o It can store instructions in its memory and follow these through
unaided.
o It can store a large amount of data in a compact and easily retrievable
form.

 It has logic functions.


o It can perform specific decision instructions automatically.
o It can determine whether a specific statement is true or false.

37
Lesson 1.3.6 - Capabilities and Limitation of Computer
CAPABILITIES

1. Speed. It operates at the speed of electronic flow, measured in billionth and


trillionth of a second.

2. Repetitiveness. It can perform the specified tasks repeatedly.

3. Accuracy. When the machines are programmed correctly, and when input
data is error-free, the accuracy of the output is relatively assured.

4. Decision-making capability/ logical operations. It can decide based on the


data and commands that the users input.

5. Store and retrieve information. It can save and retrieve information for
future use.

6. Ability to check itself. Computers can check their work.

7. Ability to communicate with other users or machines. It can share files


and resources, among other computers.

LIMITATIONS

1. It cannot generate on its own.


2. It cannot correct the wrong instructions.
3. It cannot come up with an original decision.
4. It can only be used to which it is intended.
5. It is subject to physical failure.

38
Lesson 1.4 - ANALOG, DIGITAL, AND HYBRID
COMPUTERS

There are three basic kinds of computers. These kinds are based on the
hardware structure and the way physical quantities are represented in a computer.
The following are the three types.

 Analog
 Digital
 Hybrid

Lesson 1.4.1 - What is an Analog Computer?

An analog computer is a special type of computer, where to use data in


continuous form, not discrete, and a changeable constant stream of data is known as
―Analog Data.‖ Analog PCs can store simple information in steady physical amounts
like electrical potential, liquid weight, or mechanical movement, lastly, it creates the
outcome utilizing measures. Analog PCs are used in such zones, where to require
information to be measure straightforwardly without changing into numbers. Simple
PC utilizes the projects for converting complex equations into an analog circuit.
Analog computers are the first computers being developed and provided the basis
for the development of modern digital computers. Analog computers are widely used
for specific specialized engineering and scientific applications, calculation and
measurement of analog quantities. They are frequently used to control processes
such as those found in an oil refinery where flow and temperature measurements are
essential. They are used, for example, in the papermaking and chemical industry.
Analog computers do not require any storage capability because they measure and
compare quantities in a single operation. The output from an analog computer is
generally in the form of readings on a series of the dial (Speedometer of a car) or a
graph on a strip chart.

39
Lesson 1.4.2 - Different applications of Analog Computers5

 Hybrid Controller
 Simulation of a Spaceship
 Mass-Spring-Damper System
 Simulation of Car-Suspension System
 Vehicle Simulation
 Speedometer
 Telephone lines
 Frequency of Signal and Voltage
 Oscilloscope
 Television
 Analog Sound Processor
 Operational Amplifiers
An Analog type computer
 Mechanical Integrators
 Wheel balancing computer

Lesson 1.4.3 - Types of Analog Computers

1.4.3.1 - Slide Rules


1.4.3.2 - Differential Analysers
1.4.3.3 - Castle Clock
1.4.3.4 - Electronic Analog Computers
1.4.3.5 - Mechanical Analog Computers
1.4.3.6 - Pneumatic Analog Computer
1.4.3.7 - Hydraulic Analog Computer

40
1.4.3.1 - Slide Rules
A Slide Rule is the most straightforward type of analog computer, and this
computer helps to produce an approximate result for simple mathematical
operations. All users slide the hashed rod to line up along with several marking in the
other rod, and it helps to read this equipment depending on the line up of different
kinds of hash marks.

A slide rule that is mostly used in engineering


calculations5

1.4.3.2 - Differential Analysers


Differential Analysers were analog
computers designed to solve for all differential
equations. These computers had a large size
for modern computers because today those
computers fill space like a PC. In the image is
an obsolete differential analyzer that was used
in Calculus.10

1.4.3.3 – Castle Clock


Castle Clock has a better representation of
several uses to mechanical analog computers; Al-
Jarazi developed the castle Clock Analog Computer.
This computer was able to store different programming
commands. Castle Clock computer‘s height was 11
feet, and it takes a round of moon and sun. The

41
computational part of this computer permitted users to set11 variable

length of the day depends on the running season. In the picture above is a sample
castle clock from Dinan, France.

1.4.3.4 - Electronic Analog Computers

The electronic analog computer


was developed in the USA, and initially,
they were used in the different missiles,
airplane layout, and in-flight simulator.
Electronic Analog Computer contains
thousands of vacuum tubes, but further
some time replaced by transistors.
The latest analog computers are designed to use electrical signals flowing through
several resistors and capacitors, instead of mechanical interaction of their
components. The voltage of the signal produces the result in the form of graphic
displays. Mostly, these types of computers are enabled for different computing and
defense technology system.12

1.4.3.5 - Mechanical Analog Computers


Mechanical analog computers are
designed along with different components
such as gears and lever, which do not use
electronic parts. It produces output while
turning of gears, and it can perform
multiplication and division operations.
Examples are – Cosmic Engine, Pascaline,
Stepped Reckoner etc.

42
1.4.3.6 Pneumatic Analog Computer
Pneumatic analog computers use the compressed air in the form of a
power source that is very simple and inherently analog, and these computers are
mostly used in the military and non-residential building areas. Input signal lines were
calculated by the use of controlled air supplied to the inside of the computer, and the
desired output signal in the form of air pressure was achieved through configurations
in the analog box. Most pneumatic analog computer principle today was integrated
into many medical devices like the mechanical and digital ventilators that were used
in almost all hospitals for helping patients with lung problems.

Pneumatic Analog computer box, with schematic diagram, courtesy of


John H. Andresen13 (1971) of the United States Air Force

1.4.3.7 - Hydraulic Analog


Computer
A hydraulic analog computer uses
liquid, mostly oil, to perform
mathematical calculations. The first
analog computer was used to solve
differential equations. It was invented by
Mihalo Petrovic Alas14 (1892), a member
of the Serbian Royal Academy of
Sciences, and was a professor of
Theoretical Mathematics and Physics at
Belgrade. The MONIAC15 (based on
Alas‘ works), also known as the Phillips
Hydraulic Computer and the Finance
phalograph, was created in 1949 by the
New Zealand economist Bill Phillips to model the national economic processes of the United
Kingdom, while Phillips was a student at the London School of Economics .

43
Lesson 1.4.4 Comparison Between Analog and Digital Computer17

Analog Computer Digital Computer


 It displays data continuously form.  It displays data in discretely form
such as ―0‖ and ―1‖.
 Its measurement unit is physical  It transforms all data into binary
values like temperature and form (0 and 1), and then it
pressure. executes all operations on them.
 Its signal‘s type is an  Its signal‘s type is a sequence of
electromagnetic wave. voltage pulses.
 The transmission of analog signal  Its transmission is done with the
works as without its content. content of the signal.
 It does not contain its memory unit  It contains a memory unit for
and computing terminals. storing the result.
 No having input/output devices  Having input/output devices
 It enables physical devices to  It produces the text or visual output
determine the continuously variable along with high accuracy. For
data. For example – The example – monitor and printer.
thermometer
 Examples are – Speedometer,  Examples are – All Personal
telephone lines, Astrolabe, Computers like IBM PC, HP PC,
Oscilloscope DELL PC, and more.
 Applications are – Determine of  Applications are – Home Usage,
several physical quantities and other small or large scale business,
scientific operations. and other personal usages.
 Components are resistors and  Components are logic gates,
capacitors. processors, and toggle switches.
 Lack of abilities in all areas to digital  It can emulate all behavior of
computer analog computers.
 Slow speed  Faster to Analog computer
 Need technical staff to operate it.  No need for qualified staff to
operate it.
 Need a low level of electrical noise  No effect of electrical noise in the
in the circuit to get accuracy. igital computer

44
Lesson 1.5 - Types of Computers by Classifications
There are four types of computers with their classification, such as:
• 1.5.1 - By Size and Capacity
• 1.5.2 - By Operating System Capabilities
• 1.5.3 - Based on Number of Microprocessors
• 1.5.4 - Based on the Number of Users

1.5.1 - By Size and Capacity


Super Computer
In the old days, large enterprises and organizations used the supercomputer
because they required large-scale computing power. A supercomputer is
architectural and operational depend on parallel and grid processing because, with
the help of thousands of processors, all processes are executed simultaneously.
Supercomputer mostly implemented in large scale scientific and engineering
areas, because where required maintenance for a large amount of database.
Some examples are:
 Titan
 Sequoia
 K Computer
 Mira
 JUQUEEN
 Super MUC

Functions are:
A supercomputer, courtesy of Microsoft Corporation
 Industrial function
 Space exploration
 Weather forecasting
 Nuclear testing

45
Mainframe Computer

Mainframe computer uses primary


memory such as (RAM) and multiple
processors. It serves as a central processing
unit for all workstations and terminals points
associated with it. A mainframe computer was
designed to be used to process large amounts
of data in pet bytes. It able controls thousands
of users at one time. Mainframe ‗means a
A Mainframe for banking application, courtesy
frame to hold multiple processors and main of IBM

memory.

Some examples are:


 Banking
 Government
 Education system
Functions are:
 Government data processing
 Banking
 Insurance
Mini Computer
The minicomputer is introduced in
the mid-1960. This type of computer is a
small size compared to a supercomputer
and mainframe computer. In which had
been used the different technologies such
as transistors and core memory. ―Digital
Equipment Corporation‖ was made the
first minicomputer with the US $161000.In
this computer also, multiple persons can
A desktop minicomputer, courtesy of IBM
work at a time without waiting.

46
Some examples of minicomputers are:
 Tablet PC
 Desktop minicomputer

Functions are:
 Process monitoring
 Data acquisition
 Feedback Control

Micro Computer
The microcomputer is small in size. You can say it equivalent to personal
computers. Microcomputers use different technologies like CPU (one single chip),
Microprocessor, Input/output devices, and other storage parts. This is a multi-User
computer that is a significant advantage.

Some examples are:


 PDA
 PC
 Smartphone
 Notebooks
Functions are:
 Application processing
A microcomputer for education purposes,
 Education courtesy of GPD Computer Corporation
 Amusement

47
Embedded Computer

An embedded computer is a microcontroller technology-based system, and this has


been designed for a specific task. An embedded computer does not need more
power for massive computing. These computers can support some devices.

Examples are:

 DVD Player/Recorder
 Medical Equipment
 Printer
 Fax Machines
 Washing Machine
 Industrial Equipment An embedded computer for Industrial Control systems
 Home Automation

1.5.2 - By Operating System Capabilities

An operating system is the most critical software that runs on a computer. It


manages the computer's memory and processes, as well as all of its software and
hardware. It also allows you to communicate with the computer without knowing how
to speak the computer's language. Without an operating system, a computer is
useless.18

Your computer's operating system (OS) manages all of the software and
hardware on the computer. Several different computer programs are running
simultaneously, and they all need to access your computer's central processing unit
(CPU), memory, and storage. The operating system coordinates all of this to make
sure each program gets what it needs.

Example of Operating Systems

Operating systems usually come pre-loaded on any computer you buy. Most
people use the operating system that comes with their computer, but it's possible to

48
upgrade or even change operating systems. The most common operating systems
for personal computers are Microsoft Windows, macOS, Unix, and Linux.

Modern operating systems use a graphical user interface, or GUI (pronounced


gooey). A GUI lets you use your mouse to click icons, buttons, and menus, and
everything is displayed on the screen using a combination of graphics and text. 12a

Microsoft Windows

Microsoft created the Windows operating system in the mid-1980s. There


have been many different versions of Windows, but the most recent ones are
Windows 10 (released in 2015), Windows 8 (2012), Windows 7 (2009), and Windows
Vista (2007). Windows comes pre-loaded on most new PCs, which helps to make it
the most popular operating system in the world.

Microsoft Windows operating system, courtesy of Microsoft Corporation

macOS

macOS (previously called OS X) is a line of operating systems created by


Apple Corporation. It comes preloaded on all Macintosh computers or Macs. Some
of the specific versions include Mojave (released in 2018), High Sierra (2017), and
Sierra (2016).

49
According to StatCounter
Global Stats, macOS users
account for less than 10% of
global operating systems—much
lower than the percentage of
Windows users (more than
80%). One reason for this is that
Apple computers tend to be
more expensive. However, many
people do prefer the look and
feel of macOS over Windows.
Apple‘s macOS operating system, courtesy
of Apple Corporation
Linux

Linux (pronounced LINN-UX) is a family of open-source operating systems,


which means they can be modified and distributed by anyone around the world.
Linux is different from proprietary software like Windows, which can only be modified
by the company that owns it. The advantages of Linux are that it is free, and there
are many different distributions—or versions—you can choose from.

According to StatCounter Global Stats, Linux users account for less than 2%
of global operating systems. However, most servers run Linux because it's relatively
easy to customize.19

Linux, an open source operating system created by Linus Torvalds


50
Linux has many distributions today, and some are Ubuntu, Fedora, Linux
Mint, OpenSUSE, PCLinuxOS, Debian, Mandriva, Red Hat, Kali, Sabayon/Gentoo,
etc. They have the entire common core Linux, but the difference is in their different
capabilities and usage applications.

1.5.3 - By Based on Number of Microprocessors

1. Sequential Computers:
The sequential computing is traditional architecture. In this model, all
instructions are performed one by one, so the speed of this computing is slow
compare to parallel computing.

2. Parallel Computers:
Parallel computing is an imaging type of model in which many processors or
applications execute simultaneously. In parallel computing splits the overload
work into more than one processor and computation simultaneously.

Classification of Parallel Computing:


 Bit-level parallelism
 Instruction-level parallelism (ILP)
 Data Parallelism
 Task Parallelism

1.5.4 - By Based on Number of Users

1. Single User
In this model, only one user can perform a task at a time.

2. Multi-User
In this model, only multiple users can perform tasks at a time.

51
3. Network Types
In this model, which has unique functionality, the connection between computers
and other terminals is connected with the local area network.

Lesson 1.6 -APPLICATIONS OF ICT

Information and communication technologies are becoming tangled with our


everyday lives in the industry, the service sector, transport, logistics, health care,
housing, education, and our leisure time, almost without discerning it.

As human beings, we are always attached to a lot of essential things in our


life. Jobs, education, retailing, and banking these are the compulsory things in our
life. It was tough to get in touch with these before technology changed our life and
made it easier for us.14a It has contributed a lot to exchange our experience from
writing a letter which could take one month to arrive in the receiver, to writing an e-
mail which can be received by the receiver in just one minute, from going to the shop
to choose and buy things to select and buy using E-commerce and no one even
needs to go to the shop to collect their goods. Sticking with the book for the whole
day can be very amusing for the students. Thanks to IT, this introduced us to an
innovative way of studying. Some of the topics are described in more detail below,
which are changed because of IT.

Some of the applications of ICT are:

 Education  Government  Product Development


 Agriculture  Industry  Games
 Healthcare  Entertainment  Tourism
 Manufacturing  Military  Medicine
 Telecommunications  Politics  Aeronautics
 Communication  Religion  Logistics
 Business  Banking  Foods

52
 Everyday life  Transport  Engineering

1.6.1 Selected Applications of ICT20


Jobs
Information and technology have
helped a lot in the field of jobs. IT industry
introduced some unique and rare jobs
which weren't very popular even in late
1980. This field has appeared as a solution
to increase the number of employments
and reduce the number of unemployment in
our society. The IT industry created a lot of
job facilities for people who have skills in IT. It has created jobs like- Web developer,
IT network administrator, computer game designer, IT technicians, etc. The IT
industry also helped many people to become successful self-employer. For example-
Steve Jobs, who was the founder of Apple Inc. along with Ronald Wayne. Bill Gates
is the founder of ―Microsoft.‖ Mark Zuckerberg, the founder of the famous social
networking site, ―Facebook.‖ This is also helpful because they have also employed
people in their own company, which is also part of the IT industry.
It has not only created jobs for many people, but it has also taken away many
positions in society. For example- nowadays, people like to buy their products online,
which has led to a reduction in floor jobs. For instance- Comet has gone into
administration because it can‘t cope with online competition from other online
shopping like Amazon and eBay.

Education
Technology helped us in our
education as well. This has introduced the
most comfortable way of learning and
teaching for both students and teachers. It
has also introduced us to know about

53
modern discoveries and even historical things as well. We can use the internet
everywhere in different books, and again we can watch videos on the internet to get
more ideas about the topic that we want to research on.
Nowadays, we use a projector in our school and other educational fields to
discuss the work with the whole class.
We can also get ideas by reading blogs about different things and also
discuss each other‘s views about some topics that are related to education using
blogs. We can again ask a question from our teacher using emails while we are at
home, which could be very important, especially before the exam day and we can
also research on the internet, and we don't have to look at the books and find the
right page. This saves a lot of time for the students. We can also take help from our
friends to learn in a collaborative environment.
Although there are some advantages of using IT in our education, it also has
some disadvantages as well. Nowadays, people rely on the Internet too much that
they believe in everything that is written on the web page. It has also taken jobs from
the library because most of the people rely on the internet library because they can
buy their favorite books on the internet. So libraries are shutting down because
people depend on the Internet library.

Money and Banking

IT has also shown its valuable points on


money and banking, which helped us a lot to buy
necessary things using E-commerce, which
includes online shopping, online selling, etc. It
also helped a lot of companies to deal with other
companies. We can use online money and
banking service 24/7 hours a day. This means
people can use this benefit whenever they want
from any part of the world. We can also go to
different countries and use our same banking
account to make money or put money in our store. This is possible because of the

54
WAN (Wide area Network.) We can also get a monthly statement using the internet,
so we can compare our information every month and make our plan for the
upcoming months. Money transfer for another country through banking will be a
simple task. IT has also introduced us to an Eco-friendly world by using fewer papers

for money and banking. All the information can be stored on our computer, and we
don't have to worry about losing important documents.
We sometimes face significant problems using IT in Money and banking.
Many people make malicious software that is used to hack other information on the
computer. So when someone stores their bank information on their computer, those
hackers steal their data and use it for their gain. Sometimes it can happen to any
company, and as a result, they can lose all of their consumers' data. Phishing is
another method used by those people to hack information using the internet. The
company also needs to hire a lot of staff who have IT skills, which means a lot of
resources need to be spent on staff and computers to store customers‘ information.

Business
Communication is an essential
technique that is used to make a business
very famous. In earlier days, people used
to communicate differently. They had to
go to everyone's house to promote their
products, which could take a long time to
promote their work. They sometimes used
to take a long journey so that they can
deal with someone, and they can expand their business. Since technology has
arrived, people still using the technique, which is communication, but they have
changed the method of promoting their products or dealing with someone who is far
from one another. Instead of going to everyone's house separately, people are
making an advertisement, which not involves one area or a country but the whole
world and we can also use IT to communicate someone who too far from each other.

55
We can use the e-mailing method to learn more about our customers. They can
again frequently ask us some questions related to our business.
But sometimes we can't rely heavily on writing e-mails because we can't
sometimes share what we are feeling or what we are want to ask. So it becomes
very compulsory for us to have face to face communication with them. This is when
we exploit IT in our life. Video conferencing assembled us via the internet. We can
use this technique to communicate with someone face to face, and we can use this
benefit for meeting or if we are trying to work together with other companies which
can be situated in other countries.
Information Technology also has some adverse effects on Business. We rely
too much on technology, and so we always put whatever we do on our computers.
So it increases the cost of a company as the company needs to use LAN and WAN
to expand its businesses. Our servers can also crash or get damaged, and it can
cost millions of pounds for the company to repair. The chance of losing the whole
companies files are random as well. It can sometimes make it easier for hackers to
break the firewall of the company and use it for their purposes. So the company
needs an extra employer, which is a network administrator who deals with these
things and therefore, the company has to pay him as well.

Health
When we get sick, we don't want to
go to many places other than home. But
from home going for a consultation to a
doctor, we need to move physically.
Taking an appointment, talking to the
receptionist, describing the problem we
have, and then waiting for it increases our
illness. This is when IT comes to helping us. Nowadays, we don't need to go to the
doctor's and describe our problems; we can use the Internet to contact our doctor.
We can use also use IT to do face to face communication with our doctor even
though we are at home. We can again frequently ask a question to our doctors, and
they can also answer us using E-mails.

56
Making an appointment is not necessary to contact our doctors, and we can
get our prescriptions at whatever point we need. We can likewise utilize this office to
find out about our ailment and how to fix ourselves. We can look on the web to
explore about the illness and the medication we need to use to show signs of
improvement. It can benefit students who are studying to become doctors and who
like to know more about different kinds of medicines.
IT provides us with a lot of advantages. But it also has some disadvantages. If
someone uses a computer for a long time, then they can get a headache, it can also
cause neck pain, can make them nothing apart from sitting in front of the computer.
Some teenagers also put too much time on their games instead of studying or taking
part in different physical activities. Some people even get stretch if they get bullied
on the internet, which may stop them from going outside, and they sometimes feel
scared to talk to anybody.

Crime and Policing


IT has introduced a lot of
things that prevent people from
committing a crime. CCTV camera,
GPRS system, using a database
for finding criminals' information is
not an ordinary thing, which is not
impossible without the blessing of
IT. In ordinary days police use
GPRS to track someone's car, mobile phone if it has been stolen. Authority uses a
CCTV camera to detect criminals' faces. A fingerprint is another particular method
with which the police can identify the thieves. This is making our lives safer and very
easy in many ways. For example- big supermarkets like ASDA or Tesco don't need
to think about too much if someone tries to still their products, because some
products have got chips which can be detected if that product isn't swiped over the
bar code reader. They can also use CCTV cameras to help them protecting their
products.

57
The main disadvantage created by the technology system is that anyone who
knows how to make a program, they can hack others device using viruses, Phishing,
and also Malicious software. They can be very threatening because they can take
your information, which can be very confidential for you. I.e., Your bank card.
Sometimes people also delete other files to annoy people, which can lead someone
to lose their essential work as well.

Retailing
IT has impacted on Retailing, and we
are immensely enjoying the benefit of using IT
on Retailing. We are using IT on Retailing,
which helps us to buy anything 24/7 every
day. We can use this facility to choose
whatever we want at any time we want. We
can select a range of items on the internet,
and we don't even have to go to a place to
choose whatever we want. We can also
reserve the items on the internet. We can pay for the items on the internet with a
safe internet payment option, which is PayPal. We can also choose products from
different countries on the internet and buy them using the advantage of IT. IT also
helped companies to make more money and spend less on their business. The
company does not need to hire more staff for the company.
Although it has some advantages in retailing, there is some disadvantage as
well. It can sometimes become very discouraging for small shops as they can't
compete with big supermarkets like Tesco, which has both online shopping and
average shopping facility for the consumers. So they have to close their shops.
Sometimes the customers can't get their necessary staff when they needed because
of the late delivery.

58
Let us reflect…
Most people who appreciate ICT wonder in the power of it and how it is useful
and helpful. Also, insights have given to you that through ICT, the work on the job
field can be done more effectively.
As a student, how can you develop your knowledge base on the basics of
computing? Can you measure the fundamental effect of Information Communication
Technology for your future?

How much have you learned?


POST-TEST FOR LESSON 1

Name: __________________________________ Date: ____________________


Course & Section: ________________________ Result: __________________

Direction: Answer the following:

A. Differentiate data from information:

B. Discuss the characteristics, capabilities and limitations of computer.

59
60
C. What are the different types of computers? Discuss each.

D. What is ICT?

E. What are the importance and applications of ICT in our daily living?

61
Lesson 1 Final Requirements:

Write a research article (not less than 500 words) on the following topics that
will be submitted in a week time.

 Memory Technology of the Modern Day Memory Devices


 Importance of ICT as a Student, Your Vision Five Years from Now

Suggested Readings:

 Books/Journals:
o Complete ICT for Cambridge IGCSE® Second edition, Complete ICT
for Cambridge IGCSE
o INFORMATION COMMUNICATION TECHNOLOGY (ICT) [Concepts
and Application], Yekini Nureni (2014).A Journal at Researchgate.net
o Introduction to Information and Communication Technology in
Education. (Moursund, 2015)
o Computers Made Easy, From Dummy To Geek by James Bernstein,
2018
o Scientific Research in Information Systems-A Beginner's Guide by Jan
Recker (2012)

 Websites:
o TechCrunch.com
o TheNextWeb.com
o Wired.com
o Tech2.com
o Gizmodo.com
o Mashable.com
o TheVerge.com
o DigitalTrends.com
o TechRadar.com

62
REFERENCES

1 – ―Data - A Definition from Hyperleap‖, (2019). Retrieved from


https://hyperleap.com/topic/Data

2 – ―Data vs. Information‖ - Difference and Comparison, Diffen.com Diffen LLC n. d.


Feb 2016. Retrieved from https://www.diffen.com/difference/Data_vs_Information

3- ―Computer- Data and Information‖. TutorialPoint 2020. Retrived from


https://www.tutorialspoint.com/computer_fundamentals/computer_data.htm

4 – ―Computer – Data and Information‖ IndiaQuizzes, 2020. Retrieved .. from


https://www.indiaquizzes.com/computer-data-and-information/

5 – ―Internet Terms: ICT Definition‖ TechTerms, 2020. Retrieved from


https://techterms.com/definition/ict

6 – “INFORMATION (ICT)‖ – HamiTech Computer Centre, 2020. Retrieved from


https://www.hamitechcomputers.com/ict/

7 – ―Clip Force Video and Animation‖ ClipForce 2020, Image retrieved from
http://www.clipforce.nl/wp-content/uploads/2018/09/ICT-en-online-video.jpg

8 – ―Definition - What does Computer mean?‖ Techopedia, 2020. Retrieved from


https://www.techopedia.com/definition/4607/computer

9 – ―Notes Guide Book: Describe some of the characteristics of Computer‖. Retrived


from https://notesguidebook.blogspot.com/2015/02/describe-some-of-characteristics-
of.html

10- ―What is a Slide Ruile? Retrieved from: https://sliderulemuseum.com/


SR_Class/Figure0_SR_Parts_med.html

11 –―Castle Clock‖ Retrived from www.upload.wikimedia.org/wikipedia/commons


/thumb/7/70/ADC_301_from_ Air_Data_Inc..jpg/800px-301_from_Air_Data_Inc..jpg

63
12 – ―What is Analog Computer: Definition, Examples, Types‖ Lesson part retrieved
from http://digitalthinkerhelp.com/what-is-analog-computer-definition-and-its-
examples/. Image retrieved from https://cdn.arstechnica.net/wp-content/uploads
/2015/04/VCSE-1.jpg;

13 – ―Pneumatic Computer Box‖ Image courtesy of www.wikimedia.org/wikipedia/


commons/thumb/9/9b/De-Te-We-mp3h0651.jpg

15 – ―Hydraulic Analog Computer ― Retrieved from Ihttps://www.brepolsonline.net/


doi/pdf/10.1484/J.ARIHS.5.101843

16- ―The MONIAC (based on Alas‘ works), also known as the Phillips Hydraulic
Computer‖. Retrieved from https://en.wikipedia.org/wiki/MONIAC.htm

17 – ―What is Analog Computer: Definition, Examples, Types and Comparisons‖


Retrieved from http://digitalthinkerhelp.com/what-is-analog-computer-definition-and-
its-examples/

18 – ―What is an Operationg System?‖. Retrieved from https://edu.gcfglobal.org/en/


computerbasics/understanding-operating-systems/1/

19 – ―Understanding Operating Systems Tutorial at GCFLearnFree.‖ Retrieved from


http://www.just.edu.jo/~cis99/Computer%20Basics(CH01)/ls07/ls07.html

20 – ―Some Selected Application of ICT-Impact of ICT in our daily life‖. Retrieved


from https://impactofictinourdailylife.blogspot.com/

64
Lesson 2: Basic operations and Components
of a Computer System
Duration: 3 Hours per week (Week 2)

INTRODUCTION

Saying that PCs have changed our lives cannot be denied. These machines
have changed how we play out every day by day task. It affects our lives in a great
deal in a way that it runs almost all our needed equipment in our everyday lives. The
different operations and functions of computers are also increasing and becoming
very powerful that many people cannot cope with the operations of a simple
computer. It created and developed many cause and effect events in our society.

In this lesson, those computer components with functions and operations will
be dealt with in a lay manner that can be understood by a user beginning to grasp
the usefulness of the computer. The lesson will also prepare the learner‘s experience
of how does a computer‘s part and component interact with each other.

In the first lesson, data and information were discussed. Those terms will be
dealt with more profoundly, mainly how those are processed by the different
components of a computer system. The various information cycle processes inside a
computer will help the learners understand and grasp the internal operation of a
computer as a foundation for the different interface processes to other devices. The
lesson will give the learner an understanding of the internal communication and
passing of data inside a computer with the manipulation and control of a user. Lastly,
this lesson will prepare the learner of how to program each device, giving the
foundation of the data processing inside the computer.

65
OBJECTIVES/COMPETENCIES:

 Explain the different operations of the components of computer systems.


 Explain the different functions of each components of a computer.
 Elaborate more of the different components of a computer: input devices,
output devices, system unit, storage devices, and communications
devices.
 Analyze the basics of how does each component process data.
 Discuss how does humans interacts with computer and experience its
usefulness.

Pretest for Lesson 2


 Explain in your own words what sensor components are used in the following
devices:
o Input Devices:
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
o Output Devices:
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
o Storage Devices:
________________________________________________________________
________________________________________________________________
________________________________________________________________

66
________________________________________________________________
________________________________________________________________

Lesson 2.1- BASIC OPERATIONS OF COMPUTER


SYSTEMS

The basic operations of a computer system are input, processing, output, and
storage, as illustrated in the figure below:

The 5 Basic Operations of a Computer System 1

1. Inputting
2. Processing
3. Outputting
4. Storing
5. Controlling

67
2.1.1 Inputting
Inputting is an essential operation of a computer system. This is the act of
feeding in the data and instruction to the computer (by computer here, it means the
processing unit).
A computer system consists of different functional units, and the Input Unit
does the operation of Inputting. By inputting, you should understand that it is to send
data and instruction to the computer in the required format. Information and
programs are entered into the computer through Input devices such as the keyboard,
disks, or through other computers via network connections or modems connected to
the Internet.2
The input device also retrieves information off disks. Because Computers
work with bits, there should be some mechanism to make data understandable by
CPU (the process is called encoding). Also, the information produced by the CPU
must be converted to the human-readable form (called decoding). Input Unit devices
take care of encoding.
As it is discussed in Lesson 1, the devices that help you to input data and
instructions are known as Input Devices. Keyboard, Mouse, Light Pen, JoyStick,
Scanners, Microphone, etc. are some examples of input unit devices. The devices
that can send data directly to the CPU or which does not need to encode it before
sending it to CPU are considered Direct Entry Input Devices such as scanners.
Devices such as a keyboard which require encoding data so that it is in the form a
CPU can understand are Indirect Entry Input Devices. 3

2.1.2 Processing Unit

The task of performing calculations and comparisons are known as


processing.
The unit in Computer System that is responsible for processing is ALU
(Arithmetic and Logical Unit). ALU is the place where the actual execution of the
instructions takes place during the processing operations. All calculations &
comparisons are made in the ALU. The data and instructions stored in the primary

68
storage are transferred to it as when required. ALU may produce Intermediate
results and keep it in the memory, which is also moved back to the ALU for the final

processing. After completion of processing, the final results are sent to storage units
from ALU.4

2.1.3 Outputting

This unit takes care of receiving processed information from the processing
unit and presents it to the user in a suitable form.

A computer produces results in binary form, and the output unit does
decoding to make it usable to the users. The devices that can output information
from a computer are known as output unit devices. Monitors, Speakers, Projectors
are soft output devices, whereas printers, plotters produce hard copy output. Soft
copy output is something that is temporary or is available only as long as the output
device is turned on. Contrary to these are hard copy output, which is permanent. The
printout in a paper is not lost because the printer is turned off! 4

2.1.4 Storing

Before the actual processing start, data & instructions entered to the computer
must be stored somewhere inside the computer. Similarly, results produced by the
computer are required to be held before it is passed to the output unit. The
intermediate product made by the computer must also be stored for further
processing. Thus the importance of storage units in a computer system is vital.
Based on whether the storage device is inside the main machine or not, it can
be internal or external storage. Similarly, looking at whether the storage device
works close with CPU or works as backup media, they can be primary storage or
secondary storage. Primary storage is also called primary memory. Secondary

69
storage is known by other names such as backup storage or secondary memory. 1
For storage purposes, a computer system may have different devices such as
registers, cache, RAM/ROM, flash, magnetic disks, optical disks, etc.

2.1.5 Controlling

ALU dose does not know what should be done with the data; likewise, the
output unit does not know when the result should be displayed. By selecting,
interning, and seeing to the execution of the program, the CU can maintain order and
direct the operations of the entire system. CU doesn't perform any actual processing
on data, yet it is known as a central nervous system for the comforts of the
computer. It manages and coordinates the entire system. 1b I hope this discussion
helps you and makes you select the correct answers in your exam. The following
questions are probable from this topic.

Lesson 2.2 - Data Processing Cycle

2.2.1 Data Processing Cycle5

The data processing cycle, as the term


suggests a sequence of steps or operations for
processing data, i.e., processing raw data to
the usable form. Several data processing
methods can do the processing of data. This
essential operation of a computer system is
also known as data processing, manipulating
data into a more useful form. Data processing
includes not only numerical calculations but also processes such as the classification
of data and the transmission of data from one place to another. 7 This processing
involves the following:

70
 Data Collection
Data collection is a stage of gathering data from the environment and
preparing it for input. The collection process is the first step that provides the
data. Collecting data is hard work on its own, but it is the most essential on
which the results depend. The quality of input will determine the quality of
output. This data collection can be done in various ways by primary or
secondary sources. This data might include census data, GDP or other
monetary figures, data about several industries, the profit of a company, etc.
Depending upon the data requirement, its source must be identified from
which data will be collected.

 Input
This is the feeding of raw and filtered data for processing. If the inputs
are not given correctly or entered wrong, the output will be directly affected.
This is because the product observes the standard of "Garbage in – garbage
out." Utmost consideration ought to be taken to give the right information.

 Processing
Processing is the step where data is processed by electronic data
processing, mechanical processing, or automated means. The processed
data is one who gives information to the user and can be put to use. The raw
data cannot be understood and thus needs processing, which is done in this
step.1d Processing of data may take time depending on processing power, the
complexity of the data, computer systems, and the volume of input data. The
step of preparation mentioned above helps in making this process faster.

 Output
This is the step where data is processed by electronic data processing,
mechanical processing, or automated means. The processed data is one who
gives information to the user and can be put to use. The raw data cannot be
understood and thus needs processing, which is done in this step. Processing
of data may take time depending on processing power, the complexity of the

71
data, computer systems, and the volume of input data. The step of
preparation mentioned above helps in making this process faster.

 Storage
The output data may be stored on a disk or permanent memory media
for future reference or use.

2.2.2 Some Basic Definitions in Data Processing

 Source Document - The paper or document on which data is recorded when


collected is called a source document.
 Data capture - is the stage of entering the collected data into a data
processing system such as a computer or calculator.
 Encoding - means converting data into a form that is easier to input into a
data processing system.
 Decoding – means converting encoded data into a form that is easier to
understand by people.
 Data transmission - is the stage of sending input data to the processor and
carrying it across its various components.
 Data communication - is the set of activities that allow data to be sent from
one data-processing system to another.
 Turnaround document - is a document that contains the results of one
processing activity, has more data added to it, and is used as input for
another processing activity is called a turnaround document.

Lesson 2.3 - Basic Components of Computer Systems

A computer system is consists of four major components:


 Hardware
 Software
 Peopleware
 Dataware

72
 Hardware
It is the physical or tangible parts of the computer. Computer hardware is
classified as follows:
1. Input devices – allow the user to input data/facts into the computer in
a form that the computer understands. An input device also allows the
system to command the computer through text or graphical user
interface. The keyboard is a standard input device. Other input devices
include a mouse, scanner, microphone, touch screen, webcam,
barcode reader, joystick, and trackball.

Examples of input devices of a computer system. Retrieved from


www.examplesof.net 7

2. Processing and memory devices – acts as the computer‘s brain.


They are typically housed together in a single unit called the system
board. The central processing unit or CPU is the electronic circuitry
that manipulates data to produce information. Some of the
components in the CPU include ALU (arithmetic and logic unit), CU
(control unit), and the memory. There are two types of memory; the
ROM (read-only memory) and RAM (random access memory). ROM

73
stores data permanently, while RAM is volatile for its store data

The motherboard with the processing device, Central Processing Unit (CPU), and with
RAM, random access memory device.9

temporarily. RAM (Random Access Memory) is an internal memory


device that temporarily holds data and instructions while processing is
happening. If the CPU is the ―brain‖ of the computer, then RAM is the
―working memory‖ or "thinking memory" used to store data just for the
programs and applications being used at that time. 8

3. Secondary storage devices – these are the devices outside the system
board that allows data and programs to be stored. These are storage
devices that operate alongside the computer‘s primary storage, RAM, and
cache memory. Secondary storage is for any amount of data, from a few
megabytes to petabytes. These devices store almost all types of programs
and applications. This can consist of items like the operating system,
device drivers, applications, and user data. For example, internal
secondary storage devices include the hard disk drive, the tape disk drive,
and compact disk drive. Secondary storage typically backs up primary
74
Examples of secondary storage devices, courtesy of slideshare.net 8

storage through data replication or other data backup methods. This


replication or data backup process ensures there is a second copy of the
data. Examples are floppy disks, hard disks, CDs, flash drive, and
magnetic tapes.7

4. Output devices – converts information that has been processed by the


computer into a form that the user can understand. The monitor is the most
common output device. Printers, speakers, headphones, projectors, and
plotters are some of its examples. As we have studied in lesson 1, output
devices are those devices communicate to humans for the status of the
different programs in the computer systems.

75
5. Communication devices – these are used to communicate with another
computer via telephone lines or radio links. USB network adapter and
network card, sometimes called Ethernet card, are examples of its device.

Communication devices, courtesy of Google free images.

Chipset as Hardware Part


Chipset and expansion slots are built-in
communication devices and ports inside a
motherboard. The expansion slots are connectors
and adapters for video cards, internal network
cards, sound cards, hard disk drives, and other
peripherals.In a computer system, a chipset is a
set of electronic components in an integrated
circuit known as a "Data Flow Management Output devices, image retrieved
System" that manages the data flow between the from www.examplesof.net9

processor, memory, and peripherals. It is usually


found on the motherboard. The northbridge is generally paired with a southbridge,
also known as I/O controller hub. In systems where they are included, these two
chips manage communications between the CPU and other parts of the motherboard
and constitute the core logic chipset of the PC motherboard.

76
The figures above show the chipset of a computer categorize as North and South
bridge. Courtesy of Google Free Images.

77
An almost complete hardware system:

78
 Software
Software – it is the collection of related programs that contain the step-by-step
instructions telling the computer how to perform a task. There are two major
types of software. These are:

 Application Software – it refers to a set of programs designed to help the


user to perform a particular type of work. It is generally distinguished from
system software because it deals more with data processing applied in
business, education, science, and other tasks. Application Software, also
called a software application or an application, consists of programs that
perform specific tasks for users. Application software is used for a variety
of reasons:
o As a productivity/business tool
o To assist with graphics and multimedia projects
o To support household activities, for personal business, or education
o To facilitate communications

Examples of software used as applications are Microsoft Office, Adobe


Photoshop, Google Earth, Facebook, etc.

79
 System software – this software manages the computer hardware and
works with the other software. It is computer software designed to operate
the computer hardware and to provide a platform for running application
software. The system software also provides services to computer users
and application programs.10 Examples of system software are operating
system, device driver and utility programs, DOS (Disk Operating System),
Windows, Unix, Linux, Novell Netware, Android, etc.

Difference between System Software and Application Software:11

80
Difference between System Software and Application Software:

System Software Application Software


The system software is used for Application software is used by the
operating computer hardware. user to perform a specific task.
The system software is installed on Applications software is installed
the computer when the operating according to the user‘s
system is installed. requirements.
In general, the user does not In general, the user interacts with
interact with system software application software.
because it works in the
background.
System software can run Application software can‘t run
independently. It provides a independently. They can‘t run
platform for running application without the presence of system
software. software.
Some examples of system Some examples of application
software are the compiler, software are a word processor, web
assembler, debugger, driver, etc. browser, media player, etc.

 Peopleware – these are personnel involved in the computer system.


Examples are computer programmers, computer engineers, software designers,
system analysts, server administrators, computer technicians, network
administrators, etc.

 Dataware - is an extensive
collection of computer data used to
help an organization make decisions.
It also consists of all the data needed
in data processing. Dataware is
synonymous with a data warehouse.

81
Let us reflect…
The lesson Different Operations and Components of Computer Systems is
one of the foundations of the computer world. It is important to grasp that knowledge
in order to master the future intellectual dimension of computing especially in the
programming skillset aspect of the student and the different underlying technologies
of those different components of the computer system.
As a student, how do you view the aspect above in reference to the hardware
dimension of the computer? As a future IT expert, how does the lesson drives you to
establish your sense of specialty in the area of hardware or software? Reflect on
that, document that experience, because it will help you to stand on your ground in
the world of computing.

How much have you learned?


POST-TEST FOR LESSON 2

Name:__________________________________________ Score:_________
Course/Year/Section:______________________________ Date:__________
Professor/Instructor:_______________________________

Direction: Select the best answer from the choices by writing the letters on the
blank before the questions.

_____1. Which of the following function is not performed by computers?


a. Calculate data b. Compare data c. Analyze data d. Output data

_____2. Which of the following is a soft output device?


a. Microphone b. Plotters c. Projectors d.Card Punchers

_____3. Identify the direct entry input device:


a. Keyboard b. Mouse c. OMR d. All of above

82
_____4. Which of the following unit does encoding?
a. Input Unit b. ALU c. CU d. Output Unit

_____5. The actual execution of instructions takes place in


a. Arithmetic Logical Unit b. Control Unit c. Memory d. Output Unit

_____6. The storage unit holds:


a. data to be processed b. intermediate result c. both of the above
d. none of the above

_____7. The fastest and most close storage device to CPU is


a. Flash Memory b. RAM/ROM c. Registers d. Cache

_____8. After completion of processing, the final results are sent to the ___ before it
goes to the output device.
a. Monitor b. Printer c. Storage d. ALU

_____9. Which of the following is not an input unit device


a. Microphone b. OCR c. Projector d. Touch Screen

_____10. The unit that manages and coordinates the whole system is
a. Input Unit b. CPU c. ALU d. CU

Complete each statement by writing the answer in each blank.

1. The basic ___________ of a computer system are input, processing, output,


and storage.
2. Data processing includes not only numerical calculations but also operations
such as the _________________ and the transmission of data from one place
to another.
3. Data refer to the collection of raw _______.

83
4. ____________ refers to the data that has been processed into a form that has
meaning and is useful.
5. A _______________ consists of hardware, software, peopleware and
dataware.
6. The ____________________ is the electronic circuitry that manipulates data to
produce information.
7. The Northbridge is usually paired with a Southbridge, also known as
______________.
8. The ____________ manages the computer hardware and works with the other
software.
9. Even the most powerful supercomputers require _________ interactions.
10. ______________ consists of all the data needed in the data processing.

Lesson 2 Final Requirements:


Design a simple input-process-output system in the following system below.
Draw the systems‘ diagram and explain its different operation and components.
 A home basic network printing system that has 5 computers and a common
printer connection for the 5 PCs.
 A basic cybercafé setup of 10 computers plus a common server that will cater
the whole 10 PC‘s internet and common printing services.

Suggested Readings:
 Books and Journals:
o Input and Output Devices by Benjamin David Lunt, 2016 Edition
o Input/Output Technologies: Current Status And Research Needs, the
National Academic Press (2020), pp 71-120
o From Hardware to Software,Input and Output Devices, Graham Lee
(2020). pp 205-216. Springer Link: https://doi.org/10.1007/978-1-349-
16786-9_12
o ―Hardware and Software Technologies‖. Academia.org

84
 Websites:
o ―How Computers Work: Input and Output‖. https://homepage.
cs.uri.edu/faculty/wolfe/book/Readings/Reading06.htm
o Introduction to Information Technology, 2nd Edition by ITL Limited ITL
Education Solutions Limited. https://www.oreilly.com/library/view/
introduction-to-information/9789332525146/xhtml/chapter004.xhtml
o Processing device. https://www.computerhope.com/jargon/p/
procdevi.htm
o https://www.electronicsforu.com/
o ―Automating Input-output Devices‖ https://sensi.emerson.com/en-
us/blog/home-automation-benefits
o ―Automating your Home‖ https://informinc.org/home-devices/how-to-
fully-automate-your-home/
o ―The Input-Ouput Devices‖. https://www.khanacademy.org/ computing/
computer-components/input-output-devices
o https://allaboutbasic.com/2010/12/14/277/
o ―Different Computer Terms and Terminology.‖ https://www.unm.edu/
~tbeach/terms/inputoutput.html

85
References

1 ―Basic Operations of a Computer Systems‖ Retrieved from https://mcqsets.com/s/


fundamentals/basic-operations-of-a-computer/
2- ―A Computer System Consists of Different Functional Units‖. Retrieved from
https://www.coursehero.com/file/p64255h6/A-computer-system-consists-of-different-
functional-units-and-Input-Unit-does/
3- ―Indirect Entry Input Devices‖ Retrieved from https://mcqsets.com/s/fundamentals/
basic-operations-of-a-computer/
4- ―A Computer System Consists of Different Functional Units‖ Retrieved from
https://www.coursehero.com/file/p64255h6/A-computer-system-consists-of-different-
functional-units-and-Input-Unit-does/
5 – ―Data Processing Cycle‖ Retrieved from https://planningtank.com/computer-
applications/data-processing-cycle
6 – ―Concept of Data Processing‖ MBA Knowledge Base. Retrieved from
https://www.mbaknol.com/management-information-systems/concept-of-data-
processing/
7 - https://www.examplesof.net/2018/09/examples-of-output-devices.html
8- ―Processing and Memory Devices. Retrieved from ―https://wikieducator.org/
Computer_Basics/Hardware/Processing_and_ internal_memory_devices.htm
9- ―Output Devices Images‖ Retrieved from https://quintoncheung.files.
wordpress.com/2013/09/intelcorei7.jpg?w=300&h=258
10- ―System Software Examples‖. https://slideplayer.com/slide/6671912/
11- ―Differences Between Application and System Software‖. Retrieved from
https://www.thecrazyprogrammer.com/2016/04/difference-system-software-
application-software.htm

86
Lesson 3: Processing Data: Transforming
Data into Information
Duration: 3 Hours per week (Week 3)

INTRODUCTION

Processing data into information is a marvelous wonder of technology gifted


to man. It centered on conveying information and communicates it to the user for
information usefulness benefiting humanity. It is also focused on relevant data
storage processing to be used for the intended purposes. Some examples are bank
customers‘ identification and profile, company technology profile, academe‘s
instructional materials, etc.
Information today is vast that everything in our life surrounds by it. Some
people say without information, no one survives. It is right in the sense that a lack of
knowledge (information) can destroy or harm man. The other side of the coin,
controlled and processed information for a useful purpose, can bring lots of benefits
to man.
The processing of data by any computing device also requires data to
understand it. In this lesson, the learners have the right to understand data and
information processing. It will be useful for him to prepare his/her career, especially if
it will be the technology of information. The lesson also prepares the learner in the
programming world. As he/she understand completely how a computer process data,
the learner will develop in his critical thinking ways of manipulating and controlling
those data and information, including the internal and hidden processes of a
microcontroller unit.
May the learner‘s intuition be developed in the area of data processing,
manipulation, control, storing, and use of computer information.

87
OBJECTIVES/COMPETENCIES:

 Explain how computers process data and transform it to information.


 Understand how computers represent data and make it useful to the
users.
 Understand the different terms and technology in reference to data and
information processing.
 Analyze the different ways a computer transform an input data into useful
information.
 Understand how computer communicates and represent between different
internal devices using machine language and machine cycles.
 Understand how a computer stores data information in any storage
devices.
 Understand the basics of Data Science.

A pre-test of your Data and Information knowledge…

 How do you describe a world of computers that communicates to each other


without a common standard? Can you describe in your own words (at least
500 words or more) how chaotic it is if all computer companies of the world
have its own protocol for their manufactured input-output devices?
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________

88
Lesson 3.1 - TRANSFORMING DATA INTO INFORMATION
Computers cannot understand anything, though they seem that they know us
because we understand the information it produces. Computers recognize two
distinct physical states produced by electricity, magnetic polarity, or reflected light.
Essentially, they understand whether the switch is on or off. The CPU, which acts as
the ―brain‖ of the computer, consists of several million tiny electronic switches, called
transistors. A computer appears to understand information only because it operates
at such phenomenal speeds, grouping its individual on/off switches into patterns that
become meaningful to us.
In computing, data is the term used to describe the information represented
by groups of on/off switches. In the strictest sense, data consist of the raw numbers
that computers organize to produce information. Some of the objectives of data
processing are:
 To provide mass storage for relevant data.
 To make easy access to the data for the user.
 To provide prompt response to user requests for data.
 To eliminate redundant data.
 To allow multiple users to be active at one time.
 To allow for growth in the database system.
 To protect the data from harm like physical and unauthorized access.

3.1.1 Some data definitions to ponder: 1


 Data bank - a store of a large amount of information, esp. in a form that can
be handled by a computer.
 Data capture - any process for converting information into a form that can be
handled by a computer.
 Data dictionary – in computing, it is an index of data held in a database and
used to assist in the access to data, also called data directory.

89
 Data pen - a device for reading or scanning magnetically coded data on
labels, packets, etc.

 Data processing - a sequence of operations performed on data, esp. by a


computer, to extract information, reorder files, etc. When used as a modifier, it
is a data-processing center. It is also mean to safeguards for individuals
relating to personal data stored on a computer.
 Data set - another name for a set of computer files.
 Data structure - an organized form, such as an array list or string, in which
related data items are held in a computer.
 Big Data – a massive collection of digital data whose analysis allows us to
predict patterns and behaviors through inductive reasoning.
 Data diddling - fraudulent changing of data before or during entry into the
computer system.
 Digital archive - virtual storing of data.
 Interactive Databases System - is a process of storing data in files based on
the interaction between pieces of data.
 Cyber Terrorism - the attack on computers, networks, and interconnected
infrastructures with the intent to intimidate or coerce a national, international,
groups of people or organizations in furtherance of political, social, or
personal objectives.
 Digital Footprints - is a track left by users in the form of data in the process
of transmission of information online.
 Digital world - an electric spectrum of data creation, storing, retrieving, and
synchronizing.
 Doxxing - publishing personal data about people, especially on the internet,
to threaten or blackmail them. Other terms for Doxxing is cyber bullying with a
threat of blackmail.
 Software proposal - a detail-oriented document clearly outlining the
objectives of the project like technical, terms, and financial aspects of the
software project. These software proposals help Business Professionals to
automate routine tasks.

90
 Software piracy - intentional copy and use of a software product without the
permission of its owner.

Lesson 3.2 How Computers Represents Data

To a computer, everything is a number. Numbers are numbers; letters and


punctuation marks are numbers; sounds and pictures are numbers. Even the
computer‘s instructions are numbers. When you see letters of the alphabet on a
computer screen, you see just one of the computer‘s ways of representing numbers.
For example, consider the word G R O W. This word may look like a string of
alphabetic characters to you, but to a computer, it seems like a string of ones and
zeros as shown in the figure below:

Data as represented in switches

In a computer, all data is represented by the state of the computer‘s electronic


switches. A switch has only two possible states –on and off—so it can mean only
two numeric values. To a computer, when a switch is off, it represents a zero (0);

91
when a switch is on, it means a one (1). Because there are only two values, the
computer functions in base 2, which is also known as the binary number system.
Binary numbers are made of bits. A bit represents a switch. A byte
comprises 8 bits and represents one character. With one byte, the computer can
mean one of 256 different symbols or characters because the eight 1s and 0s in a
byte can be combined in 256 different ways.

The value 256 is more than the number of symbols; it is the number of
patterns of 0 and 1 that can be created using eight bits. This number can be
obtained using a calculation. There are only two possible states for a switch, on and
off. In a byte, there are eight switches. To calculate the number of patterns, raise 2
to the number of bits: 28 = 256.

3.3 How is an image stored on a computer?

An image is a matrix of pixel values. Virtually, every image can be


represented as a matrix of pixel values. An image below shows how pictures
transform into ASCII codes and then to bits readable by the computer.2

92
3.3.1 Text Codes
The text codes are standard codes necessary for data transfer, like converting
letters into binary. The famous text code systems are the following:

 ASCII. This stands for American Standard for Information Interchange. Today,
the ASCII character set is by far the most commonly used in computers for all
types.

 Extended ASCII. This is an eight-bit code that specifies the character for
values from 128 to 255. The first 40 symbols represent pronunciation and
particular punctuation. The remaining signs are graphic symbols.

 Unicode. This provides up to four bytes – 32 bits – to represent each letter,


number, or symbol. With four bytes, enough Unicode codes can be created to
represent more than 4 billion different characters or symbols. This total is
enough for every unique character and symbol in the world, including the vast
Chinese, Korean, and Japanese character sets.

93
3.3.2 How Data Is Represented In the Computer

To include strings, integers, characters, and colors. This should consist of


considering the space taken by data, for instance, the relation between the
hexadecimal representation of colors and the number of colors available 3.

 Integer
Each integer is represented in binary, where a single number
will usually be expressed in one byte.

 Characters
Each character is usually one byte (8 bits), represented in
binary.

 Unicode
It is a standardization of assigning values to a specific character;

94
this is needed as there are hundreds of different characters in different
languages. If done by each community, there would likely be overlaps.

 Strings
Strings are a concatenation of characters and were represented
in binary, as each 8-bit character following each other. Each word will
be around 16-32 bits.

 Colors
Colors are represented in the hexadecimal number system. It
will be six hexadecimal values 2 for each prime color, in the order of
Red, Green, Blue (RGB.) For example, the color red will be FF 00 00.
When viewed on a display screen, it will usually have a hashtag before
the value, e.g., #FF 00 00. A maximum of around 16.8 million different
colors may be input. (16 to the power of 6 or 2 to the power of 24.).

Please see the EXCELLENT chart below to understand better how hexadecimal is
used to express colors. The image below shows the equivalent data of colors in text
and numbers4:

95
Let’s have an exercise…

Try this with your computer: Identify the different Unicode equivalent of each

character in the world by inserting symbols in your MS Office Word application.


Construct a one or two sentences and write the equivalent ASCII and Unicode of the
sentence. Could you understand the equivalent codes of your sentences? Why?

96
Lesson 3.4 How Computers Process Data

Two components handle


processing in a computer: the Central
Processing Unit (CPU) and the memory.
Both are located on the computer‘s
motherboard. The memory is called
RAM, random access memory, which is
a volatile memory. Both are performing
processes to achieve data
transformation and instruction execution.
Below are components of the computer systems that gives the detail how
does a computer process data.

 CPU or Central Processing Unit


The CPU is the ―brain‖ of the computer, the place where data is manipulated. In
the average computer, the entire CPU is a single unit, called a microprocessor.
Every CPU has at least two essential parts: the Control Unit and the Arithmetic Logic
Unit.

 Control Unit
All the computer‘s resources are managed from the control unit. Think of the
control unit as a traffic signal directing the flow of data through the CPU, as well as to
and from other devices. The CPU‘s instructions for carrying out commands are built
into the control unit. The instructions, or instruction sets, list all the operations that
the CPU can perform.

 Arithmetic and Logic Unit


Because all computer data is stored as numbers, much of the processing
involves comparing numbers or carrying mathematical operations. Computers can
perform two types of operations: arithmetic operations and logical operations. The
arithmetic operations include addition, subtraction, multiplication, and division.

97
Logical operations include comparisons, such as determining whether one
number is equal to, greater than, or less than another number.

A basic diagram how a computer process data. Retrieved from


https://www.onlinesoln.com 5

5
3.4.1- Types of Data Processing On Basis of Process/Steps Performed

Several methods and techniques can be adopted for processing data


depending upon the requirements, time availability, software, and hardware
capability of the technology being used for data processing. There are several types
of data processing methods.
1. Batch Processing
2. Real-time processing
3. Online Processing
4. Distributed Processing
5. Multiprocessing
6. Time-sharing
7. Batch Processing

98
1. Batch Processing

Batch processing is one of the widely used types of data processing, which is
also known as serial/sequential, tacked/queued of offline processing. The
fundamental of this type of processing is that different jobs of different users are
processed in the order received. Once the stacking of jobs is complete, they are
provided/sent for processing while maintaining the same order. This processing of a
large volume of data helps in reducing the processing cost, thus making it data
processing economical.
Batch Processing is a method where the information to be organized is sorted
into groups to allow for efficient and sequential processing. Online Processing is a
method that utilizes Internet connections and equipment directly attached to a
computer. It is used mainly for information recording and research. Real-Time
Processing is a technique that can respond almost immediately to various signals to
acquire and process information. Distributed Processing is commonly utilized by
remote workstations connected to one big central workstation or server. ATMs are
good examples of this data processing method. Examples include Examination,
payroll, and billing system.

2. Online Processing

The online processing method is a part of the automatic processing method.


This method, at times, known as direct or random-access processing. Under this
method, the job received by the system is processed at the same time as receiving.
This can be considered and often mixed with real-time processing. This system
features random and rapid input of transaction, and user-defined/ demanded direct
access to databases/content when needed.
This is a method that utilizes Internet connections and equipment directly
attached to a computer. This allows for the data stored in one place and being used
at an altogether different location. Cloud computing can be considered as an
example that uses this type of processing. It is primarily used for information
recording and research.

99
3. Real-Time Processing

As the name suggests, this method is used for carrying out real-time
processing. This is required where the results are displayed immediately or at the
lowest time possible. The data fed to the software is used almost instantaneously for
processing purposes. The nature of the processing of this type of data processing
requires the use of an internet connection, and data is stored/used online. No lag is
expected/acceptable in this type, and receiving and processing of the transaction is
carried out simultaneously. This method is costly than batch processing, as the
hardware and software capabilities are better. An example includes the banking
system, ticket booking for flights, trains, movie tickets, rental agencies, etc.
This technique can respond almost immediately to various signals to acquire
and process information. These involve high maintenance and upfront cost attributed
to exceptionally advanced technology and computing power. Time saved is
maximum in this case as the output is seen in real-time. An example is banking
transactions.

4. Distributed Processing

This method is commonly utilized by remote workstations connected to one


big central workstation or server. ATMs are good examples of this data processing
method. All the end machines run on fixed software located at a particular place and
make use of precisely the same information and sets of instructions.

5. Multi-Processing
Multi-processing perhaps is the most widely used type of data processing. It is
used almost everywhere and forms the basis of all computing devices relying on
processors. Multi-processing makes use of many parallel CPUs, which have two or
more CPUs. The task or sets of operations are divided between CPUs available
simultaneously, thus increasing efficiency and throughput. The breakdown of jobs
that need to be performed is sent to different CPUs working parallel within the

100
mainframe. The result and benefit of this type of processing are reducing the time
required and increasing the output.

Moreover, CPUs work independently as they are not dependent on other


CPU; failure of one CPU does not result in halting the complete process as the
additional CPUs continue to work. Examples include processing of data and
instructions in computer, laptops, and mobile phones

6. Time-sharing

The time-based use of CPU is the core of this data processing type. Multiple
users use a single CPU. All users share the same CPU, but the time allocated to all
users might differ. The processing takes place at different intervals for different users
as per allotted time. Since multiple users can use this type, it is also referred to as a
multi-access system. This is done by providing a terminal for their link to the main
CPU, and the time available is calculated by dividing the CPU time between all the
public users as scheduled.

3.4.2 Data Processing System

IT system is a combination of machines and people that, for a set of inputs,


produces a defined group of outputs. The inputs and outputs are interpreted as data,
facts, information, depending on the interpreter‘s relation to the system. A system
may involve some combination of:
 Conversion - is converting data to another format.
 Validation – Ensuring that supplied data is ―clean, correct, and useful.‖
 Sorting – ―arranging items in some sequence and/or at different sets.‖
 Summarization – reducing detail data to its main points.
 Aggregation – combining multiple pieces of data.
 Analysis – the ―collection, organization, analysis, interpretation and
presentation of data.‖
 Reporting – list detail or summary data or computed information.
 Presentation – data presentation helps make decisions

101
Lesson 3.5 - Machine Cycles

Machines Cycles6
Each time the CPU executes an instruction, it takes a series of steps. The
completed sequence of steps is called the machine cycle. The actions performed
by the computer processor for each machine language instruction received. The
machine cycle is a four process cycle that includes reading and interpreting the
machine language, executing the code, and then storing that code. A machine cycle
itself can be broken down into cycles such as the following:

3.5.1 - Four Steps Of Machine Cycle

1. Fetch - Retrieve an instruction from memory.


2. Decode - Translate the retrieved instruction into a series of computer
commands.
3. Execute - Execute the computer commands.
4. Store - Send and write the results back in memory.

102
Lesson 3.6 - Computer Memories

Computer memory is any physical device capable of storing information


temporarily, like RAM (random access memory), or permanently, like ROM (read-
only memory). Memory devices utilize integrated circuits and are used by operating
systems, software, and hardware.7

3.6.1 - WHAT DOES COMPUTER MEMORY LOOK LIKE?

Below is an example of a 512 MB DIMM RAM computer memory module. A


memory module is a circuit board that contains DRAM integrated circuits that are
installed into the memory slot on a computer motherboard. This memory module
connects to the memory slot on a computer motherboard.

3.6.2- VOLATILE VS. NON-VOLATILE MEMORY

Memory can be either volatile or non-volatile memory. Volatile memory is a


memory that loses its contents when the computer or hardware device loses power.
Computer RAM is an example of volatile memory. It is why if your computer freezes
or reboots when working on a program, you lose anything that hasn't been saved.
Non-volatile memory, sometimes abbreviated as NVRAM, is a memory that keeps its
contents even if the power is lost. EPROM is an example of non-volatile memory.
EPROM means Erasable Programmable Read-Only Memory; EPROM is a non-
volatile memory chip invented by Dov Frohman in 1971 while at Intel that can only be

103
read. If exposed to ultraviolet light, an EPROM can be reprogrammed if needed, but
otherwise does not accept or save any new
data. Hardware

manufacturers use EPROM when it may be


needed that the data contained on the EPROM
needs to be changed. The image shows an
EPROM, erasable programmable read-only
memory integrated circuit. An EPROM chip is
distinguishable by a small quartz crystal (not
glass) circle window that exposes the chip so
that it can be reprogrammed. The picture on this
page shows an Intel 8048 made by NEC and is an example of an EPROM chip.

3.6.3 - What Happens To Memory When The Computer Is Turned Off?

As mentioned above, because RAM is volatile memory, when the computer


loses power, anything stored in RAM is lost. For example, while working on a
document, it is stored in RAM. If it were saved to non-volatile memory, e.g., the hard
drive, it would be lost if the computer lost power.

3.6.3.1 - Memory Is Not Only A Disk Storage

It is ubiquitous for new computer users to


be confused by what parts of the computer are
memories. Although both the hard drive and RAM
are memory, it's more appropriate to refer to RAM
as "memory" or "primary memory" and a hard
drive as "storage" or "secondary storage." When
someone asks how much memory is in your
computer, it is often between 1 GB and 16 GB of RAM and several hundred
gigabytes, or even a terabyte, hard disk drive storage. In other words, you always
have more hard drive space than RAM.

104
3.6.3.2 - PRIMARY AND SECONDARY MEMORIES

A primary storage device is a medium that


holds a memory for short periods while a computer is
running. Although it has a much lower access time
and faster performance, it is also about two orders of
magnitude more costly than secondary storage.
Alternatively referred to as external memory,
secondary memory, and auxiliary storage, a
secondary storage device is a non-volatile device
that holds data until it is deleted or overwritten.
Secondary storage is about two orders of magnitude
cheaper than primary storage. Consequently, a hard
drive or an additional, slower SSD may be used as secondary storage to a primary,
faster, PCIe SSD. Short for solid-state drive, an SSD is a storage medium that uses
non-volatile memory to hold and access data. Unlike a hard drive, an SSD has no
moving parts, which gives it advantages, such as faster access time, noiseless
operation, higher reliability, and lower power consumption. The picture shows an
example of an SSD made by Crucial Company.8

3.6.3.3 - HOW IS MEMORY USED?


When a program, such as your Internet browser, is open, it is loaded from
your hard drive and placed into RAM. This process allows that program to
communicate with the processor at higher speeds. Anything you save to your
computers, such as a picture or video, is sent to your hard drive for storage.

3.6.3.4 - WHY IS MEMORY IMPORTANT OR NEEDED FOR A COMPUTER?


Each device in a computer operates at different speeds, and computer
memory gives your computer a place to access data quickly. If the CPU had to wait
for a secondary storage device, like a hard disk drive, a computer would be much
slower.

105
3.6.4 - TYPES OF MEMORY

There are several types of memory for computers. They are listed below.

ROM – Read-only memory. ROM has three categories:


 PROM – Programmable read-only memory
 EPROM – Erasable Programmable read-only memory
 EEPROM – Electrically Erasable read-only memory

RAM – Random Access Memory. There are six types of RAM:

 EDO RAM - Short for Extended Data Out, and alternatively referred to as
hyper page mode memory, EDO is a type of memory developed in 1995 by
Micron and was first used with Pentium computers. EDO allows a CPU to
access memory 10 to 15-percent faster the compatible Fast Page memory by
not turning off the data output drivers after the memory has removed the
column address.

 SDRAM - SDRAM, which is short for Synchronous DRAM, is a type of


memory that synchronizes itself with the computer's system clock. Being
synchronized allows the memory to run at higher speeds than previous
memory types and asynchronous DRAM and supports up to 133 MHz system
bus cycling. Since 1993, this is the prevalent type of memory used in
computers around the world. The picture below is an example of an SDRAM
DIMM. The original type,
named SDRAM, up to
the current variety,
DDR3, are all
derivatives of the
SDRAM memory type.

106
 DDR RAM - Short for double data rate, DDR is a memory that was first
introduced in 1996 and has since been replaced by DDR2. DDR utilizes both
the rising and falling edge of the system clock, potentially doubling the speed

of memory. Today, DDR technology is found on high-end video cards and


computer memory, such as DDR-SDRAM.

 DDR2 RAM - Short for double data rate two, DDR2 is the second generation
of DDR memory that was released in September 2003. DDR2 can operate at
more incredible speeds than DDR, offers a tremendous bandwidth potential,
operates on less power, and generates less heat. Due to architectural
differences, DDR2 memory modules are incompatible with DDR slots.

 DDR3 RAM - Short for double data rate


three, DDR3 is a type of DRAM (dynamic
random-access memory) released in June
2007 as the successor to DDR2. DDR3 chips
have a bus clock speed of 400 MHz up to
1066 MHz, range in size from 1 to 24 GB, and
consume nearly 30% less power than their predecessors. DDR3 RAM sticks
for a desktop computer have 240 pins. For a laptop computer, DDR3 RAM
sticks have 204 pins. These memory chips can only be installed on a
motherboard that supports DDR3 memory and is not backward compatible
with DDR2 memory slots.

 DDR4 RAM - Short for double


data rate four, DDR4 is a type of
system memory known as
SDRAM and was released in
September 2014 as the
successor to DDR3. DDR4 has bus clock speeds that range from 800 to 1600
MHz and range in storage capacity from 4 to 128 GB per DIMM. DDR4 is also
more efficient at 1.2 V compared to DDR3's 1.5 to 1.65 V range. These

107
memory chips can only be installed on a motherboard that supports DDR4
memory and is not backward compatible with DDR3 memory slots.

The above types of memory all fall into the general categories of SIMM or DIMM.

3.6.5 - The Difference Between SIMM and DIMM

SIMM
Short for the single
in-line memory module,
SIMM is a memory module
developed by Wang
Laboratories in 1983. The
SIMM circuit board that
holds six to nine memory
chips per board. The ninth chip usually an error checking chip (parity or non-parity).
The SIMM was used with computers using a 486, early Intel Pentium, and
compatible processors. However, because the Pentium is 64-bit and a SIMM is only
32-bits wide, they must be installed two at a time to work correctly. Above is a
graphic illustration of a 4 MB SIMM and a diagram pointing out the essential features
of a SIMM. DIMMs replaced the SIMM.

DIMM

Short for the dual


in-line memory module,
DIMM is a module
containing a circuit board
and one more random
access memory chips.
DIMMs have a 168-pin connector and, from the advent of the Pentium processor, a
64-bit path. Because of the new bit path, DIMMs can be installed one at a time,
unlike SIMMs that would require installation in pairs.

108
SO-DIMM, which is short for small outline dual in-line memory module, is
available in both a 72-pin and 144-pin configuration. SO-DIMMs are commonly
utilized in laptop computers.

Below is an example picture of a 4 GB SODIMM memory stick from Crucial.

3.6.6 - Some of the advantages DIMMs have over SIMMs

1. DIMMs have separate contacts on each side of the board, which provides
twice as much data as a single SIMM.
2. The command address and control signals are buffered on the DIMMs. With
heavy memory requirements, this buffering reduces the loading effort of the
memory. When referring to memory, a buffer is a temporary storage in the
memory that stores information while processing other information.

Note: Online buffering happens while streaming music and videos before they
play. Buffering allows you to watch or listen to media almost instantly by
downloading a small portion and then playing the file while the remainder downloads.
RAMs are important factor in the buffering of data inside a computer system.

109
If your Internet connection is fast enough, you should only buffer for a few
seconds when you first start playing the media and never buffer again. If your
computer or device frequently buffers, your connection is not fast enough, or there's
a problem with your connection or the streaming provider. One of the solutions to
increase buffering is to increase the size of the system memory or the Random
Access Memory (RAM).

Let us reflect…
Data transformation, to some is a phenomenon, especially when it comes to
the aspect of electrical, electronic and data conversion and communication. To some
scientist, it can be a body of knowledge of science wherein it can be harness for the
benefit of mankind. To the programmer and ICT individual, it can be a vast area of
material that can be a source of many useful tools and everyday helper for humanity.
How about you, as a student, how do you see the vastness of data and
information transformation as a powerful tool in the computer world? Can you see
the unlimited potential of the art of data transformation that can change many lives?
Reflect on these things…it will be an avatar of your technology skills in the coming
years.

110
How much have you learned?
POST-TEST FOR LESSON 3

Name:__________________________________________ Score:_________
Course/Year/Section:______________________________ Date:__________
Professor/Instructor:_______________________________

Complete each statement by writing the answer in each blank.


1. To a computer, everything is a _________.
2. In a computer, all _______ is represented by the state of the computer‘s
electronic switches.
3. A ____________ has only two possible states –on and off—so it can
represent only two numeric values.
4. A computer is said to function in base _________, which is also known as the
binary number system.
5. _____________ codes is created to represent more than 4 billion different
characters or symbols.

6. The CPU‘s instructions for carrying out commands are built into the
__________.
7. More ___________ makes the computer faster.

8. Putting data permanently into read only memory is called


__________________, and it is usually done at the factory.
9. RAM‘s job is to hold __________ and ________ while they are in use.
10. A type of memory that does not lose its data even the power supply is called
_________________.

111
Lesson 1 Final Requirement:

Direction: Using the Internet, research on the following and write in your own words
(minimum of 500 words) a synthesis of the topics below.
a. Determine the different CPU Architectures of modern computers.
b. What are the factors affecting the processing speed?
c. What is the significance of Data Science to data and information processing?

Suggested Readings:
 Books/Journals:
o ―Computer Data and Information‖. https://media.lanecc.edu/ users/
loftl/CS275/ ch01.pdf
o ―Computer - Data and Information‖. https://www.tutorialspoint.com
/computer_fundamentals/computer_data.htm
o Data Science for Dummies by Lillian Pierson, 2 nd Edition
o Introduction to Algorithms, 3rd Edition by By Thomas H. Cormen,
Charles E. Leiserson, Ronald L. Rivest, Clifford Stein
o Big Data – Special Issue on Visualization on Data Science by Maryann
Liebert, Volume 6, 2014, ISSN 2147-4441
o International Journal of Business Intelligence and Data Mining
o Lecture 1:The Information Processing Approach to Intelligence.
https://link.springer.com/chapter/10.1007/978-94-009-4406-0_6
o Data and Information Research Works and Articles, Academia.edu

 Websites
o ―Information Processing‖. https://sites.google.com/a/campioncollege
.com/it_eveningschoool/inform
o ―Information processing‖. https://www.britannica.com/technology/
information-processing
o ―Examples of Data Processing‖. https://simplicable.com/new/data-
processing
112
o ―DATA PROCESSING‖. https://peda.net/kenya/css/subjects/computer-
studies/form-three/driac2/data-processing
o ―Information Processing by Science Direct Journals and Books‖.
https://www.sciencedirect.com/ topics/computer-science/information-
processing
o ―Data and Information Processing‖. https://planningtank.com/computer-
applications/information-processing-cycle/searchAI
o ―Data and Information Research Works and Articles, Academia.edu‖.
https://www.academia.edu/search?utf8=%E2%9C%93&q=data+and+in
formation+processing

113
References:

1 ―Some Data Definitions‖. Retrieved from https://synonyms.reverso.net/synonym/en/


2 ―How is an image stored on a computer?‖ https://ujjwalkarn.me/
2016/08/11/intuitive-explanation-convnets
3 ―How Data Is Represented In the Computer‖ IBO Computer Science Guide, First
exams 2014
4 ―Color Codes in Building the Body of Websites HTML 3.2 Specification -The BODY
element". W3.org. Retrieved 8 July 2013 at google.com/free-images.
5 https://www.onlinesoln.com/2020/06/explanation-and-examples-on.html
6 https://www.computerhope.com/jargon/m/machcycl.htm
7 https://www.computerhope.com/jargon/m/memory.htm
8 https://www.computerhope.com/jargon/s/ssd.htm

114
Lesson 4: Storing Data
Duration: 3 Hours per week (Week 4)

INTRODUCTION

"When it comes to storing data, there is no 'one-size-fits-all' solution," says


Orlando Scott-Cowley, Messaging, Security and Storage Evangelist at Mimecast, a
cloud and mobile data storage and security provider1.
According to an article by Schiff (2013), she says that ―Before you decide
where or how you will store your structured and unstructured data, companies first
need to understand the amount and type of data they have along with the motivation
behind storing the information. Having this background will help determine what
route to take, whether building on-premise solutions or moving to the cloud, or some
combination of the two2.‖
Storing data to an average computer user is not a menial job. The user
doesn‘t need to see under the hood how the digital bits are written to every storage
device used. To a learner, it is advantageous to discover how the computer stores
data to any computer storage, especially into the cloud.
BSIT students, as learners, they must learn and master the ins and outs of
storage devices. As they master the different programming techniques, device
storage principles and methods are needed to augment their capabilities as
information technologists. This lesson is an excellent foundation for them and
diligence to master their discipline is a great advantage to their career.
In this lesson, the learners will also acquaint themselves in the different styles
and techniques in measuring and improving storage performance, thus optimizing
every storage piece they encounter.
Again, the secret of learning is a strict study discipline and eagerness to fulfill
the learner‘s purpose why he/she has taken the course of Information Technology.

115
OBJECTIVES/COMPETENCIES:
 Understand more the details and the principles of data storage and its
different technology.
 Explain how computers store data and transform it securely to different file
formats.
 Understand the advantages and disadvantages of various data storage
devices.
 Understand the different terms and technology in reference to data and
information retrieving and storing.
 Analyze the different ways a computer store an input data to different
devices.
 Understand how cloud storage and data science is beneficial to large data
and information.
 Analyze the different processes and techniques in disk optimization.

A pre-test of your computer storage devices knowledge…

 As you learned the different component of a computer system and its


operations, how can you assess that data storage processes is a very
important action specifically in back-up and securing of important information.
In this, research on the basic algorithm that big data and big cloud company,
like Google, how they store their vast information of the world. Write your
answer in a minimum of 500 words below or write in another sheet of paper if
you need more space for explanation.
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
_____________________________________________________________
116
Lesson 4.1 - What is a Storage Device?
A storage device is any computing hardware used for storing, porting, and
extracting data files and objects. Storage devices are hardware devices used to
remember/store data. It can hold and store information both temporarily and
permanently and can be internal or external to a computer, server, or similar
computing device. A storage device may also be known as a storage medium.
Storage devices are one of the core components of any computing device.
They store virtually all the data and applications on a computer, except hardware
firmware. They are available in different form factors depending on the type of
underlying device.3 For example, a standard computer has multiple storage devices,
including RAM, cache, a hard disk, an optical disk drive, and externally connected
USB drives.4 In Lesson 3, you have learned the different types of memories used as
storage devices (you can review Lesson 3 at will). Some storage devices are also
portable, meaning that they can be used to transfer information from one computer
to another.5 There are two different types of storage devices:
 Primary Storage Devices: Generally smaller in size, are designed to hold
data temporarily and are internal to the computer. They have the fastest
data access speed and include RAM and cache memory.
 Secondary Storage Devices: These usually have large storage capacity,
and they store data permanently. They can be both internal and external to
the computer, and they include the hard disk, compact disk drive, and USB
storage device.6

Other computer engineers and scientists categorized digital data storage


media generally fall into one of five types or categories; they are 7:
1. Magnetic storage devices
2. Optical storage devices
3. Flash memory devices
4. Online/cloud storage
5. Paper storage
The above five types/categories of digital data storage will be discussed in the
next lesson.
117
Lesson 4.2 - Types/Categories of Digital Data Storage
Devices

4.2.1 - Magnetic Storage Devices 8

Computer systems need to store data in digital format. One of the most widely
used types of digital data storage is magnetic storage. Magnetic storage devices
refer to any data storage using a magnetized medium. Digital data consists of binary
information, which is data in the form of zeros and ones. Magnetic storage is a form
of non-volatile storage. There are two types of magnetic polarities, each one used to
represent either zero or one.
Several types of magnetized media are used in computer systems, including
magnetic tape, floppy disks, and hard disk drives. The basic approach to
magnetic data storage, however, is very similar to the different types of media. A
read-write head moves very close to the magnetic surface - the distance is often no
more than tens of nanometers. The head can detect and modify the magnetization of
the material. The magnetic surface is divided into tiny regions, each of which has a
mostly uniform magnetization. As the head moves relative to the body, the changes
in magnetization from area to region are detected and recorded as zeros and ones.
Different technologies vary in how the head moves relative to the surface of the
media and how the areas on the media are organized, but the basic principle is the
same.
Magnetic storage is widely used because it is relatively cheap in comparison
with other storage technologies. Magnetic storage is read-write, which makes it
possible to reuse the storage capacity over and over again by deleting older data.
The storage capacity is also huge, making it attractive for storing vast amounts of
data. The major limitation of magnetic storage is that accessing the data can be
relatively slow. As a result, most computer systems use magnetic storage media for
non-volatile storage of large amounts of data, typically in the form of a hard-disk
drive. But a different type of storage for system memory, such as read-only memory
(RAM), which is much smaller but can be accessed much faster.

118
4.2.1.1 Types of Magnetized Media that are Used in Computer Systems

 Magnetic tape
 Floppy disks
 Hard disk drives

Magnetic Tape 9
Magnetic tape is one of the older
types of magnetic storage media. The
magnetic tape recorder was invented in
1928 and was primarily used for analog
audio recordings. Before music CDs
were introduced in the 1980s, portable
music devices used magnetic tape in
the form of music cassettes. Early
computers adapted this technology to
store digital information. One of the
major weaknesses is that information
on tape can only be accessed in a very
sequential fashion. This is fine if you
A magnetic tape device, courtesy of IBM
want to listen to a whole music album Corporation
in sequence, but computer systems
typically need to access data in a non-sequential manner. For magnetic tape, this
means you may need to fast forward through a lot of tapes to get to a specific piece
of data. While magnetic tape is a very cheap way to store data, the very slow access
to the data meant that it was primarily used for creating backups of data in case
older forms of storage failed. Tape backup systems are still in use today, but their
importance has dramatically declined with the advance of cheap, large capacity
hard-disk drives.

119
10
Floppy Disks
Also known as a diskette, floppy, or FD, the
floppy disk is another type of storage medium that
uses magnetic storage technology to store
information. Floppy disks were once a standard
storage device for computers and lasted from the
mid-1970s to the start of the 21st century. The
earliest floppies were 8-inch (203 mm) in size, but
these were replaced by 5-1⁄4-inch (133 mm) disk drives, and finally a 3 1⁄2 inch (90
mm) version. Almost every PC used to have a floppy disc drive. These are obsolete
now, having been replaced by higher capacity technology such as CD-ROMs, DVDs,
and USB memory sticks.

Hard Disk Drives11

Hard disk drives are non-volatile magnetic storage devices capable of


remembering vast amounts of data. An electromagnet in the read/write head charges
the disk‘s surface with either a positive or negative charge; this is how binary 1 or 0
is represented. The read/write head is then capable of detecting the magnetic
charges left on the disk‘s surface; this is how data is read. The disk surface is
divided into concentric circles (tracks) and sectors (wedges). Dividing the surface in
this way provides physical addresses to remember where data is saved. A circuit
board carefully co-ordinates the rotating disk and swinging actuator arm to allow the
read/write head to access any location very quickly. Typical HDD capacities are
measured in Terabytes (TB). They can be installed inside a computer or purchased
in a portable (external) format.

Typical applications for hard disk drives


 Desktop computers
 Laptop computers
 TV and satellite recorders
120
 Servers and mainframes
 Portable (external) drives are sometimes used to backup home computers or
transfer large files
Benefits of hard disk drives
 Capable of holding vast amounts of data at affordable prices
 Fast read and write speeds
 Reliable technology
 Relatively small in size
Drawbacks of hard disk drives
 Due to the nature of its moving parts, they will eventually wear and break
 Although very fast, waiting for the moving parts means it will never perform as
fast as solid-state drives
 More fragile and less robust than a solid-state drive
 Higher power consumption than an SSD
 The moving parts create some noise

4.2.2 - Optical Storage Devices

CD, DVD, and Blu-ray drives are optical storage devices. Binary data is stored
as changes to the texture of the disc‘s surface, sometimes thought of as
microscopic pits and bumps. These ‗bumps‘ are located on a continuous spiral
track, starting at the center of the disc. While the disc is rotating at a constant
speed, a laser is pointed at the spiral path of ‗bumps‘. The laser will
reflect/bounce off the disc surface in different directions depending upon whether
a 1 or 0 has been read.

Disc Capacities
In the pursuit of larger optical storage capacities, DVDs were created,
followed by Blu-Ray.

121
CD DVD Blu-Ray

700 MB 4.7 GB 25 GB – 128 GB

Typical applications for optical media


 CD – Audio and small amounts of data
 DVD – Standard definition movies and
data
 Blu-Ray – HD video and large amounts
of data

CD/DVD
Despite being the same physical size, a
DVD can hold more data than a CD. To achieve this, a more tightly packed spiral
track is used to store the data on the disc. To accurately access the smaller
‗bumps‘, a more delicate red laser is used in a DVD drive than that found in a
standard CD drive. To increase capacity further, DVDs are also capable of dual
layering.

What is DVD-RAM?
DVD-RAM is an optical media storage device. It differs from a traditional DVD
in that data is stored in concentric tracks (like an HDD), which allows read and
write operations to be carried out at the same time. This means, for example, that
when used in a personal video recorder, you can record one television program
while watching a recording of another. This allows handy features such as ‗time
slip‘ to be possible. When used within a CCTV system, you could review footage
while still recording your cameras. The capacity of DVD-RAM is 4.7 GB or 9.4 GB
for double-sided discs.

Typical applications for DVD-RAM


 Personal and digital video recorders
 High-end CCTV

122
 Benefits of DVD-RAM
 Read and write at the same time
 Can be rewritten to many more times than a traditional DVD-RW
 Has write-protect tabs to prevent accidental deletion when used in an
optional cartridge
 Data is retained for an estimated 30 years. This long life is excellent for
archiving data
 Reliable writing of discs because the verification is done by the hardware,
not by software

Drawbacks of DVD-RAM
 Disc speeds higher than 5x are less
common
 Less compatibility than DVD-RW

Blu-Ray
Blu-Ray technology squashes even more data into the same size disc as a
CD or DVD. The spiral data tracks on a Blu-Ray disc are so small a special blue
(violet) laser has to be used to read the ‗bumps.‘ As a DVD, Blu-Ray discs are
capable of storing data on multiple layers.

Recordable Optical Media


1. CD-ROM, DVD-ROM, Blu-Ray-ROM
Read-only – the data is permanently written to the disc at the point of
manufacture.
2. CD-R, DVD-R, BD-R
Recordable – blank discs that can be burnt (written to) once.
3. CD-RW, DVD-RW, BD-RE
Re-writable – blank discs that can be burnt (written to) over and over again
(can be erased and reused many times).

123
4.2.3 - Flash memory devices12
Alternatively referred to as flash
storage, flash memory is non-volatile
computer memory. It was first invented
by Fujio Masuoka in the early 1980s
while at Toshiba and introduced it to the
market in 1984. It was also later
developed by Intel. Flash memory is an
integrated circuit that does not need
continuous power to retain data but is a bit more expensive than magnetic storage.
Today, flash memory is prevalent, and solid-state drives are a practical replacement
for large hard drives if you have the extra money.
Flash memory is widely used with car radios, cell phones, digital cameras,
PDAs, solid-state drives, tablets, and printers. The picture above is an example of a
MicroSD flash memory card.

TYPES OF FLASH MEMORY: NAND, NOR, and 3D Flash Memory

 NAND flash is a type of flash memory based on the NAND logic gate.
 NOR flash is a type of flash memory based on the NOR logic gate.
 3D NAND Flash and 3D NOR Flash are flash memory technologies that layer
memory cells on top of each other in a stacked planar configuration. They
offer persistent, modular storage at speeds comparable to RAM.

Examples of Flash Memories


1. USB Flash Drive
Also known as a thumb drive, pen drive,
flash drive, memory stick, jump drive, and
USB stick, the USB flash drive is a flash
memory data storage device that
incorporates an integrated USB interface.
Flash memory is generally more efficient

124
and reliable than optical media, being smaller, faster, and possessing much greater
storage capacity and being more durable due to a lack of moving parts.
Flash is a non-volatile solid-state storage device that uses NAND flash memories
to store data (millions of transistors). USB refers to the USB connection that allows
users to plug the device into the USB port of a computer. Other types of flash
storage include the memory cards used in digital cameras. Flash memory comes in a
variety of capacities to suit most budgets and requirements.
Typical Applications for Flash Memory
 USB memory sticks – saving and transferring documents, etc.
 Memory cards in digital cameras

Benefits of Flash Memory


 Portable, small and lightweight
 Durability, flash has no moving parts to damage
 Range of capacities available
 Fast speeds, with no moving parts of boot uptime

Drawbacks of Flash Memory


 Limited (but huge) number of write cycles possible
 High capacities are uncommon
 In relative terms, an expensive storage option compared to an HDD

2. Secure Digital Card (SD Card)


Common types of memory cards, SD
cards are used in multiple electronic
devices, including digital cameras and
mobile phones. Although there are different
sizes, classes, and capacities available,
they all use a rectangular design with one side "chipped off" to prevent the card from
being inserted into the camera or other device the wrong way.

125
3. Solid State Drive (SSD)

Solid-state drives are non-volatile


storage devices capable of holding large
amounts of data. They use NAND flash
memories (millions of transistors wired in a
series on a circuit board), giving them the
advantage of having no mechanical moving
parts and immediate access to the data.
Solid-state drives perform faster than traditional hard disk drives; however, they are

significantly more expensive. This expense means that typical capacities are usually
measured in Gigabytes (GB). They can be installed inside a computer or purchased
in a portable (external) format. Until we reach a point where large capacities SSDs
are affordable, a compromise is to run two disk drives inside a computer. An SSD as
the primary drive for your important programs and operating system and a traditional
HDD to store music, documents, and pictures, which don‘t need faster access times.
The lack of moving parts in an SSD makes it very robust and reliable, ideal for a
portable device.

Typical Applications for Solid State Drives


 Smartphones
 Tablet computers
 High-end laptops
 Two drive desktop solutions
 Portable drives are sometimes used in HD video cameras

Benefits of solid-state drives


 Extremely fast read/write speeds
 Small in physical size and very light, ideal for portable devices
 No moving parts to wear, fail or get damaged – ideal for making portable
computers and machines more reliable and durable.
 Uses less power than an HDD, increasing battery lifetime
126
 Very quiet and generates less heat

Drawbacks of solid-state drives


 Expensive to buy (per GB)
 Limited in capacity due to the expense
 Limited amount of writes

4.2.4 Online Cloud storage


Some users choose cloud storage
instead of storing data locally on a hard disk or
other media. Cloud storage is an Internet
service that provides storage to computer users.
Types of services offered by cloud storage
providers vary. Some provide storage for
specific types of files, such as photos or e-mail messages, whereas others store any
file. Many cloud storage providers offer additional services such as encryption,
passwords, Web applications, and Web services. Cloud storage is available for all
sizes of users, with various degrees of storage services available for home and
business users. Cloud storage fee arrangements vary, depending on the user‘s
storage requirements.

Users Subscribe to Cloud Storage for a Variety of Reasons:


 To access files on the Internet from any computer or device that has
Internet access.
 To store large audio, video, and graphics files on the Internet
instantaneously, instead of spending time downloading to a local hard disk
or other media.
 To allow others to access their files on the Internet to listen to an audio file,
watch a video clip, or view a photo — instead of e-mailing the file to them.

127
 To view time-critical data and images immediately while away from the
main office or location.
 To store offsite backups of data

Pros and Cons of Cloud Storage 13


The cloud is here to stay. It‘s already one of the best ways to backup and
store data, but cloud storage, like most things, has a list of pros and cons that are
worth considering. It‘s rare to find a use case where cloud storage shouldn‘t play a
role in the backup process, whether it‘s the sole method or part of a more critical
strategy, but those use cases do exist. For instance, if security is your absolute
number one priority, it would probably make more sense to use multiple physical
backup locations, with safe and encrypted hard drives that can‘t be used
independently from one another (a hybrid cloud). To suffer data theft in this scenario,
someone would need to break into multiple locations, crack various safes, and do
this all before you noticed. You could even have the decryption key on a USB stick
that you wear around your neck for the cherry on top.

Pros of Cloud Storage


We‘ve only just begun to scratch the surface, so let‘s dig deeper into the pros
and cons of cloud storage and why they may (or may not) matter in your specific use
case.
1. Instant Setup
You can sign up with one of the best cloud storage companies and begin
uploading your data immediately. Granted, there will be some delay for the time it
takes to transfer, depending on how much information you have, but generally
speaking, you‘re ready to roll within minutes of signing up.
After signing up, you‘ll download the client for the service you choose, which
will function similarly to any other folder on your computer or app on your mobile
device or tablet. You‘ll add the files you want to backup/store into that folder, and
they‘ll automatically sync with your cloud account. In this case, you‘ll have a local
version of them and a cloud version.

128
2. Relatively Secure for the Average User
You‘ll notice I‘m phrasing this section carefully. Everybody knows that nothing
online is 100% secure. Still, for the typical average user who is backing up vacation
photos and what-not, someone who isn‘t a specific target of hackers, then cloud
storage can be considered safe and secure as long as you‘re following general best-
practices to keep your computer and passwords safe.
Relative to setting up your webserver to store things yourself, or keeping the files
on any network-connected drive in your home, it stands to reason that billion-dollar
internet infrastructure companies will have better data-protection than you or me. Of
course, they‘re higher profile and more prone to being attacked, too, but they also
have geniuses working around the clock to keep your data safe and have software
monitoring capabilities.

3. Ease of Use
Compared to running your own off-site data backup scheme, the cloud is
super easy to use. Drag over the files you want to backup, and that‘s it. Most
providers will automatically sync any changes that you make instantly, but you can
also turn this off if you‘d like to take a slightly more manual approach. In any case, in
terms of pure ease of use, the cloud is by far the winner, no matter how you slice it.
The simplicity of dragging a file into a folder and instantly having an off-site
backup that you can access from any of your devices is unparalleled.

4. Access to Your Data


To follow up on the previous point, once your files are uploaded to the cloud,
you can access them from your desktop, from your cellphone or tablet, and from any
other computer that has a web browser. This is perfect for traveling, or just if you‘re
at a friend‘s house and wanted to show them something. It‘s also useful for
transferring files from one computer to another.

5. Low Start-Up Cost

129
Cloud storage is either billed on a pay-per-use basis or divided into tiers, so
you can get started for next to nothing until your storage needs grow, and then the
price will increase accordingly. It makes it very easy to predict your backup
expenses, compared to managing all of this yourself, buying drives, replacing them
as they fail, etc.
Most cloud storage companies offer some type of a free plan, too, so you can
take them for a test-drive first. Even if you settle on one that doesn‘t, the monthly
fees are likely low enough that you can try out multiple options before deciding on
something.

6. Ease to Scale
When you run out of storage space, you don‘t need to rush out and order new
drives or anything of the sort. Simply upgrade your plan, and you‘ll have more space
available to you instantly.
Cons of Cloud Storage
It‘s not all sunshine and rainbows. There are some downsides to cloud
storage that are worth keeping in mind. In most cases, these won‘t matter, so that‘s a
plus, but if any of these are deal-breakers for you, you‘ll be glad you found out about
them now instead of later.

1. Requires Internet Access


When you rely on the cloud to store your files, and you aren‘t keeping a local
copy, then you simply won‘t be able to access them without internet access. You
need an active connection to the internet to download or access any of the files you
keep hosted on the cloud.
Keep in mind that if you have a mobile connection, that can be good enough.
Still, you can quickly go over your bandwidth limits if you use it as a hotspot or
download too many high-resolution images at once, especially if you have it set up to
sync automatically. Many know not to sync unless they detect a Wi-Fi signal, though.

2. You Don’t Have Physical Control Over It

130
You‘re relying on someone else to run the data center, and you‘re trusting that
they‘re doing that correctly. We‘re usually talking about huge-scale operations here,
so it‘s not typically a concern. Still, it‘s not a plus (except for the fact that they handle
all aspects of maintaining a data center, securing it, having backup generators in
case the electricity cuts out, and all of the things you might not think about).

3. Security Concerns for High-Profile Users


Celebrities and billionaires may not feel comfortable keeping their data in the
cloud, especially after some of the data breaches and leaks that have been very
public. This isn‘t a massive concern for the average person, because they aren't
targets in the same way and generally know to use secure passwords.

4. Vendor Lock-in
It‘s not always easy to move from one provider to another if your cloud needs
change down the road, and this is especially true when you have a ton of space.
Let‘s say that you have 10 Tb of files stored in your cloud account, and you want to
move to a new cloud storage company. Rather than just transfer it from one to the
other, you‘ll need to download these files yourself, first. If you only have a 500 Gb or
1Tb hard drive, this will have to be done a little bit at a time. Many do have cloud
storage migration tools for other providers, especially the most popular options.

4.2.5 - Paper storage


Paper data storage refers to the use of paper as
a data storage device. This includes writing, illustrating,
and using data that can be interpreted by a machine or
is the result of the functioning of a machine. A defining
feature of paper data storage is the ability of humans to produce it with only simple
tools and interpret it visually. Though now mostly obsolete, the paper was once an
essential form of computer data storage as both paper tape and punch cards were
an everyday staple of working with computers before the 1980s.
Punch cards (or punched cards) were a standard method of data storage
used in the early computers. They consisted of a paper card with punched or

131
perforated holes that have been created by hand or machine. The cards were
entered into the computer to enable the storage and accessing of information. This
form of data storage media pretty much disappeared as new and better technologies
was developed.

Lesson 4.3 - Data Storage Management

4.3.1 - Management and Prevention of the Loss of Data and Information

There are six of the most common methods below. Generally speaking, the best
way to protect data and prevent the loss of it is to back it up in different places.

1. Deleting Files By Mistake


This is a widespread problem and has happened to most people who
deal with data, including myself. As well as deletion, reformatting a device
can also result in the loss of stored information.

2. Power Failure
Many electronic devices depend on electricity to function correctly and
maintain data. A loss of power can therefore be disruptive or destructive,
especially in cases where the power loss is sudden. As well as power losses,
power surges can also cause problems.

3. Spillages, Drops, or Other Physical Accidents


Anything that causes physical damage to the storage device can
corrupt data or prevent access to it. Even minor accidents, such as knocking
over a cup of coffee, might be all it takes to cause the loss of large amounts
of data.

4. Viruses And Other Forms of Malware

132
Many modern forms of digital data storage are exposed to the internet.
This means that the data risks being corrupted by malware, either directly or
via broader damage caused to say, the operating system.

5. The Storage Device is Stolen


Whether through burglary, pickpocketing, mugging, or other forms of
theft, you can lose the entire device and all the information that's on it.

6. Fires, Floods, Explosions and Other Catastrophic Events


These can all destroy vast amounts of data. This is one of the main
reasons why data should never be backed up in the same building, but rather
in a different place.

4.3.2 – Fourteen (14) Things You Need to Know About Data Storage
Management14

Before you decide where or how you will store your structured and
unstructured data, companies first need to understand the amount and type of data
they have and the motivation behind storing the information. Having this background
will help determine what route to take, whether building on-premise solutions or
moving to the cloud, or some combination of the two. So how do you formulate that
sound data storage management strategy? The below top 14 suggestions, according
to research, regarding what steps you need to take to choose the right data storage
solution(s) for your organization -- and how you can better ensure your data is
protected correctly and retrievable.

1. Know your data


All data is not created equal -- and understanding the business value of
information is critical for defining the storage strategy. So when formulating your data
storage management policy, ask the following questions:
 How soon do I need the data back if lost?
 How fast do I need to access the data?
 How long do I need to retain data?
133
 How secure does it need to be?
 What regulatory requirements need to be adhered to?

2. Don't neglect unstructured data.


Think about how you might want to combine multi-structured data from your
transactional systems with semi-structured or unstructured data from your email
servers, network file systems, etc. Make sure that the data management platform
you choose will let you combine all these types without months or years of the data
modeling effort.

3. Understand your compliance needs.


If you are a publicly-traded company or operating within a highly regulated
industry such as financial services or healthcare, the bar has been set high for
compliance and security. If you choose to outsource your data storage and
management, ensure that your managed services provider has the credentials
needed to provide a highly secure, compliant environment. Failure to operate in total
compliance may lead to severe penalties later.

4. Establish a data retention policy.


Setting the right data retention policies is a necessity for both internal data
governance and legal compliance. Some of your data must be retained for many
years, while other data may only be needed for days.
When setting up processes, identify the organization's most essential data,
and prioritize storage management resources appropriately. For example, email may
be a top priority, but storing and archiving email data for one particular group, say
the executives, maybe more critical than other groups. Make sure these priorities are
set so data management resources can be focused on the most vital tasks.

5. Look for a solution that fits your data, not the other way around .
Many think the only choice to make is whether they need DAS (Direct-
Attached Storage), a SAN(Storage Area Network), or a NAS (Network-Attached
Storage, these are important choices, but they are insufficient. While a Fibre

134
Channel SAN may be great for doing a lot of low latency read/write operations on a
reasonably structured database, it's not typically designed to do well on spikey
unstructured video workloads. So instead of selecting a one-size-fits-all strategy,
smarter buyers are now considering the workload characteristics and picking the
right storage strategy for the job. Similarly, look for a solution that provides the
flexibility to choose where data is stored: on-premise or in the cloud. The answer
should allow you to leverage existing investments in data platforms such as network
shares and SharePoint.
And if, like many businesses these days, you have a mobile workforce, the
data management and storage solution you choose should be optimized for mobile
and virtual platforms, in addition to desktops and laptops -- and provide a consistent
experience across any platform, including mobile editing capabilities and intuitive
experience across mobile devices, virtual desktops or desktops.

6. Don't let upfront costs dictate your decision.


The real cost of storage comes from operating the solution over several years.
So make sure you really understand your operating costs [or total cost of ownership]:
personnel, third-party support, monitoring, even the chance you'll lose data, which
certainly carries a price. These all quickly dwarf the upfront costs to purchase and
deploy. Many users buy storage (systems or services) because of massive initial
discounts, or they neglect to think through the costs of their chosen storage years
down the road.
Factoring in scalability, technology refresh, and operating costs like power,
administration, floor space, and support renewal can make a big difference in the
storage acquired. Considering the long-run implications of these storage
characteristics and purchasing the storage that provides the best total cost of
ownership over time reduces the chance that long-run costs will far exceed the short-
term discounts.

7. Use a tiered storage approach.


Save money by only using your fastest storage, like SSD, for data that you
actively use, and utilize less expensive platforms, like the cloud, to store your

135
archival or backup data. Make sure your systems can utilize different storage tiers,
so as the performance needs of an application change, you don't need to re-architect
it.

8. Know your clouds.


All storage clouds are not created equal, which provides storage infrastructure
as a service. Some clouds are optimized to handle archiving, others have the
performance and stability to act as the back end for a primary data storage system,
and still, others aren't worth the risk for any purpose. The lowest price cloud may end
up being much more expensive in the long run if data is lost or inaccessible.

9. Carefully vet storage providers.


There are many viable storage solutions in the marketplace that will meet your
requirements. When problems arise within the storage network, they typically have a
big impact on your organization. Your ability to resolve these problems timely will be
critical to your success. It's also essential to make a list of everything you want your
data protection solution to do -- and ask vendors how much of the plan they can
cover. Organizations looking for storage providers should pay close attention to
capacity, performance, availability, and fault tolerance, which provides a variety of
technology solutions. It is also essential to seek out providers who offer innovative
features such as thin provisioning, tiering, and reduplication. Finally, you need to
remember that you cannot transfer all risk related to [your] data simply by storing it at
a third-party facility. The organization is ultimately responsible for its data. This
responsibility includes performing due diligence not only during procurement but
through the lifecycle of the vendor relationship. It also means if the worst scenario
were to happen, [you need to have] the appropriate contract in place to cover the
cost of the breach, etc.

10. Don't store redundant data.


Many companies do not have a storage plan. Instead, they tend to capture
and store redundant data. This used to be less of a problem when the disk was
expensive; companies were much more careful to plan what to store. But with

136
capacity being more reasonably priced, the tendency is to store everything. The
problem is identifying what is valid and what is dated as well as database
performance. So before storing data, analyze it, and pick your most reliable source,
deleting copies.

11. Make sure your data is secure.


When managing data within any IT environment, security has to be the first
priority. Security comes two-fold: the data has to be secure both virtually and
physically. The data also needs to be encrypted so it cannot be read or used by
unscrupulous third parties if it ever falls out of possession or is hacked (which does
happen). Besides, backing up encrypted data to tape and housing it in a secure
outside location, so that in the event of an emergency or natural disaster, the data
and enterprise system can be recreated.

12. Leverage technologies that use reduplication snapshotting and cloning.


This can save you a fair amount of space while giving you version control of
your data. Some of the more recent file systems like ZFS do all of this and are open
source. But commercial products like NetApp have been doing it for years. SAN
snapshots can now be converted into backups that IT can store offsite, which
enables IT to back up the environment several times an hour instead of just once a
day.

13. Make sure you can find the data you need once it's been stored.
Being able to easily search your electronically stored data and provide
accurate results instantly is critical to getting the most out of your data daily and in
urgent situations, such as when your data is needed for litigation. After all, if you
can't find the right information when you need it, what's the point of archiving your
data?

14. Have a disaster recovery plan -- and constantly test.

137
It's all about recovery. All the backups in the world cannot save you if you
can't recover [your data]. So whichever method or methods of backup you use, be
sure to test them -- and not just once a year or once a month. Make spontaneous
recoveries each week. Do disaster recovery testing and audit your data pools
periodically, so you can be sure you can recover your data. Maintain at least three
copies of anything you care about in at least two different formats, with at least one
being offsite.

Lesson 4.4 - Measuring and Improving Drive Performance

The performance of a hard disk is significant to the overall speed of the


system – a slow hard disk having the potential to hinder a fast processor like no
other system component – and several factors determine the sufficient speed of a
hard disk.
Chief among them is the rotational speed of the platters. Disk RPM is a critical
component of hard drive performance because it directly impacts the latency and the
disk transfer rate. The faster the disk spins, the more data passes under the
magnetic heads that read the data; the slower the RPM, the higher the mechanical
latencies.

4.4.1 - Hard Drive Latency


Mechanical latencies, measured in milliseconds, include both seek time and
rotational latency. Seek Time is measured defines the amount of time it takes a hard
drive‘s read/write head to find the physical location of a piece of data on the disk.
Latency is the average time for the sector being accessed to rotate into position
under a head, after a completed seek. It is easily calculated from the spindle speed,
being the time for half a rotation. A drive‘s average access time is the interval
between when the system makes a data request and the time the data is available
from the drive. Access time includes the actual seek time, rotational latency, and
command processing overhead time.

4.4.2 - Hard Drive Transfer Rates

138
The disk transfer rate (sometimes called media rate) is the speed at which
data is transferred to and from the disk media (actual disk platter) and is a function of
the recording frequency. It is generally described in megabytes per second (MBps).
Modern hard disks have an increasing range of disk transfer rates from the inner
diameter to the outer diameter of the disk. This is called a zoned recording
technique. The key media recording parameters relating to density per platter are

Tracks Per Inch (TPI) and Bits Per Inch (BPI). A track is a circular ring around
the disk. TPI is the number of these tracks that can fit in a given area (inch). BPI
defines how many bits can be written onto one inch of a track on a disk surface.
The host transfer rate is the speed at which the host computer can transfer
data across the IDE/EIDE or SCSI to the CPU. It is generally referred to as the data
transfer rate, or DTR, and can be the source of some confusion. Some vendors list
the internal transfer rate, the rate at which the disk moves data from the head to its
internal buffers. Others cite the burst data transfer rate, the maximum transfer rate
the disk can attain under ideal circumstances, and for a short duration. More
important for the real world is the external data transfer rate, or how fast the hard
disk transfers data to a PC‘s main memory.

4.4.3 - Disk Optimization


Alternatively referred to as disk compression, a disk optimization is designed
to organize data or compress data allowing the disk drive to contain the maximum
amount of information as possible.

Benefits of Disk Optimization


 Scanning for and removal of Junk files (that include Windows temporary files
that are created and left behind by software applications and temporary Internet
files that accumulate when you are browsing web content);

139
 Scanning and defragmentation of hard disks (increases access speeds by
rearranging the files stored on the hard disk. This reduces the time it takes to
read files from and write files to the disk.);
 Removal of old backups (deleting old restore points or Windows update files to
free up disk space);
 Compression of large files to further free up disk space.

4.4.4 - Disk Defragmentation


Disk defragmentation is the process of consolidating fragmented data on a
volume (such as a hard disk or a storage device) to work more efficiently.
Fragmentation happens to a volume over time as you save, change, or delete
files. The changes you keep to a file are often stored in a different place on the
volume than the original file. This doesn't change where the file appears in
Windows—only where the bits of information that make up the file are stored on the
actual volume. Over time, both the file and the volume itself become fragmented,
and your computer slows down as it has to look in different places to open a single
file.
Disk Defragmenter is a tool that rearranges the data on your volume and
reunites fragmented data so your computer can run more efficiently.

140
A sample window of Disk Defragmenter, courtesy of
Microsoft Corporation
Let us reflect…
Data storage technology is one of promising technology of the future. There it
lays the great foundation of Data Science and Artificial Intelligence. These new
revolution of computing will come to naught without the advancement in data storage
technology.
As a student, your physical brain and memories needs to be enhanced every
day to advance your intelligence. Likewise, data storage undergoes the same
enhancement thru new discoveries of materials that enhanced more the
advancement of data storing and retrieving. As you see the future of data science
and analytics, what do you think is the best area of specialization in ICT that needs
to be focused on? You can research the advancement of data science in relation to
data storage and put your reflection in a minimum of 500 words that explain the
future of utilization of data science and analytics thru data storage technology.
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________

141
How much have you learned?
POST-TEST FOR LESSON 1

Name: __________________________________ Date: ____________________


Course & Section: ________________________ Result: __________________

A. Describe the different types of storage devices.

B. Define the following:

1. Hard disk latency

2. Hard disk transfer rate

3. Disk optimization

142
4. Disk fragmentation

C. Give at least 10 ways to protect and manage your data and information.

1.
2.
3.
4.
5.
6.
7.
8.
9.
10.

Lesson 4 Final Requirements:


 Write a research article (not less 500 words) about the topics below:
o Basics of Data Analytics and Data Science.
o The future of memory technology that will enhance Data Analytics and
Data Science.

143
Suggested Readings:

 Books/Journals:
o Security and Data Storage Aspect in Cloud Computing (Studies in Big
Data) 1st ed. 2019 Edition by Prachi S. Deshpande, Subhash C.
Sharma , and Sateesh K. Peddoju
o Developments in Data Storage: Materials Perspective 1st Edition,
Kindle Edition by S. N. Piramanayagam and Tow C. Chong
o Handbook of Research on Big Data Storage and Visualization
Techniques (Advances in Data Mining and Database Management) 1st
Edition by Richard S. Segall and Jeffrey S. Cook
o Data Storage Networking: Real World Skills for the CompTIA Storage+
Certification and Beyond 1st Edition by Nigel Poulton
o Electronically Stored Information: The Complete Guide to
Management, Understanding, Acquisition, Storage, Search, and
Retrieval, Second Edition 2nd Edition by David R. Matthews
 Websites
o ―Software Defining your Storage‖. https://blog.architecting.it/
o ―Enterprise Storage Technology‖ https://www.enterprisestorageforum.
com/
o ―Storage‖. https://www.networkworld.com/category/storage/
o ―Search Storage Technologies‖. https://searchstorage.techtarget.com/
o ―Storage News and Reviews‖. https://www.eweek.com/storage
o ―Data Center Technologies‖. https://www.theregister.com/data_centre/
o ―Data storage: Everything you need to know about emerging
technologies‖. https://www.zdnet.com/article/innovations-in-data-
storage-an-executive-guide-to-emerging-technologies-and-trends/

144
REFERENCES

1 ―Storing Data‖. Retrieved from https://www.cio.com/article/2382585/14-things-you-


need-to-know-about-data-storage-management.html
2 ―Storing Structured and Unstructured Data‖. Retrieved from an article titled, ―14
Things You Need to Know About Data Storage Management.
―https://blog.drsimaging.com/2015-2-13-14-things-you-need-to-know-about-data-
storage-management.
3 Storage Devices – theintactone.com. Retrieved from https://theintactone.com/
2019/10/12/cf-u3-topic-1-storage-devices/
4 ―Storage Devices - Computer Hardware And Peripherals.‖ http://hardwarecomp
1220uwi. weebly.com/storage-devices.html
5 ―Computer Basics: 10 Examples of Storage Devices for Computers‖ Retrieved
from https://turbofuture.com/computers/Examples-of-Data-Storage-Devices
6 ―Basics of storage Technology―.Retrieved from https://www.slideshare.net/
LopamudraDas1 /basics-of-storage-technology
7 ―Categorization of Digital Data Storage‖. Retrieved from https://turbofuture.
com/computers/Examples-of-Data-Storage-Devices
8 ―Magnetic Storage Devices‖. Retrieved from https://study.com/academy/lesson/
magnetic-storage-definition-devices-examples.html
9 ―Magnetic Tapes‖. Retrieved from https://study.com/academy/lesson/ magnetic-
storage-definition-devices-examples.html
10 ―Floppy Disks‖ Retrieved from https://www.igcseict.info/theory/3/mag/index.html
11 ―Hard Disks Drives‖. Retrieved from https://www.computerscience.gcse.guru/
theory/storage-devices
12 ―Flash Memory Devices‖. Retrieved from https://www.computerhope.com/
jargon/f/flashmem.htm
13 ―Pros and Cons of Cloud Storage Devices‖. Retrieved from https://rsscloud.org/
pros-and-cons-of-cloud-storage/
14 ― Data Management‖. Retrieved from https://www.cio.com/article/2382585/14-
things-you-need-to-know-about-data-storage-management.html

145
UNIT 02
Operating Systems, Networks and
the Internet

Unit-02: Lessons Composition

I. Lesson 5: Operating Systems


Duration: 3 Hours per week (Week 5)

II. Lesson 6: Networking Basics


Duration: 3 Hours per week (Week 6)

III. Lesson 7: Data Communications


Duration: 3 Hours per week (Week 7)

IV. Lesson 8: Presenting the Internet


Duration: 3 Hours per week (Week 8)

146
Lesson 5: Operating Systems
Duration: 3 Hours per week (Week 5)

INTRODUCTION
The most important program running on a computer is the operating system
(OS). Any general-purpose computer must have an operating system to run other
software and programs. Computer operating systems performs simple task such as
identifying keyboard inputs, sending data to the display screen, monitoring files and
directives on hard drives, and controlling peripherals.

An operating system is a program that performs all critical task such as file
management, memory management, process management, input and output
handling, and controlling peripheral devices such as disk drives and printers.

An operating system is a program which acts as a user-computer hardware


interface and controls the execution of all kinds of programs.

There are operating systems from the very first generation of computers and
they tend to develop over time. These are the most widely used important types of
operating systems.

147
OBJECTIVES/COMPETENCIES:

 Understand the basic role of operating system


 Explain the major operating system software and their functions
 Demonstrate effective and equal distribution of services between users and
programs through the operating system
 Understand the basic concepts related to memory management.
 Demonstrate the different techniques in memory management.
 Analyze the different strength and weaknesses of different operating systems
in order to harness each OS‘s individual strength for technological benefit.

A pre-test of your computer knowledge…

 What are the Types of Operating Systems?


______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________

 What are the main functions of OS?


______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________

 What are the Common Operating System?


______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________

148
Lesson 5.1 – WHAT IS AN OPERATING SYSTEM?

An operating system, or "OS", is software that communicates with the


hardware and makes it possible to run other programs. It consists of the system
software or the primary files that your machine requires to boot up and run. Every
desktop computer, tablet, and the smartphone comes with an operating system that
provides the device with basic functionality.
Popular operating systems on desktops include Windows, OS X, and Linux.
While each OS is different, most have a graphical user interface or GUI, that consists
of a desktop and file and folder management capability. Windows and Linux can be
built on standard PC hardware, while Apple systems are configured to run OS X.
Hence the hardware you select will impact the operating system(s) you will run.
Mobile devices, including tablets and smartphones, also have operating
systems that have an Interface and are capable of running games. Popular mobile
operating systems include Android, Windows Phone, iOS, and. These operating
systems are primarily created for handheld devices and are therefore built around
the input of the touchscreen.
Since the operating system acts as the virtual user interface for a computer, it
greatly affects how you communicate with the software. Too many people tend to
use a particular operating system. For example, one user may prefer using a
computer with OS X instead of a Windows-based Laptop. Another user may select
an Android-based smartphone rather than an iPhone running the iOS.
When software developers develop applications, they must write and compile
them for a particular operating system. This is because each OS interacts differently
with the hardware and has a specific application program interface or API, the
programmer must use that. Although several standard programs are cross-platform,
meaning they were designed for multiple OSs, some are available only for a single
operating system. So make sure the operating system supports the programs you
want to run when buying a computer.

149
There is an operating system from the very first generation of computers, and
they tend to develop over time. These are the most widely used essential types of
operating systems.
1. Bach operating system
2. Multitasking/Time-sharing operating system
3. Multiprocessing Operating System
4. Distributed operating system
5. Network Operating system
6. Real-Time Operating System
7. Mobile Operating System

5.1.1 - Batch Operating System


Batch processing is a software and hardware technique in which an Operating
System, in batch events, gather the programs and data together in a batch before
any software processing starts. In batch processing, the OS firstly defines a task
which has predefined sequence of instructions and commands, programs and data
as a single unit. In Batch operating system, users are not directly interacting with the
computer. Each user prepares his job, like punch cards, on an offline device and
submits it to the computer operator. Jobs with similar needs are batched together to
speed up processing and run as a group. The programmers submit their programs to
the operator, and the operator then sorts the programs into batches of identical
specifications.

Below are the weaknesses or the problem encountered with the batch operating
system.

 Lack of user contact with the task and need to master most of the tasks of the
operating system.
 CPU is often idle, as mechanical I/O devices are slower than the CPU
 Hard to give desired priority to other programs
 It is hard to debug programs in batch operating systems.
 It is sometime costly.
150
5.1.2 – What is Multitasking/Time-sharing in Operating Systems?

Time-sharing is a strategy that allows several users to use a single computer


device located at various terminals simultaneously. Multiprogramming is a logical
extension of time-sharing or multitasking. The processor‘s time that is shared by
multiple users at the same time is call time-sharing. Below are the advantages and
disadvantages of operating systems in reference to its time-sharing capability:

Advantages of Time-sharing Disadvantages of Time-sharing


Operating System Operating system
 Provides the advantage of speedy  Reliability Problem
response
 Avoids software duplication  Question of user programs and
data security and integrity
 Reduces idle time on CPU  Data Communication Problem

5.1.3. Multiprocessing Operating System


In a single processor, only one operation is executed at a time in a
uniprocessor system. Multiprocessing is the use of two or more CPUs (processors)
in a single computer system. The terminology also refers to the ability of a system to
run more than one processor in a single computer system. Now that several
processors are available, multiple processes can be run at a time. These multi-
processors often share the network bus, usually the clock, memory, and peripheral
devices.

Difference between Multiprogramming and Multiprocessing

A computer system can be multi-programmed by running several programs


simultaneously and multi-processing by providing more than one physical processor.
The distinction between multiprocessing and multiprogramming is that
multiprocessing is essentially running several processes simultaneously on multiple
processors, while multiprogramming is keeping numerous programs in main memory
and running them simultaneously using a single CPU only.
151
Multiprocessing occurs through parallel processing, while multi-programming
occurs by switching from one process to another (a phenomenon called context
switching).

5.1.4. Distributed Operating Systems

Distributed systems are those machines that use multiple central processors
to support numerous programs and various users in real-time. Information
processing jobs are accordingly distributed among the processors. The processors
communicate with each other through different lines of communication (such as high-
speed buses or telephone lines). Those are called as loosely coupled systems or
distributed systems. The size and role of the processors within a distributed system
can vary. Such processors are referred to as web pages, servers, machines, etc.

Advantages of Distributed Systems

 With resource sharing system, the user at one location can be able to use the
available resources at another.
 Speed up the exchange of data through electronic mail.
 When one location fails in a distributed network, the remaining sites can
theoretically continue to function.
 Enhanced services to the client
 Load reduction on a host computer.
 Elimination of the data processing delays.

5.1.5 - Network Operating System

A network operating system operates on a server and gives the server the
ability to handle data, users, groups, protection, applications, and other networking
functions. The network operating system‘s primary function is to allow shared file and
printer access between multiple computers in a network, usually a local area network
(LAN), a private network, or other networks.

152
Network Operating System:

Advantages Disadvantages
 Very Reliable Centralized Servers.  Massive procurement and server
 The server handles privacy operation costs.
 Innovative technologies and  For most activities-reliance on
Hardware enhancements can be the central location
easily incorporated into the  Needs daily maintenance and
program. upgrades
 Various locations and types of
system is possible to access to
servers

The table above shows the advantages and disadvantages of network OS.

5.1.6 - Real-Time Operating System

A real-time operating system is defined as a data processing system where


the time interval required for processing and responding to inputs is so small that the
environment is controlled. The system‘s delay in responding to input and presenting
the necessary, updated information is called response time. The response time in
this system is, therefore, much less than in online processing.

Real-time systems are used when the operation of a processor requires a


tough time, or the data flow and real-time system can be used as a control device in
a dedicated application. An operating system in real-time must have well-defined
fixed time constraints; otherwise, the system fails. Examples of scientific experiments
are medical imaging systems, industrial control systems, weapons systems, robots,
air traffic control systems, etc. There are two types of the real-time systems and they
are:

1. Hard real-time systems


Rigid real-time systems ensure vital tasks are performed on time. Secondary
storage is limited or lacking in hard-time real-time systems and the data is stored in
ROM. Virtual memory is practically never found in those systems.

153
2. Soft real-time systems
Soft real-time systems are less restrictive. A vital activity in real-time takes
precedence over other tasks and holds the priority until it is complete. Soft real-time
systems have limited usefulness compared to rigid real-time systems. Examples are
multimedia, virtual reality and Innovative Research Ventures such as underwater
discovery, planetary rovers, etc.

5.1.7 - Mobile OS
Mobile operating systems are those
operating systems that are mainly designed
to power devices such as smartphones,
tablets, and wearable. Android and iOS are
some of the most common mobile operating
systems, but others include BlackBerry, Web,
and watchOS.

The main task performed by an


operating system is allocating resources and
facilities, such as allocating; memory,
computers, processors, and information. The Operating system illustration

operating system also includes programs to manage these resources, such as a


traffic controller, a scheduler, a module for memory management, I / O programs,
and a file system.

Lesson 5.2 - Core Functions of Operating System


Below are the essential functions of the operating system.
5.2.1 - Memory management
5.2.2 - Processor Management
5.2.3 - Device Management
5.2.4 - File management

154
5.2.1 - Memory Management
Memory management refers to the management of Primary Memory or
Central Memory management. Main memory is a broad array of words or bytes with
every word or byte having their address. Main memory provides fast storage, which
can be directly accessed by the CPU. To execute a program, it must be in the main
memory. An operating system performs the following memory management tasks:

 Keeps tracking of primary memory, that is, which part of it is used by


whom, which part is not in use.
 Through multi-programming, the OS determines when and how much
memory can get from the operation.
 Allocates the memory when a process asks for it.
 De-allocates the memory when a process doesn't need it anymore or is
terminated.

5.2.2 - Processor management

 In multiprogramming settings, the OS determines when and for how much


time the processor gets. This task is called process scheduling.
 Keeps processor records‘ and process‘ status. The software which is
responsible for this function is called the traffic controller.
 Assign Processor (CPU) to a process.
 De-allocates processor when no other process is needed.

5.2.3 - Device Management


An operating system manages communication with devices through their
respective drivers. This performs the following device management tasks:

 Keeps all devices monitored. An input-output (I/O) controller is regarded


as the software responsible for this function.
 Decide what process the system gets when and for how long.
 Allocates efficiently to the device.

155
 De-allocates devices.

5.2.4 - File Management


For quick access and usage, a file system is usually organized into folders.
Such directories can include files, as well as other directions. An Operating System
performs the following file management tasks:

 Keeps track of data, location, uses, status, etc. The combined services are
sometimes referred to as file systems.
 Decides who gets the resources.
 Allocates the resources.
 De-allocates the resources.

Other Tasks of OS:


 Security - This prevents unauthorized access to programs and data with the
password and similar other techniques.

 Control over system performance- Recording delays between a service


request and device reaction.

 Job accounting - Keep track of the time and resources used by numerous
jobs and users.

 Error detecting aids - Production of dumps, traces, error messages, and


other debugging and error detecting aids.

 Coordination between other software and users - Coordination and


distribution to the different computer system users of compilers, interpreters,
assemblers, and other applications.

5.3 – Details of Operating System’s Memory Management

Memory management is the operating system feature that handles or controls


primary memory and transfers processes back and forth during execution between
main memory and disk. Memory management maintains track of and every memory
156
position, irrespective of whether it's assigned to any method or free. It checks how
much memory to delegate to processes. It decides at what time which process will
get the memory. It monitors whenever a certain memory is freed or unallocated and
updates the status accordingly.

5.3.1 - Process Address Space

Process address space is the collection of logical addresses referenced by a


process in its code. For instance, addresses can range from 0 to 0x7fffffffff when 32-
bit addressing is in use; that is, 2^31 possible numbers, for a total theoretical size of
2 gigabytes.

Process address space is the collection of logical addresses that a process


references in its code. For instance, addresses can range from 0 to 0x7fffffffff when
32-bit addressing is in use; that is, 2^31 possible numbers, for a total theoretical size
of 2 gigabytes.

At the time of memory allocation to the application, the operating system


takes care of mapping the logical addresses to physical addresses. Before and after
memory is allocated, there are three types of addresses used in a program and are
shown in the table below:

Memory Addresses & Description


1 Symbolic addresses The addresses used in a source code. The variable
names, constants, and instruction labels are the
basic elements of the symbolic address space.

2 Relative addresses At the time of compilation, a compiler converts


symbolic addresses into relative addresses

3 Physical addresses The loader generates these addresses at the time


when a program is loaded into main memory.

In compile-time and load-time address-binding systems, virtual and physical


addresses are the same. In the execution-time address-binding system, virtual and
physical addresses vary.

157
A logical address space is called the set of all logical addresses created by a
program. The set of all physical addresses that correspond to these logical
addresses is called physical address space.

5.3.2 - Static versus Dynamic Loading

When loading, the absolute program (and data) is loaded into memory with
static loading so that execution can begin.
If you use dynamic loading, the dynamic library routines are stored in a re-
locatable form on a disk and are loaded into memory only when the program
requires them.

5.3.3 - Swapping
Swapping is a method in which a process may be temporarily switched to a
secondary storage (disk) from the main memory (or moved) and made available to
other processes. The machine swaps the operation back from the secondary storage
to the main memory at some later stage.
Although performance is typically affected by the process of swapping, it
helps to run several and large processes in parallel, and that is why swapping is

Memory compaction
technique or swapping
method of an operating
system

158
often known as a memory compaction technique.
The cumulative time taken by the process of switching includes the time it
takes to transfer the whole process to a secondary disk and then to copy the process
back to memory, as well as the time it takes to regain the main memory.

5.3.4 - Memory Allocation Partitions

Main memory usually has two partitions:

 Low Memory − Operating system resides in this memory.


 High Memory − User processes are held in high memory.

5.3.5 - Memory Allocation Methods

The operating system uses the following methods for allocating the memory:

a. Single-partition allocation
Relocation-register scheme is used in this form of allocation to secure user
processes from each other, and from changing operating system code and data.
Relocation register contains the lowest physical address value, while limit register
contains a number of logical addresses. Each of logical address must be less
than the limit register.

b. Split-partition allocation
In this form of allocation, the main memory is split into a number of partitions
of fixed size, where each partition should contain only one process. A process is
selected from the input queue when a partition is free, and loaded into the free
partition. The partition becomes available for another process once the process
terminates.

5.3.6 - Fragmentation

The free memory space is divided into little bits as processes are loaded and
removed from memory. It occurs after processes can't be assigned to memory
159
blocks often despite their limited size, and memory blocks stay unused. This problem
is called fragmentation. There are two forms of fragmentation- internal and external
fragmentation.

 External fragmentation
Total memory space is adequate to fulfil a request or exist in a process,
but is not continuous, so it cannot be used.

 Internal fragmentation
Memory block assigned to process is bigger. Any portion of memory is
left unused, as other method cannot access it.
The diagram below illustrates how fragmentation can cause memory waste
and how a compaction technique can be used to generate more free memory from
fragmented memory.

Fragmentation and defragmentation of memory to save spaces

External fragmentation can be reduced to put all free memory in one wide
block by compacting or shuffling memory contents together. Relocation should be
dynamic to make compaction possible.
160
The internal fragmentation can be reduced by successfully assigning the
smallest partition but large enough for the process.

5.3.7 - Paging

A computer can address more memory than the physically installed amount
on the system. Actually, this extra memory is called virtual memory and it is a part of
a hard drive set up to replicate the RAM of the device. Paging technique plays an
important part in virtual memory implementation.

Paging is a memory management method in which process address space is


divided into blocks of the same size called pages (size is power of 2, between 512
bytes and 8192 bytes). In the number of pages, the scale of the operation is
calculated. Similarly, the main memory is split into small fixed-sized blocks of
(physical) memory called frames and the size of a frame is kept the same as that of
a page so that the main memory is used optimally and external fragmentation
prevented.

Memory paging activity of an operating


system

161
 Page Address Translation

Page address is called logical address and represented by page number and
the offset.

Logical Address = Page number + page offset

 Frame Address Translation

Frame address is called physical address and represented by a frame number


and the offset.

Physical Address = Frame number + page offset

A data structure called a page map table is used to keep track of the relation in
physical memory between a page of a process and a frame.

162
When a frame is allocated to any page by the system, it converts this logical
address into a physical address and generates an entry in the page table to be used
during program execution.

When executing a process its corresponding pages will be loaded into any
available memory frames. Suppose you have an 8Kb program, but at a given point in
time your memory can handle only 5Kb, then the paging principle will come into the
picture. The operating system (OS) can transfer unused or unnecessary memory
pages to secondary memory when a machine runs out of RAM, to free up RAM for
other processes and carry them back when the program needs them.

This process continues during program execution, where the OS continues to


erase idle pages from the main memory and write them to the secondary memory
and put them back when the program needs.

Advantages and Disadvantages of Paging

 Paging decreases external fragmentation, but internal fragmentation still


suffers.
 Paging is easy to implement and believed to be an effective strategy for
memory management.
 Since the pages and frames are of equal size, swapping becomes very
straightforward.
 Page table requires extra memory space, so a system with small RAM might
not be good for that.

5.3.8 - Segmentation

Segmentation is a technique of memory management where each job is split


into many segments of different sizes, one for each module that includes parts
performing similar functions. In reality, each segment is a separate logical address
space of the program.
163
The corresponding segmentation is loaded into non-contiguous memory when
a process is to be executed, while every segment is loaded into a contiguous block
of usable memory.

Memory management for segmentation functions very similar to paging, but


here segments are of variable length where they are fixed in size as in paging pages.

A segment of the program includes the key function of the program, utility
functions, data structures etc. The operating system maintains a segment map
table for each process, along with segment numbers, their size and corresponding
memory locations in the main memory, and a list of free memory blocks. The table
stores segment starting address and segment length for each segment. A memory
location reference includes a value which identifies both a segment and an offset.

Segmentation using a map table between the processor and main memory

164
Lesson 5.4 - Common Operating System

History of the Operating System

 In the late 1950s, operating systems were first built to handle tape storage.
 The General Motors Research Lab introduced the first OS for their IBM 701 in
the early 1950s.
 In the mid-1960s, operating systems began using the disks.
 The first version of the Unix OS had been created in the late 1960s.
 Microsoft's first built OS was DOS. It was founded in 1981 when a Seattle
company purchased the 86-DOS program.
 First came into existence in 1985, when a GUI was developed and combined
with MS-DOS, the current standard Windows OS.

Microsoft Windows, macOS, and Linux are the three most popular operating
systems for personal computers. Current operating systems are using a graphical
user interface, called GUI (gooey pronounced). A GUI allows you to use your mouse
to select icons, buttons, and menus, and with a mixture of graphics and text, it will be
clearly shown on the screen.

Windows

Microsoft Windows (also known as Windows or Win) is a graphical operating


system that Microsoft develops and publishes. It offers a way to store files, execute
programs, play games, view images, and connect to the Internet. Microsoft
Windows was first released on November 10, 1983, with version 1.0. After that, more
than a dozen Windows versions were released, including the latest edition, Windows
10.

165
Linux OS

Linux is one of the standard versions of the UNIX operating System. It is


open-source since its source code is publicly available. Usage is safe. Linux was
developed concerning compatibility with UNIX. Its list of functions is somewhat close
to that of UNIX.

Linux is an operating system that is similar to Windows, iOS, and Mac OS. In
reality, the Linux operating system drives one of the planet's most popular platforms,
Android. An operating system is a software that controls all of your desktop or
laptop's hardware resources. The OS handles the communication between your
software and your hardware to put it clearly. The program does not work without the
Operating System (OS).

macOS

Apple Inc. produces Mac-OS, which is available on all Macintosh computers.


It was initially named "Mac OS X" and later "OS X." NeXT founded MacOS in the
1980s, and Apple bought the company in 1997. The proprietary macOS and OS X
program runs on Apple and Macintosh computers.

Apple’s iOS

Apple's iOS is another mobile operating system that is primarily used for
iPhones and iPads, some of the market's most common mobile devices. iOS began
version 1 and went up numerically for every update (1.1, 1.2, 2.0, etc.).

Unix Operating System

Initially, Unix was written in assembly language. It was subsequently replaced


by C and Unix, rewritten in C, and transformed into a broad, complicated family of
interrelated operating systems. The largest groups are BSD and Linux.

Let us reflect…

166
Operating System is the ―middleman‖ between man and computer. Man can
only utilize and optimize the power of the hardware if the OS of that hardware gives
a better performance as platform to run other computer programs.
As a student, how can you develop your knowledge base and skills about the
operating system? Do you think in five or ten years‘ time, you can design and create
your own operating system to suit whatever interaction requires between your
computer system and particular user intention. Can you establish a desire and vision
of that future of yours as an IT professional? Reflect and focus on that mind-set.

How much have you learned?


POST-TEST FOR LESSON 5

Name: __________________________________ Date: ____________________


Course & Section: ________________________ Result: __________________

Direction: Answer the following:

Direction: Identify and write your correct answer on the blank before the number.
____________ 1. users aren‘t directly interacting with the computer
____________ 2. are those operating systems that are particularly designed to
power devices such as smartphones, tablets, and wearable.
____________ 3. The most important program running on a computer.
____________ 4. operates on a server and gives the server the ability to handle
data, users, groups, protection, applications, and other networking functions.
____________ 5. Keeps tracking of primary memory, that is, which part of it is used
by whom, which part is not in use.
____________ 6. manages the communication with devices through their respective
drivers.
____________ 7. is a strategy that allows several users to use a single computer
device located at various terminals simultaneously.
____________ 8. also refers to the ability of a system to run more than one
processor in a single computer system.
____________ 9. is defined as a data processing system where the time interval
required for processing and responding to inputs is so small that the environment is
controlled.

167
____________ 10. use multiple central processors to support multiple programs and
multiple users in real time.
____________ 11. is a method in which a process may be temporarily switched to a
secondary storage (disk) from the main memory (or moved) and made available to
other processes.
____________ 12. is a memory management method in which process address
space is divided into blocks of the same size
____________ 13. The operating system maintains a _______for each process,
along with segment numbers, their size and corresponding memory locations in the
main memory, and a list of free memory blocks.
____________ 14. is a technique of memory management where each job is split
into many segments of different sizes, one for each module that includes parts
performing similar functions.
____________ 15. Memory management is the operating system feature that
handles or controls primary memory and transfers processes back and forth during
execution between main memory and disk.

Lesson 5 Final Requirements:

Write a research article (not less than 500 words) on the following topics that
will be submitted in a week time.

 Discuss the basic algorithm of an Android operating system.


 If you will design your own operating system, in what hardware you are
intended to create that OS and why?

Suggested Readings:

 Books/Journals:
o Create Your Own Operating System 1st Edition by Mr Lucus S Darnell
o Modern Operating Systems 4th Edition by Andrew Tanenbaum
o Operating Systems Design and Implementation 3rd Edition by Andrew
Tanenbaum and Albert Woodhull
o Operating System Concepts 9th Edition by Abraham Silberschatz
168
o Operating Systems: Principles and Practice 2nd Edition by Thomas
Anderson and Michael Dahlin
o ―EOS: Enterprise Operating Systems‖. Rahme, J., Gregory, Y., Chen,
D., 2017. University of Bordeaux, Bordeaux, France, International
Journal of Production Research
o Operating Systems, Steven Hand, Michaelmas Term 2015

 Websites:
o ―The 10 Operating System Concepts Software Developers Need to
Remember‖, https://medium.com/cracking-the-data-science-
interview/the-10-operating-system-concepts-software-developers-
need-to-remember-480d0734d710Wired.com
o ―Trends and Issues of Windows Operating System‖. Blogs.window.com
o ―Operating Systems Tutorials and Courses‖. https://hackr.io/tutorials/
learn-operating-systems
o ―Introduction to Operating Systems‖. www.udacity.com
o ―Hack The Kernel‖. www.ops-class.org
o ―Operating Systems Introduction‖. www.w3schools.in
o ―Operating Systems Tutorial‖. www.geeksforgeeks.org
o ―Fundamentals of Algorithms‖. www.geeksforgeeks.org

169
REFERENCES

1 Operating System Tutorial. (n.d.). Retrieved September 06, 2020, from


https://www.tutorialspoint.com/operating_system/index.htm

2 Data Communication & Computer Network. (n.d.). Retrieved September 08,


2020, Retrieved from https://www.tutorialspoint.com/data_communication
_computer_network/index.htm

3 What is Linux? (n.d.). Retrieved September 08, 2020, from


https://www.linux.com/what-is-linux/

4 Vanshgaur14866Check out this Author's contributed articles., Vanshgaur14866,


& Check out this Author's contributed articles. (2020, June 02).

5 Data Communication over Telephone Lines Using Modems. Retrieved September


08, 2020, from https://www.geeksforgeeks.org/data-communication-over-telephone-
lines-using-modems/

6 What is the Operating System? Types of OS & Features. (n.d.). Retrieved


September 08, 2020, from https://www.guru99.com/operating-system-tutorial.html

7 Computer Network Introduction - javapoint. (n.d.). Retrieved September 08, 2020,


from https://www.javatpoint.com/computer-network-introduction

8 History of Operating Systems. Retrieved September 08, 2020, from


https://www.tutorialspoint.com/Uses-of-Computer-Networks

9 Introduction To Computer Networks. (n.d.). Retrieved September 08, 2020, from


https://www.studytonight.com/computer-networks/overview-of-computer-networks

10 Molenaar, R. (2013). How to master CCNA. Place of publication not identified:


CreateSpace Independent Publishing Platform.

170
Lesson 6: Networking Basics
Duration: 3 Hours per week (Week 6)

INTRODUCTION
A network is essentially a set of devices and end systems that are
interconnected and able to communicate with one another. It is possibly computers,
servers, tablets, routers etc. that were interfaced and interconnected to each other.
This computer interconnection facilitates the exchange of information between them.
A network might be as big as the internet, or as small as your two home file sharing
computers and a printer.
A collection of computerized peripherals such as printers and interconnected
computers is called a computer network. This interconnection between computers
allows the exchange of data between computers. Computers can be linked by either
wired or wireless media.

OBJECTIVES/COMPETENCIES:

 Understand the basic of computer networks.


 Able to define and illustrate the ins and out of networking.
 Understand the different uses of computer networks.
 Understand and analyse network topology.
 Analyse the design and interconnections of network peripherals and network
hardware devices.
 Understand what are routers and its types.
 Describe the functions and benefits of a router.
 Able to design the basic interconnection of different computers and network
devices.

171
A pre-test of your computer networks knowledge…

 What is network media?


______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________

 What are the common types of Networks?


______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________

 What are network topologies?


______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________

172
Lesson 6.1 – Computer Network

Computer networks are built on specialized devices such as switches, routers,


and access points. Link switches support secure computers, printers, servers, and
other devices to networks in homes or organizations. Access points are switches that
link devices without using cables to network systems.
There is more to digital networks than communication. Organizations are
embarking on digital transformation. Their systems are essential to the transition and
its progress.

6.1.1 - Uses of Computer Network

Computer networks have been essential for both individuals and organizations.
Some of its primary use includes:

 Resource sharing: Resource sharing is the sharing of resources such as


programs, printers, and data between network users without the need for the
help and user's physical location.

 Server-Client model: The Server-Client model uses computer networking. A


server is a central computer used by the system administrator to store the
information and manage it. Clients are devices used to access the information
that is stored on the server remotely.

 Communication Medium: The computer network serves as a means of


communication between users. For example, an organization has more than
one machine that has an email system that the workers use to communicate
every day.

173
 E-commerce: Computer network is also essential for enterprises. Most
businesses today are being done over the internet. Amazon.com, Shopee,
Lazada, for example, does its business over the internet, i.e., they do their
business over the internet. Due to the pandemic it struck the world, and people
are now pushed to do their business over the internet.

6.1.2 Reasons of Network Usage


1. Applications: Software data transfer, file sharing.
2. Resources: network cameras, network printers.
3. Storage: Your storage will be made available on the network using the
NAS (Network Attached Storage). Nowadays, many people use one at
home to share files, videos, and images between computers.
4. Backup: Use a central backup server to which all computers send backup
data to.
5. VoIP: Voice over IP is becoming more and more important, and replacing
analog telephony every day.

We all use applications daily but we can classify them into three separate groups
if we look at them from a network-minded view:

 Batch Applications
o File transfers like FTP, TFTP, perhaps an HTTP download. It could be
a backup at night.
o No direct human interaction.
o High bandwidth is necessary but not critical.
 Interactive Applications
o Human-to-Human interaction
o Someone is waiting for a response, so response time (delay) is
essential.
 Real-Time Applications
o Also Human-to-Human interaction
o VoIP (Voice over IP) or live video conferencing.
o End-to-end delay is critical.
174
In general, the classification of networks is based on their geographical range. A
network that spans the entire geographical globe can be as small as the distance
between your cell phone and its Bluetooth headset, and as big as the internet itself.

Lesson 6.2 - Common types of Networks

Networks can be classified according to scale, complexity, safety level, or


geographical range. We will discuss some of the most common geographically
spread topologies.

6.2.1 - Personal Area Network


A Personal Area Network (PAN) is the
smallest network that a user considers very
personal. These could include devices enabled
by Bluetooth or devices enabled by infrared. PAN
has a range of access to up to 10 meters. PAN
can consist of the keyboard and mouse wireless
computer, headphones activated by Bluetooth,
wireless printers, and TV remotes.
On the image above a home network, a
person can connect his laptop, smartphone, personal digital assistant, and portable
printer. This network could be fully Wi-Fi or a wired and wireless combination.

6.2.2 - Local Area Network


The Local Area Network (LAN) is commonly considered a computer network
spanned within a building and ran under a single administrative structure. Usually,
LAN covers offices, schools, colleges, or universities within an organization. The
number of LAN-connected systems may vary from a minimum of two to as much as
16 million.

175
The LAN offers a convenient way for
end-users to share the network. Computers
can conveniently share resources such as
printers, file servers, scanners, and the
internet.
The LANs are made up of cheap
networking and routing equipment. They that
contain local servers that serve file storage
and other applications were shared locally. It operates mainly on private IP
addresses and does not require heavy routing. LAN works within its local jurisdiction
and is centrally regulated.
Either Ethernet or Token-ring technology is used in LAN. Ethernet is LAN
technology most commonly used and uses Star topology, although Token-ring is
seldom used. LAN can be wired at once, wirelessly, or in both ways. A complete
wireless LAN is called Wireless LAN or WLAN.

6.2.3 - Metropolitan Area Network


The Metropolitan Area Network (MAN) generally expands across a city such
as a cable television networks. This can be in Ethernet, Token-ring, ATM, or Fiber
Distributed Data Interface (FDDI) formats.
Metro Ethernet is a service that ISPs provide. This service helps its users to
extend their networks within the local region. MAN, for instance, can help an
organization connect all of its
offices in a town.
MAN is a network that
extends over a town, a college
campus, or a small region.
MAN is larger than a LAN and
is usually several kilometers
long. MAN's objective is to
share resources in the

176
hardware and software, thereby reducing infrastructure costs. MAN can be created
by connecting multiple LANs.
MAN's backbone is high-capacity and high-speed optics for fiber and interacts
with the Local Area Network and Wide Area Network. MAN provides the uplink to
WANs or the internet for LANs.

6.2.4 - Wide Area Network


WAN or Wide Area Network stretches around a nation or several countries.
Usually, WAN is a network of several LANs, MANs, and WANs. Depending on
availability and reliability, the system is set up using wired or wireless connections.
The Wide Area Network (WAN), as the name implies, encompasses a broad region
that can span provinces and even a whole world. Telecom networks are usually
Wide Area Networks. Such systems have MANs and LAN connections. The WANs
use costly network hardware as they are fitted with a very high-speed backbone.

WAN may use advanced technology such as Asynchronous Transfer Mode


ATM, Frame Relay, and Synchronous Optical Network (SONET), for example.
Multiple administrations can administer WAN.

177
Lesson 6.3 - Network Topologies

A Network Topology is the arrangement that connects computer systems or


network devices to one another. Topologies can describe both the network's physical
and its logical aspects. In the same network, both logical and physical topologies
may be the same or different.
We have different types of "Topologies" when looking at networks, and we have
two different topologies - physical topology and logical topology.
There's a significant distinction between the two there. The physical topology is
what the network looks like and how it links all the cables and computers. The logical
topology is the path through physical topology which our data signals take.
Physical topologies have multiple types:

6.3.1 Bus topology


It was essentially just one long cable,
and it was connected to every computer. You
have had to put a terminator at the end of the
line. When the cable breaks down,
otherwise, the network will be down.

Advantages of Bus Topology Disadvantage of bus topology


 Easy to install and maintain  Troubleshooting is challenging
because there is no single control
point
 Can be extended easily  One faulty node can bring down the
entire network
 Very reliable because of a single  Can't link dumb terminals to the bus
transmission line

Advantages and Disadvantages of Bus Topology

178
6.3.2 - Ring Topology
All computers and network
devices are linked to each other through
a cable, and the last two devices are
connected to form a "loop." If your
network breaks down, your line is down.
There's also a "dual-ring" redundancy
system, which is just another cable to
make sure you don't go down if one
cable splits the network.
When a terminal is required to
send data, it transmits it to the neighbouring node that transmits it to the next. Data
can be amplified before further transmission. Data ravers the network in this way and
enters the destination node, which eliminates it from the system. If the data arrive at
the sender, it will delete the data and then resend it. Below is a table that shows the
advantages and disadvantages of ring topology.

Advantages Disadvantages
 Small segments of cables are  Single node failure takes down the
required to connect two nodes whole network
 Ideal for optical fibers, since data  Troubleshooting is difficult, since
moves in one direction only many nodes may need to be
checked before finding a defective
one
 Possible very high transmission  Deleting one or more nodes is
rates intricate while maintaining the rest
of the network intact

Advantages and Disadvantages of Bus Topology

179
6.3.3 - Star Topology
All our computers (end devices)
are connected to a central device that
creates a star model. Nowadays, we use
this on local area networks (LAN) with a
switch in the middle. The typical physical
connections we use are UTP
(Unshielded Twisted Pair) cable. Of
course, your network is down when your
system goes down as well.
Through star topology, the server
is independently connected to each of the nodes. Even the central node is called the
server. Any data exchange between two nodes shall take place via the server. It is
the most common topology for information and voice networks as the central node,
before sending it to the destination node, can process data obtained from the source
node. Advantages and disadvantages of star topology is shown in the table below:

Advantages Disadvantages
 One node failure doesn't affect  You need long cables to link
the network every node to the server
 Troubleshooting is simple  Central node failure brings down
because defective nodes can the entire network
be automatically identified from
the central node
 The central node is always
simple to access protocols
that are needed as one of the
communicating nodes

Advantages and Disadvantages of Star Topology

180
6.3.4 - Tree Topology
Tree topology has a group of star networks linked to a Backbone linear bus
cable. It combines features of topologies both for stars and buses. Often called
hierarchical topology is a topology of trees.

Advantages of Tree Topology Disadvantages of Tree Topology


 You can easily extend the  Technical skills necessary for the
existing network setup and wired tree topology
 Point to point cabling means  Backbone cable failure leads to
faster installation and the entire network
maintenance for individual  Insecure networking system
segments  Challenging to manage for large
 Best suited for temporary networks
networks

6.3.5 - Mesh Topology


Any router is connected in the example.
This is, of course, very resistant to failure since
the failure of a single link will not bring down our
network. The downside to this system is that it is
very costly.
Hosts in Mesh topology often act as a
relay for other hosts that have no direct point-to-
point connections. Mesh technology comes in
two distinct types:

1. Full Mesh
All hosts are connected point-to-point to every single host on the network. So
n(n-1)/2 connections are needed for each new host. It provides the most stable

181
network structure of all topologies of networks. Multiple links between the sites
are required, and each router needs additional interfaces.
2. Partially Mesh
Not every host has a point-to-point connection to each other. Hosts bind in
some random way. There is this topology where we have to give some hosts
reliability out of all.

6.3.6 - Daisy Chain


This topology linearly links all the hosts. Similar to a Ring topology, all hosts,
except the end hosts, are only connected to two hosts. Means, if the end hosts are
connected in the daisy chain, then it represents Ring topology.

Every connection in the topology of the daisy chain represents a single fault
point. Each failed connection divides the network into two parts. Each intermediate
host functions as a relay for its immediate hosts.

6.3.7 - Hybrid Topology


It's said that a network structure
whose architecture includes more than
one topology is a hybrid topology.
Hybrid topology inherits the merits and
demerits of all the topologies combined
in it.
The picture shows an arbitrarily
hybrid topology. Combining topologies
may contain attributes of topologies
such as Star, Ring, Bus, and Daisy-chain. Most WANs are connected via Dual-Ring
topology, and connected networks are mostly Star topology networks. The Internet is
the best example of the most extensive topology in Hybrid.
182
Lesson 6.4 - Network Media

Network Media or Transmission media is nothing but the physical media in


computer networks over which communication takes place.
For any networking to be effective, the raw data stream must be transported
over some medium from one device to another. Different transmitting media may be
used for data transfer. These transfer media can be of two types:

1. Guided − In guided media, data travel is transmitted via a fixed path through
the cabling system. Copper wires, fiber optic wires, for example.
2. Unguided − In unguided media, the transmitted data travels in the form of an
electromagnetic signal across free space. For example, radio waves, lasers,
etc.

In terms of bandwidth, speed, delay, cost per bit, ease of installation and
maintenance, etc., each transmission media has its advantages and disadvantages.

6.4.1 - Twisted Pair Cable (UTP)


A twisted pair cable comprises two plastic copper insulated wires twisted
together to form a single network or media. Just one of these two wires carries the
actual signal, and another is used to reference the ground. The twists between wires
to reduce noise (electromagnetic interference) and crosstalk are helpful.

183
An image of a twisted pair cable
In a protective covering, up to 25 twisted pairs are fitted together to form
twisted pair cables, which are the backbone of telephone systems and Ethernet
networks. Twisted pair cables are the world's oldest and most popular wiring. That is
because of the many benefits they offer. A table of advantages and disadvantages of
twisted pair cable is shown below:

Advantages Disadvantages
 Educated workers easily  Without repeaters, the signal cannot
accessible due to the shallow travel long distances
learning curve
 Can be used for both digital and  The high error rate for distances of
analog transmissions over 100 meters
 Cheapest for short distances  Very thin, and thus easily breaks
 If a part of the network is  Not suitable for broadband
damaged, the entire network will connectivity
not go down

Advantages and Disadvantages of Twisted Pair Cable

There are two types of twisted-pair cables:


1. Shielded Twisted Pair (STP) Cable
STP cables come with metal foil coated twisted wire pairs. This renders noise
and crosstalk more indifferent.
2. Unshielded Twisted Pair (UTP) Cable
UTP has seven types, each suitable for a specific use. Cat-5, Cat-5e, and Cat-
6 cables are used mostly in computer networks. UTP cables connect through
RJ45 connectors.

6.4.2 - Coaxial Cable


Coaxial cable has two copper wires. In the center lies the core wire and is
made of a solid conductor. The core is enclosed in a sheath with insulation. The

184
second wire is wrapped over the sheath, which is also surrounded in turn by the
sheath of the insulator. The cable is covered with plastic coating.

The coax cable is capable of carrying high-frequency signals because of its


structure than that of twisted pair cable. The wrapped design offers a good shield
against noise and cross-discussion. The coaxial cables provide up to 450 Mbps of
high bandwidth speeds. There are three types of
coaxial cable namely:
 RG-59 (Cable TV)
 RG-58 (Thin Ethernet)
 RG-11 (Thick Ethernet) coax cables. RG
stands for Government on Radio.

Cables are connected using the BNC and


BNC-T connectors. BNC terminator is used on
Coaxial cables are commonly used for
the far ends to terminate the line. The table cable TV and LAN connections

below shows the advantages and disadvantages


of coaxial cables:

Advantages of Coaxial Cables Disadvantages of Coaxial Cables


 Superb immunity to noise  Costly when compared with
twisted-pair cables
 At higher speeds, signals can  Not compatible with twisted
travel longer distances, e.g., 1 to combination cables
2 Gbps for 1 Km cable
 Can be used for both digital and
analog signals
 Inexpensive compared to fiber
optic cables
 Easy to install and maintain

Advantages and Disadvantages of Coaxial Cables


185
6.4.3 - Fiber optics
Fiber Optic works on the
properties of light. When light rays strike
at a critical angle, they tend to refract at
90 degrees. This property was used in
fiber optics. The core of the optic cable
is made of high-quality glass or plastic.
Light is emitted from one end of it, it
travels through it, and the other end light
detector detects light streams and
converts them to electrical data.
Fiber optic offers high-speed mode. It comes in two modes; one is fiber in
single-mode, and the second is fiber in multimode. Single-mode fiber can carry a
single light ray, whereas multimode can carry multiple light beams. Thin glass or
plastic threads are called optical fiber, used to transfer data through light waves.
Light-emitting diodes (LEDs) or laser diodes (LDs) emit light waves at the source,
which a detector reads at the other end of the spectrum.
The optical fiber cable is packaged with a bundle of these threads or fibers in
a protective shell. Such three layers are composed of each fiber, beginning with the
innermost:
 Core made of high-quality silica glass or plastic
 Cladding made of high-quality silica glass or plastic, with a lower refractive
index than the core
 Protective outer covering called buffer

Copper wires in telephone lines, internet networking, and even cable TV links
are increasingly replaced by optical fiber because transmitted data can travel long
distances without weakening. Single node optic fiber cable can have a 2 km
maximum segment length and up to 100 Mbps bandwidth. Multi-node fiber optic
cable can have up to 100 km of full segment length and up to 2 Gbps of bandwidth.

186
Advantages of Optical Fiber Disadvantage of Optical Fiber
 Bandwidth is strong  Optical fiber cables are expensive
 Immune to electromagnetic  Sophisticated technology needed for
blockage the manufacture, installation, and
maintenance of fiber optical cables
 Suitable for manufacturing and  Light waves are unidirectional,
noisy environments meaning that the full-duplex
 Signals that carry data can go transmission needs two frequencies
long distances without weakening

Advantages and Disadvantages of Optical Fiber

6.4.4 - Wireless Transmission

6.4.4.1 - Infrared Signal

For very short distance communication such as TV remote, wireless


speakers, automatic doors, handheld devices, etc., low-frequency infrared waves are
used. Infrared signals inside a room will spread but cannot penetrate walls. However,
it is considered one of the most secure transmission modes due to such a short-
range.

187
Infrared wave lies between the spectrum of visible light and the microwaves. It
has wavelengths between 700 nm and 1 mm, and frequency ranges between
300GHz and 430THz.
Infrared wave is used for communication purposes with very short range, like
television and its remote. Infrared travels in a straight line and is thus directional by
nature. Infrared cannot cross wall-like barriers because of its high-frequency
spectrum.

6.4.5 - Light Transmission

Light or optical signage is the highest most electromagnetic spectrum that


can be used for data transmission. It is done via LASER.
This appears to fly exclusively in a straight line, due to frequency light uses.
Then the sender and the receiver have to be in the line of sight. Since laser
transmission is unidirectional, the laser and the photo-detector need to be installed at
both ends of contact. The laser beam is usually 1 mm long, so it's a precision job to
align two far-off receptors, each pointing to the source of the lasers.

Laser works as Tx (transmitter), and photo-detectors works as Rx (receiver).

188
Lasers are unable to penetrate barriers, such as walls, rain, and dense fog.
Also, the laser beam is bent by the wind, temperature of the atmosphere, or change
in the path's temperature.
A laser is secure for data transmission because tap 1 mm broad laser without
interrupting the communication channel is tough.

6.4.6 - Radio Wave

Radio frequency transmission of


data is called radio-wave
transmission. We all know radio
channels that broadcast
entertainment programs. Radio
stations transmit radio waves
using transmitters, which the
receiver mounted in our devices
receives.
Antennas are used by both transmitters and receivers to radiate or absorb
radio signals. These radio frequencies can be used within the assigned range for
direct voice communication. Typically, the range is 10 miles.

Advantage of radio waves:

 Inexpensive way of exchanging information


 No land to lay cables needs to be acquired
 Apparatus installation and maintenance is cheap

Disadvantages of radio waves

 Insecure Means of Contact


 Prone to changes in weather, such as rain, thunderstorms, etc.

189
Lesson 6.5 - Network Devices

Network Devices are also called Network Hardware. Hardware equipment


used to link a network to computers, printers, fax machines, and other electronic
devices are called network devices. These devices transmit data over the same or
different networks in a fast, safe, and appropriate manner. Network devices can be
internet or intra-network devices. Many machines are mounted on the device, such
as NIC card or RJ45 connector, and others are part of the network, such as a router,
switch, and so on.

6.5.1 - Modem
A modem is a device that allows a computer to send or receive data over
cable or telephone lines. The data stored on the computer is digital, whereas only
analog data can be transmitted through a telephone line or cable wire.

The modem's primary function is to convert digital signals to analog, and vice
versa. A modem is a blend of two − modulator and demodulator devices. The
modulator transforms digital data into analog data when the computer sends out the
data. When received by the computer, the demodulator converts analog data signals
into digital data.

190
6.5.2 - Types of Modem
The modem can be categorized in many ways, such as the direction in which
it can transmit data, type of transmission line connection, mode of transmission, etc.
The modem may be of these forms, depending on the direction of the data
transmission:
 Simplex − A simplex modem can transfer data from the digital device to the
network (modulator) or network to the digital device (demodulator) in just one
direction.
 Half-duplex − A semi-duplex modem can transmit data in both directions but
only one at a time.
 Full-duplex − A full-duplex modem can transfer data simultaneously in both
directions.

6.5.3 - RJ45 Connector

Registered Jack 45 (RJ45)


connector is an 8-pin jack that devices
use to link physically to local area
networks (LANs) Ethernet-based.
Ethernet is a technology designed to
define protocols to create a LAN. The
cable used by Ethernet LANs is twisted
pairs, which at both ends have RJ45
connector pins. These pins will go into the
respective device socket and connect the
device to the network.

6.5.4 - Ethernet Card

Ethernet card, also known as the Network Interface Card (NIC), is a


component of hardware that computers use to connect to Ethernet LAN and
communicate with other devices on the LAN. The earliest Ethernet cards were

191
outside the system and had to be manually installed. It is an internal hardware
component within modern computer systems. The NIC has an RJ45 socket with
physically plugged in a network cable.

Ethernet Card

The speed of the Ethernet card may vary depending on the protocols which it
supports. Old Ethernet cards had 10 Mbps max speed. Modern cards, however,
support fast Ethernets up to 100 Mbps speed. Some cards even have 1 Gbps of
capacity.

6.5.5 - Router
A router is a hardware device in the
network layer which transmits data from one
LAN to another if both networks support the
same set of protocol. But usually, a router is
connected to at least two LANs and the
internet service provider (ISP). It receives its
data in packet form, which are data frames
with their added destination address. The
router also strengthens signals before they are
transmitted, which is why it's called a repeater,

192
too.
A router is a type of device that acts as a central point between computers
and other devices that are part of the network. It's built with holes called ports.
Computers and other computers are connected to a router using a network cable.
Now-a-day, the router is available in a wireless mode that allows computers to be
linked without any physical line.

Routing Table
A router reads the routing table to determine the best possible path the packet
will take to quickly and reliably reach its destination. Such two forms can include the
routing table:
1. Static − The routes are fed manually inside a static routing table. It is also
only suitable for minimal networks with approximately two to three routers.
2. Dynamic − The router communicates with other routers through protocols in
an active routing table to decide which routes are free. This is suitable for
wider networks where, due to a large number of routers, manual feeding may
not be feasible.

6.5.6 - Switch
A switch is a network
device that connects other devices
through twisted-pair cables to the
Ethernet networks. It uses the
technique of packet switching to
receive, store, and forward data
packets over the network. The
switch keeps a list of network
addresses of all devices that are
connected to it. It checks the destination address on receiving a packet and
transmits the packet to the appropriate port. The packets are tested for collision and
other network errors before they are forwarded. The data is delivered in full-duplex
mode.

193
The speed of data transmission in switches can be double that of other
network equipment, such as hubs used to network. This is because the switch
shares its full speed with all connected devices. This helps preserve network speed
even during heavy traffic conditions. Also, with the use of multiple switches, more
excellent data rates are achieved on networks.

6.5.7 - Gateway
A gateway is a network device used to link two or more networks of a
different system. Networks that use other protocols are dissimilar in networking
parlance. Typically a gateway is a device that has multiple NICs connected to
various networks. You can also fully configure a gateway using the software. As
networks link via gateways to another network, these gateways are typically network
hosts or endpoints.

Gateway uses the technique of packet switching to transfer data from one
network to another. Thus it is similar to a router; the main difference is that router
can only transfer data over networks using the same protocol.

194
6.5.8 - Wi-Fi Card
The acronym for wireless fidelity is Wi-Fi. Wi-Fi technology is used for
connecting wirelessly to any network. Wi-Fi card is a card used for wireless
connection of any user to a local network. Wi-Fi hotspot is called the physical area of
the system which provides internet access through Wi-Fi. Hotspots can be mounted
at home, at the workplace, or in any public place. Hotspots are linked to the network
by cables themselves.

A Wi-Fi card is used to attach features to old computers, such as


teleconferencing, digital camera picture uploading, video chat, etc. Modern
computers come with a Wireless Network Adapter built-in.

6.5.9 - What are Routers in Computer


Network?

Routers are networking devices


that run on layer 3 or an OSI model
network layer. They are responsible for
receiving, processing and forwarding
data packets among the computer

195
networks that are connected. Upon arrival of a data packet, the router checks the
destination address, consults its routing tables to determine the best route and then
moves the packet along that route. (Moumita, 2020)

6.5.9.1 - Features of Routers


 A router is a layer 3 or network layer.
 It links various networks together and transmits data packets from one
network to another.
 Both LANs (Local Area Networks) and WANs (Wide Area Networks) could be
used by a router.
 In the form of IP packets, it transfers data. It uses the IP address specified in
the destination field of the IP packet in order to transmit data.
 Routers have a routing table in it that, due to the network adjustments, is
constantly refreshed. It consults the table in order to transfer data packets and
uses a routing protocol.
 Routers share information with each other in order to prepare or update the
routing table.
 Routers defend against storms on broadcast.
 Routers are costlier than other networking devices, such as hubs, bridges,
and switches.
 Some famous companies manufacture routers, such as:
o Cisco
o D-Link
o HP
o 3Com
o Juniper
o Nortel

6.5.9.2 - Types of Routers


Depending on their use, a number of routers are available. The main types of
routers are:

196
 Wireless Router − they have WiFi link devices such as smartphones, laptops
etc. Normal Ethernet routing can also be supported by them. The range is 150
feet for indoor connections, while it is 300 feet for outdoor connections.
 Broadband routers − they are used for telephone connectivity to the Internet
and the use of voice over Internet Protocol (VoIP) technology to provide high-
speed Internet access. The Internet Service Provider (ISP) configures and
delivers it.
 Core Routers − Data packets can be routed within a given network, but they
cannot route the packets between networks. They help to connect all devices
within a network, thus forming the network's backbone. It is used for
communication interfaces and ISPs.
 Edge Routers −They are low-capacity routers positioned at the periphery of
the networks. They link the internal network to external networks, and are
suitable for network-wide transmission of data packets. For connectivity, they
use the Border Gateway Protocol (BGP). There are two types of edge routers,
edge routers for subscribers and routers for labels.
 Brouters − Brouters are specialized routers which can also provide bridge
features. Brouters help to transfer data between networks, much like a bridge.
And they route the data within network devices like a router.

6.5.9.3 - Benefits of Router


A router has so many advantages, which are given below:

1. Security: As LANs operate in broadcast mode, the router provides security.


The information is distributed through the network and passes through the
entire system of cables. Although the data is available for each station, the
data is read by the station which is directly discussed.
2. Performance Enhancement: It increases efficiency within the same network.
For example, if a network has 14 workstations, and all produce roughly the
same traffic volume. On a single network, the traffic of 14 workstations passes
via the same cable. But if the network is split into two sub-networks, each with
seven workstations, then the traffic load is cut in half. Because each network

197
has its own servers and hard disk, less PCs would therefore need the network
cabling system.
3. Reliability: Routers provide reliability. The router services and other
networks would not be affected if one network goes down when the server
has stopped, or there is a cable defect. The affected network is separated by
the routers, while the unaffected networks remain connected without
interrupting the work and losing any data.
4. Networking Range: A cable is used to connect devices in the networking
phase, but its length cannot exceed 1000 meters. A router can overcome this
limitation by performing a repeater (Regenerate Signals) feature. As long as a
router is installed before the full cable range exceeds, the physical range can
be according to the requirement of a specific installation. (javatpoint, What is
Router - javatpoint n.d.)

Let us reflect…
A world without computer networks is like a mute world. And a world without
networking devices and equipment is like a paralysed world. No one can move and
communicate from one place to another. It is a fact and truth especially in today‘s
tech-savvy world. The advent of internet, social media, e-commerce, world news and
politics, distant family relationship and communication, and many other things are
not possible without the computer networks.
As a student, how does the above affects you? How do your IT vision, if there
is, geared in the area of technology of networks? Can you put in a written document
what‘s on your mind regarding of what you want to pursue in the specialization of
computer networks? Just do it, document your thoughts of what you see in the future
of networks.

198
How much have you learned?
POST-TEST FOR LESSON 6

Name: __________________________________ Date: ____________________


Course & Section: ________________________ Result: __________________

Direction: Write the answer on the space provided.


Identification:
__________ 1. It is a card used for wireless connection of any user to a local
network.
__________ 2. It is a network device that connects other devices through twisted-
pair cables to the Ethernet networks.
__________ 3. It is the highest most electromagnetic spectrum that can be used for
data transmission.
__________ 4. It is a network device used to link two or more networks of a different
network.
__________ 5. It is a hardware device in the network layer which transmits data from
one LAN to another if both networks support the same set of
protocol.
__________ 6. A type of modem that can transmit data in both directions but only
one at a time.
__________ 7. It is connector is an 8-pin jack, which devices use to link physically to
local area networks (LANs) Ethernet-based.
__________ 8. It is used for communication purposes with very short range, like
television and its remote.
__________ 9. Comprises of two plastic copper insulated wires twisted together to
form a single network or media.
__________ 10. All our computers (end devices) are connected to a central device
that creates a star model. Nowadays, we use this on local area
networks (LAN) with a switch in the middle.

199
__________ 11. Specialized routers which can also provide bridge features. It help
to transfer data between networks, much like a bridge.
__________ 12. They are used for telephone connectivity to the Internet and the use
of voice over Internet Protocol (VoIP) technology to provide high-
speed Internet access.
__________ 13. They are low-capacity routers positioned at the periphery of the
networks. They link the internal network to external networks, and
are suitable for network-wide transmission of data packets.

True or False.

__________ 14. Network Range. It increases efficiency within the same network. For
example, if a network has 14 workstations, and all produce roughly
the same traffic volume.
__________ 15. The router services and other networks would not be affected if one
network goes down when the server has stopped, or there is a
cable defect.

Lesson 6 Final Requirements:

Write a research article (not less than 500 words) on the following topics that
will be submitted in a week time.

 Discuss the advantages and disadvantages of a network scenario that


combines all the Network Topologies in one vast internet of computer network
system.
 If you will design an automated home system, which do you think is the best
network configuration and topology that will benefits you? Explain why?

200
Suggested Readings:

 Books/Journals:
o Computer Networking: A Top-Down Approach (6th Edition) byJames
Kurose and Keith Ross. (2019)
o Network Warrior (2nd Edition) by Gary A. Donahue
o Networking All-in-One For Dummies Paperback – April 10, 2018 by
Doug Lowe
o Cisco Networking All-in-One For Dummies 1st Edition by Edward Tetz
o CompTIA Network+ Certification All-in-One Exam Guide, Seventh
Edition (Exam N10-007) 7th Edition by Mike Meyers
o Network Programmability and Automation: Skills for the Next-
Generation Network Engineer 1st Edition by Jason Edelman
o ―IEEE Guide to Communications and Computer Networks‖,
http://www.guide2research.com/journals/network-communication

 Websites:
o ―Computer Networking Tutorials‖. http://www.coursera.org/
o ―Networks and Computing‖. http://ocw.mit.edu/index.htm
o ―Networking Basics: 3 Steps to Sharpen Your Networking Skills and
Advance Your Career‖, https://www.newhorizons.com/article/
networking-basics-3-steps-to-sharpen-your-networking-skills-and-
advance-your-career
o ―Networking Tutorials‖, www.Lynda.com
o ―Mastering Computer Networks‖, www.udemy.com
o ―Networks‖, www.edx.org
o ―Computer Networks‖, www.futurelearn.com
o ―How to Network‖, https://study.com/search/text/academy.html?
q=network#/topresults/network
o ―Introduction to Networking‖, https://www.free-online-training-
courses.com/networking/
o ―All About the Networks‖, https://networklessons.com/?s=network

201
REFERENCES

1 What is Router - javatpoint. (n.d.). Retrieved September 21, 2020, from


https://www.javatpoint.com/router
2 M. (2020, July 22). Retrieved September 21, 2020, fromhttps://www.tutorialspoint
.com/what-are-routers-in-computer-network

3 Networking Basics: What You Need To Know. (2020, March 02). Retrieved
September 08, 2020, from https://www.cisco.com/c/en/us/solutions/small-
business/resource-center/networking/networking-basics.html

4 Molenaar, R. (2013). How to master CCNA. Place of publication not identified:


CreateSpace Independent Publishing Platform.
5 Operating System Tutorial. (n.d.). Retrieved September 06, 2020, from
https://www.tutorialspoint.com/operating_system/index.htm
6 Data Communication & Computer Network. (n.d.). Retrieved September 08,
2020, from https://www.tutorialspoint.com/data_communication_computer_
network/index.htm
7 What is Linux? (n.d.). Retrieved September 08, 2020, from
https://www.linux.com/what-is-linux/

8 Vanshgaur14866Check out this Author's contributed articles., Vanshgaur14866,


& Check out this Author's contributed articles. (2020, June 02). Data
Communication over Telephone Lines Using Modems. Retrieved September 08,
2020, from https://www.geeksforgeeks.org/data-communication-over-telephone-
lines-using-modems/
9 What is the Operating System? Types of OS & Features. (n.d.). Retrieved
September 08, 2020, from https://www.guru99.com/operating-system-tutorial.html
10 Computer Network Introduction - javatpoint. (n.d.). Retrieved September 08,
2020, from https://www.javatpoint.com/computer-network-introduction

11 Uses of Computer Networks. Retrieved September 08, 2020, from


https://www.tutorialspoint.com/Uses-of-Computer-Networks

12 Introduction To Computer Networks. (n.d.). Retrieved September 08, 2020, from


https://www.studytonight.com/computer-networks/overview-of-computer-networks.

202
Lesson 7: Data Communications
Duration: 3 Hours per week (Week 7)

INTRODUCTION

Data communication refers to the transmission of this digital data between two
or more computers, and a computer network or data network is a network of
telecommunications which allows computers to exchange data. Physical
communication is formed between networked computing devices using either cable
media or wireless media. The Internet is the most well-known computer network.
Data communication is the exchange of data between two devices through some
type of transmission medium, like a wire cable. The transmitting devices must be
part of a communication system consisting of a mixture of hardware (physical
equipment) and software (programs) for the data communication to occur.
The device that transmits the data is known as the source and the receiver is
known as the device that collects the transmitted data. Data communication aims at
transferring data and maintaining data throughout the process, but not the actual
generation of the information at the source and receiver. (Thakur, 2020)

OBJECTIVES/COMPETENCIES:
 Explain what the goals of communication software are.
 Analyze how computers and networks communicate to each other using the
principle and technology of data communication.
 Understand the different types of communication processes over the
telephone network.
 Understand the different physical and wireless communication devices
 Understand what is Satellite Communication and the underlying principles i=n
it.

203
A pre-test of your data communication knowledge…

Name: __________________________________ Date:____________________


Course & Section: ________________________ Result: __________________

Direction: Write the answer below the questions.

1. What is Data communication?

___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________

2. What are Wireless Networks?

___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________

3. What is satellite communication?

___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
204
Lesson 7.1 - Difference between Computer Network and
Data Communication

Computer Network:
A computer network is a set of computer systems and other hardware
computing devices that are connected via communication channels. A Computer
Network allows network-wide file sharing. It helps to navigate the site details faster
and more conveniently. It will enable remote systems to share the applications and
operating systems. Computer networks are based on the Networking area.

Data Communication:
We share information when we communicate. This sharing may be local or
remote. Local communication usually occurs face to face between individuals, while
remote communication takes place over a distance.
Both analog and digital data can be transferred mainly through these two
processes. Analog data is continuous, while digital information is discreet.

7.1.1 - Components of Data Communication System


A Communication system has following components:
 Message. It is the information or data which must be communicated. It may
consist of, or any combination of, text, numbers, photographs, sound or video.
 Sender. It is the device / computer that generates that message and sends it.
 Receiver. It is the device or machine which is receiving the message.
Generally, the location of the recipient computer varies from the sender
computer. The distance between the sender and the recipient depends on the
network forms used in between.
 Medium: This is the medium or physical path through which the message is
transmitted from the sender to the recipient. Like twisted pair wire, coaxial
cable, fiber-optic cable or wireless such as laser, radio waves and
microwaves, the medium can be wired.

205
 Protocol: It is a set of rules regulating inter device communication. Sender
and receiver both obey the same protocols in order to communicate with one
another.

A figure of a network requesting communication with each other.

7.1.2 - What is a modem?

A modem is Modulator-Demodulator in short form. A modem is a hardware


device that can connect computers and other devices, such as routers and internet
switches. Modems transform or modulate the analog signals from telephone wire into
digital form, i.e., in 0s and 1s format. Present-time modems can transmit data at 300-
2400 bps (bits per second) speeds. Two types of modulation techniques are
commonly used:
1. Frequency-shift keying (FSK) for low-speed modems.
2. Phase shift keying (PSK) for high-speed modem.

The first modems were "dial-up," which means that we need to dial a phone
number to connect the ISP to the device. Its overall transmission rate of data is
approximately 56 kbps. Modern modems are modems for DSL or cable. Compared
with dial-up modems, they have a high data transfer rate and a broader frequency
range.

206
Advantages of using Modem:
 A modem is more useful when connecting LAN to the internet.
 Modem speed depends on cost, the more the modem is costly, and the
modem is more efficient and powerful.
 A modem is most often used in roadway data communication.
 A modem translates the digital signals to analog signals.

Disadvantage of using Modem:


 The modem works only as a LAN-Internet interface.
 There is no modem traffic maintainer present.
 A modem cannot grasp the process in between.
 The modem doesn't know its route to a destination.
 A small number of devices can be paired in modems, min 8 & max 12.
 Compared to the Hub, the modem has a slow speed.

Communications software includes programs which:


1. Help users connect to another device or network;
2. Manage records, instructions, information and data forwarding and
3. Provide the users' interface to communicate with each other.

An integral
part of computer
communications is
the telephone
network. Data,
instructions, and
information are
transmitted via
dial-up lines or
dedicated lines over the telephone network. The following sections discuss dial-up
lines and the different types of dedicated lines that use the telephone network to
communicate data.

207
Lesson 7.2 - Telephone Network Communication Lines

7.2.1 - Dial-Up
A dial-up line is a temporary connection, using one or more analog
communications telephone lines. There is no permanent dial uplink. It's similar to
using the telephone to make a call using a dial-up line to send data. A modem at the
receiving end dials a modem's telephone number at the receiving end. When the
modem answers the call at the receiving end, a connection is formed, and data can
be passed on. Communications end when either modem hangs up.
Computers provide an Internet or a network connection at any two locations
using modems and the telephone network.

7.2.2 - Dedicated Lines


A dedicated line is a form of always-on connection between two
communications devices (as opposed to a dial-up line where the link is re-
established every time it is used). On a dedicated line, the efficiency and continuity
of the service are more significant than a dial-up line because dedicated lines have a
continuous link.
Businesses mostly often use dedicated lines to connect geographically
remote places. Dedicated lines may be either optical or analog. Digital cables are
increasingly connecting home and business users to global networks because they
are transmitting data and information at faster rates than analog lines.
Five types of dedicated digital lines are ISDN, DSL, FTTP, T-carrier, and
ATM lines. Although cable television (CATV) lines and fixed wireless are not a
standard type of telephone line, home users are smart ways to connect to the
Internet. Fixed wireless Internet connections use an antenna on your home or
business to communicate via radio signals to a tower location.

7.2.3 - ISDN LINES


The ISDN line provides faster transfer rates for small business and home
users than the dial-up telephone lines. Not as widely used today as in the past, ISDN
(Integrated Services Digital Network) is a set of standards for digital data
208
transmission over standard copper telephone lines. ISDN requires the ISDN modem
to have both ends of the connection. The ISDN modem at your location must be
within 3.5 miles of the ISDN modem of the telephone company. Therefore, ISDN
may not be an option for rural residents.

7.2.4 – DSL/ADSL
DSL is a standard alternate digital line for the small business or home
consumer. DSL (Digital Subscriber Line) transmits to existing analog copper
telephone wiring at fast speeds. Some DSL installations include a dial tone which
allows users to communicate both voice and data.
ADSL is one of the most common DSL-types. ADSL (asymmetric digital
subscriber line) is a form of DSL which supports faster transfer rates when data is
received (downstream rate) than when data is sent (upstream rate). ADSL is suitable
for Internet connectivity because most users download more information than they
upload from the Internet.

7.2.5 - FTTP
FTTP, which stands for Fiber to the Premises, uses fiber optic cable to
provide ultra-high-speed Internet connectivity to a permanent physical location for a
client. Two different FTTP forms are FTTH (Fiber to the Home) and FTTB (Building
Fiber). With FTTP service, the signals are received by an optical terminal at your
premises and transmitted to a router connected to your computer. As the cost of fiber
construction decreases, this high-speed Internet connection is gradually being opted
for by more households and businesses.

7.2.6 - T-CARRIER LINES


A T-carrier line is one of many types of wireless long-distance telephone
lines that carry several signals over a single line of communication. T-carrier lines
have extremely rapid data transfer speeds. Typically only medium to large
corporations can afford to invest in T-carrier lines because these lines are too costly.
The T1 line is the most common line on the T-carrier. Many companies use it
for connecting to the Internet. Many Internet service providers connect to the Internet

209
backbone using a T1 backbone. Home and small business users buy fractional T1,
in which they share a link with other users on the T1 line. Fractional T1 is slower
than a dedicated T1 line but less expensive as well.

A line T3 is equal to 28 lines T1 in speed. T3 lines are relatively costly. Large


companies, telecommunications companies, and Internet service providers
connecting to the Internet backbone are significant users of T3 cables. Even the
Internet backbone itself uses T3 lines.

7.2.7 - ATM
ATM (Asynchronous Transfer Mode) is a service providing too high-speed
voice, data, video, and multimedia. ATM is used by mobile networks, the Internet,
and other high-traffic networks. Some experts predict that ATM will eventually
become the Internet data transmission standard, replacing the T3 lines.

Lesson 7.3 - Satellite Communication

7.3.1 - What is a Satellite Communication?

In many industries, satellite communications plays a role: business continuity,


emergency management, oil and gas, IoT, healthcare, government, maritime,
mining, forestry, outdoor recreation, and more.
Each corporation in all sizes and in every sector is aware of the need for a full
emergency plan and we will be encountered Emergency Managers & Business
Continuity Managers in many organizations with very unique titles because of this.
While we understand the value of preparing as a community and that
disasters can come in man-made or nature-driven formats, we allocate the
necessary amount of budget to ensure that preparations are implemented as they
are expected to when disasters occur.

210
Last January 2020, Mt. Taal Volcano in the Philippines erupted and to some
other parts of the world. Typhoon season has come and gone and here we are once
again during the season. Then covid-19 hit the world with the same year.
Every individual with a family cannot deny the fact that we get worry in times
like these. Each phone hasn't stopped ringing for an update everywhere whether it‘s
personal or coming from social media. There the significance of satellite
communication comes in as Telcos needs to upgrade their satellite to several areas
of the country for easy communication with our love ones.
Data services for mobile satellite services that offered by the Telcos for
people are the opportunity to remain connected when disasters hit. In order to
implement their disaster recovery plans, everybody needs to have contact and price
is no longer a problem. The main issues are availability, willingness to produce, non-
jammed customer service lines and awareness of how to use the product.
Quite simply, satellite radio is a non-terrestrial microwave transmission
system which uses a space relay station. In expanding the scope of voice, data, and
video communications across the globe and into the most remote regions of the
world, satellites have proved invaluable. (Thakur, 2020)

The popularity of satellite communications has put high demands on


international regulators for the management and allocation of available frequencies,
as well as for the national, regional and international management of the limited

211
number of orbital slots available for satellite positioning. Generally speaking, to
eliminate interference from neighbouring satellites using overlapping frequencies,
geostationary satellites are located about 2° apart.

7.3.2 - Classification of Satellites

Depending on the height of the earth at which the satellites are located, they
can be listed as:
• Geostationary Satellites (GEO).
• Medium Earth Orbit Satellites (MEO).
• Low Earth Orbit Satellites (LEO).

7.3.2.1 - GEO satellites (geostationary Earth orbit):


They are satellites that travel at high altitude (35,000 km), and due to their
period, they tend to remain motionless in the atmosphere. The first GEOs had a
single space beam, called a footprint which illuminated about a third of the earth.
These beams will currently focus on tiny geographic areas (small beams).

7.3.2.2 - MEO satellites:


They are mid-Earth orbit satellites (between 5000 and 15000 km) between the
two Allen belts. It takes six hours for the World to go around, they're smaller than
GEOs, and they've got less footprint. Examples: 24 GPS (Global Positioning System)
Satellites.

7.3.2.3 - LEO satellites:


Low Earth Orbit satellites at a height of 750 km (below the two Allen belts).
Due to their speed of movement, large amounts of them are required to cover the
Earth. They have a reduced round trip delay (msec) and provide worldwide
telecommunications services through handheld devices that communicate with the
satellite.

212
Let us reflect…
Data communication, as they say, is ―married‖ to networks. A network is
useless if it is not optimize to the technology of data communication. The focus of
data communication is to share and achieve errorless information between the users
and computers. The perception of a perfect or almost perfect communication is
currently achievable in today‘s technology. Its advancement brought benefits to the
world.
Being students of ICT, how do you see the reshaping of cultures and
practices, not only in the Philippines but the whole world? In this pandemic era, how
do you perceive the current and future importance of data communication technology
in the lives of humans? You can pen and document your insights regarding the
subject matter at least in minimum 500 words of thought based on the above
reflections.

How much have you learned?


POST-TEST FOR LESSON 7

Name: _______________________________ Date: _______________________


Course & Section: _____________________ Result: _____________________

Direction: Identify and fill in the blanks with the correct answers.

__________ 1. It uses fiber-optic cable to provide ultra-high-speed Internet


connectivity to a permanent physical location for a client.
___________ 2. Its primary function is to convert digital signals to analog, and vice
versa.
___________ 3. It refers to the transmission of this digital data between two or more
computers, and a computer network or data network is a network of
telecommunications that allows computers to exchange data.

213
__________ 4. It is a temporary connection, using one or more analog
communications telephone lines
___________ 5. It is a service providing extremely high-speed voice, data, video,
and multimedia.
__________ 6. It is a form of always-on connection between two communications
devices (as opposed to a dial-up line where the connection is reestablished every
time it is used).
__________ 7.It is a common alternate digital line for the small business or home
consumer.
__________ 8. It is one of many types of wireless long-distance telephone lines that
carry several signals over a single line of communication
__________ 9. Present-time modems can transmit data at _______ bps (bits per
second) speeds.
__________ 10. What is the first modem that was invented by mankind?

True or False

__________1. Low Earth orbit satellites can be stationed at a height of 750 km


(below the two Allen belts). Due to their speed of movement, large amounts of them
are required to cover the Earth.
__________ 2. The first GEOs had a double space beam, called a footprint, which
illuminated about a third of the earth.
__________ 3. Not as widely used today as in the past, ISDN (Integrated Services
Digital Network) is a set of standards for digital data transmission over standard
copper telephone lines.
__________ 4. They are satellites that travel at high altitude (35,000 km), and due to
their period, they tend to remain motionless in the atmosphere.
__________ 5. The T1 line is the most common line on the T-carrier.

214
Lesson 7 Final Requirements:

Write a research article (not less than 500 words) on the following topics that
will be submitted in a week time.

 How does data communication helps the medical world to fight the COVID-19
pandemic?
 How data communications can helps the Philippine industry in the area of supply
chain?

Suggested Readings:

 Books/Journals:
o Computer Networking: A Top-Down Approach (6th Edition) byJames
Kurose and Keith Ross. (2019)
o Data Communication and Networks: An Engineering Approach, (2000)
Authors: Harle, D. A., and Irvine, J. I., ISBN:978-0-471-80872-5, Can
be retrieved from: https://dl.acm.org/doi/book/10.5555/557469
o Data and computer communications (2nd ed.)January 1988 by William
Haj Stallings, Macmillan Publishing Co., Inc.Div. of Simon and Schuster
201 W. 103 St. Indianapolis, INUnited States, ISBN:978-0-02-415451-4
o Data Communications and Networking, January 1, 2013 by Forouzan
o Cisco Networking All-in-One For Dummies 1st Edition by Edward Tetz
o ―IEEE Guide to Communications and Computer Networks‖,
http://www.guide2research.com/journals/network-communication

 Websites:
o ―Data Communication‖. https://www.studymode.com/essays/Data-
Communication-917250.html
o ―Networking Basics: 3 Steps to Sharpen Your Networking Skills and
Advance Your Career‖, https://www.newhorizons.com/article/
215
networking-basics-3-steps-to-sharpen-your-networking-skills-and-
advance-your-career
o ―Data Communication Tutorials‖, www.Lynda.com
o ―Mastering Computer Networks‖, www.udemy.com
o Data Communication and Networks‖, www.edx.org
o ―Computer Networks‖, www.futurelearn.com
o ―Data Communications and Network Services‖,
https://www.classcentral.com/course/data-communication-network-
services-9160

REFERENCES:

1 Thakur, D. (2020, August 09). Data Communication - What is Data


Communication? Retrieved September 21, 2020, from https://ecomputernotes.com/
computernetworkingnotes/communication-networks/what-is-data-communication

2 Slana, M., & Lehman, H. (1981). Tutorial Series 8 Data Communication Using
the Telecommunication Network. Computer, 14(5), 73-88. DOI:10.1109/c-
m.1981.220455

3 Molenaar, R. (2013). How to master CCNA. Place of publication not identified:


CreateSpace Independent Publishing Platform.

4 ―Operating System Tutorial‖. (n.d.). Retrieved September 06, 2020, from


https://www.tutorialspoint.com/operating_system/index.htm

5 ―Data Communication & Computer Network.‖ (n.d.). Retrieved September 08,


2020, from https://www.tutorialspoint.com/data_communication_computer_network
/index.htm

216
6 ―What is Linux?‖, (n.d.) Retrieved September 08, 2020, from
https://www.linux.com/what-is-linux/

7 ―Network and Computers‖ Vanshgaur14866Check out this Author's contributed


articles., Vanshgaur14866, & Check out this Author's contributed articles.
(2020, June 02).

8 ―Data Communication over Telephone Lines Using Modems‖. Retrieved


September 08, 2020, from https://www.geeksforgeeks.org/data-communication-over-
telephone-lines-using-modems/

9 ―What is the Operating System? Types of OS & Features‖. (n.d.). Retrieved


September 08, 2020, from https://www.guru99.com/operating-system-tutorial.html

10 ―Computer Network Introduction‖ - javatpoint. (n.d.). Retrieved September 08,


2020, from https://www.javatpoint.com/computer-network-introduction

11 ―Uses of Computer Networks‖, Retrieved September 08, 2020, from


https://www.tutorialspoint.com/Uses-of-Computer-Networks

12 ―Introduction To Computer Networks‖. Retrieved September 08, 2020, from


https://www.studytonight.com/computer-networks/overview-of-computer-networks

217
Lesson 8: Presenting the Internet
Duration: 3 Hours per week (Week 8)

INTRODUCTION

The Internet brought a tremendous benefit to mankind. Nowadays there are


more than 3 billion individuals online, and different smart devices get to to the Web
and many more advanced gadgets will be instrumental in bringing the following
billion individuals online.

Mobile phone and telecommunication service, which is now available and


accessible to more than 90% of the world‘s population, represented a significant
advancement in many countries where fixed service was not available to them but it
was adopted at a breathtaking rate. Upgrading networks to offer mobile Internet is an
incremental step that is being adopted even faster than mobile telephony before it.

Getting to the Web through smart gadgets isn't fair a matter of unplugging our
portable workstations, be that as it may – we utilize smartphones and tablets with a
run of highlights and sensors not accessible or required in a conventional computer.
These enable us to require and share recordings; learn exchanges and make strides
in our works; offer assistance with our wellness and individual security; and
contribute to endless other activities. These unused highlights are gotten to through
apps, not browsers, which is advancing how individuals utilize the Web.

As students of ICT, the Internet is a learner‘s needed tool of learning. There is


no more educational institution that uses not the web. Information Communication
Technology is only a buzzword if not tied to the internet itself.

This module‘s lessons are valuable not only for the basics of internet and its
technology, but to prepare the learner to engage and dive deep to the wide and vast
knowledge of the web. May your sense of technological especialty be enhanced as
you see the pool of competitive talents in the era of the Internet.

218
OBJECTIVES/COMPETENCIES:

 Understand the evolution of the Internet.


 Define the different broadband internet access.
 Understand how the internet connects to global networks.
 Determine the significance of the TCP/IP.
 Understand the type of Websites.
 Analyse more the impact of the Internet to humanity.

A pre-test of your computer Internet and network knowledge…

Name: __________________________________ Date: ____________________

Course & Section: ________________________ Result: __________________

Direction: Write TRUE if the statement is correct and FALSE if it is not.

__________ 1. The network uses radio signals to provide compatible or properly


equipped wireless computers.
__________ 2. It provides high -speed satellite Internet connections to a satellite
dish with a satellite modem.
__________ 3. It offers high-speed Internet access through a cable modem over the
cable television network.
__________ 4.This uses standard copper telephone lines to provide high speed
Internet connections.
__________ 5. This uses fiber optic cable to provide home and business users with
high-speed Internet connectivity.
__________ 6. provides high-speed Internet access to your house or company using
a dish-shaped antenna.
__________ 7. Text version of an IP address
__________ 8. The protocol, domain name, and often a link to a particular Web
page or location on a Web page.
219
__________ 9. Is a saved Web address that you can reach by clicking a list of its
name?
__________ 10.Refers to links in text-based documents while hypermedia blends
text-based links with links between images, audio, and video.
__________ 11. A topic directory classifies Web pages and associated
subcategories in an ordered set of categories, such as sports or shopping.
__________ 12. It allows users to post short messages for others to read, usually
between 100 and 200 characters, an example of this Twitter.
__________ 13. Is a location on an internet server that enables users to talk among
themselves?
__________ 14. Is an Internet protocol that enables uploading and sharing of files
over the Internet with other computers
__________ 15. Is a commercial activity happening over an electronic network like
the Internet?

220
Lesson 8.1 - Evolution of the Internet

The Web has its origins in a networking program initiated by the U.S. Agency
for Advanced Research Projects (ARPA), a Pentagon organization. The purpose of
ARPA was to create a network that (1) allowed scientists to exchange data and work
together on military and science projects at various physical locations, and (2) could
operate even if part of the network was disrupted or destroyed by a catastrophe like
a nuclear attack. In September 1969, the network, called ARPANET, became
interactive, linking scientific and academic researchers across the United States. The
original ARPANET consisted of four main computers, one each located at the
University of California at Los Angeles, the University of California at Santa Barbara,
the Stanford Research Institute, and the University of Utah. (Shelly & Vermaat, 2008)
Each of those computers served as a network host. A host, now more widely known
as a server, is any device that offers services and connections to other networked
computers. Hosts often use high-speed communications to transmit messages and
data over a network.
ARPANET experienced phenomenal growth as researchers and others
realized the primary advantage of using ARPANET for data and information
exchange. ARPANET had linked up more than 1,000 computer systems as hosts by
1984. Over 550 million hosts directly access the Internet.
To take advantage of its high-speed communications, some organizations
linked entire networks with ARPANET. In 1986, ARPANET was connected by the
National Science Foundation ( NSF) to its massive network of five supercomputer
centers, called NSFnet.
NSFnet managed the majority of the Internet networking operation, or traffic,
until 1995. NSFnet ended its network over the Internet in 1995 and regained its role
as a research network.
The Internet today is composed of several local, regional, national, and
international networks. Numerous businesses, trading firms, and other organizations
such as IBM have Internet traffic management networks. Public and private

221
organizations both own Internet networks. Such networks, along with
telecommunications companies like Verizon and AT&T, cable and satellite providers,
and the government, all contribute to the internet framework.
Every Internet organization has the sole responsibility for maintaining its
network. No single person, company, organization, or government agency controls
or governs the Internet. However, the World Wide Web Consortium ( W3C) oversees
the work and sets standards and guidelines for other Internet areas. The W3C's
mission is to help make the Web grow. Over 350 organizations from around the
world are W3C members, advice, define standards, and address other issues.

8.1.1 - Internet 2

Internet2 is a non-profit research and development initiative, linking more than


200 universities and 115 businesses via a private high-speed network. Established in
1996, Internet2 intends to build and test innovative network technologies that, in the
short term, would support Internet users. These technologies require a remarkably
high-speed network that goes beyond the capabilities of the internet and networks of
today. Examples of previous mainstream Internet2 projects include telemedicine,
digital libraries (online books, magazines, music, films, speeches, etc.), and faster
Internet services. Current Internet2 projects include high-definition interactive video
and improved network problem detection and resolution.

8.1.2 - Connecting to the Internet

Many homes and small business users connect via high-speed broadband
internet. Your computer or mobile device typically connects to the Internet with
wireless internet access the entire time it is turned on. Examples of broadband
Internet access include cable, DSL, fiber, radio, and satellite signals.
Cable Internet service offers high-speed Internet access through a cable modem
over the cable television network.
DSL (digital subscriber line) uses standard copper telephone lines to provide
high-speed Internet connections.

222
Fiber to the Premises (FTTP) uses fiber-optic cable to provide home and
business users with high-speed Internet connectivity.
Fixed wireless provides high-speed Internet access to your house or company
using a dish-shaped antenna for communicating with a tower positioning over radio
signals.
A cellular radio network offers high-speed Internet connections to compatible
devices or computers with wireless modems.
A Wi-Fi (wireless fidelity) the network uses radio signals to provide compatible or
properly equipped wireless computers and devices with high-speed Internet
connections
Satellite Internet service provides high-speed satellite Internet connections to a
satellite dish which communicates with a satellite modem.
Staff and students usually link their devices to the internet through a network of
organizations or schools. The business or school network connects to a high-speed
broadband Internet service. Many home users set up a Wi-Fi network, which sends
signals to a communications device that is connected to a high-speed Internet
service such as cable or DSL. However, rather than using the broadband access
service, some computer users link to the Internet by dial-up connectivity, which is a
slower-speed system.
Many hotels and airports provide passengers with wired or wireless Internet
connections. Wireless Internet systems, such as Wi-Fi networks, enable mobile
people to connect to the Internet with laptop computers, smartphones instantly, and
other mobile devices while away from a telephone, cable, or other wired connection.

WHAT DOES DIAL-UP INTERNET ACCESS MEANS

Thoughts to ponder:

The first website was dedicated for…?


Is the first website still online?

223
Lesson 8.2 - Introduction to TCP/ IP

The Web depends on an addressing system to deliver data and information to


a device at a specific location, much like the postal service.

Internet Protocol address or the IP address is a number that uniquely


identifies any internet-connected machine or device. Usually, the IP address is
composed of four groups (0-255) of numbers, each separated by a period.

The numbers 72.14.207.99, for example, are an IP address. Generally


speaking, the first part of each IP address identifies the network, and the last part
indicates the specific device. The Internet, therefore, encourages the use of a text
name, which represents one or more IP addresses. The elements of a domain name
are divided by periods, much as in an IP address.

The Domain Name System ( DNS) is the mechanism used by the Internet to
store domain names and their related IP addresses. A DNS server converts the
domain name to its corresponding IP address when you assign a domain name so
that data and information can be redirected to the appropriate device.

Lesson 8.3 - The Internet and the World Wide Web

One of the key reasons for purchasing computers for business, home, and
other users is Internet access. The Internet is a widely used research tool that
provides access to global knowledge and instant communications for society. Also,
Internet access can occur anywhere from a device at any time: at home, at work, at
school, in a restaurant, in an airplane, and a park.

The Internet, also known as the Net, is a global networking system that links
millions of companies, government agencies, educational institutions, and
individuals. Each of the internet networks provides resources that add to the
abundance of Internet-accessible goods, services, and information. In 2019, the
number of internet users worldwide was 4.13 billion, and business users worldwide
now access a variety of internet services. (Clement, 2020)

224
The World Wide Web, or simply the Internet, and e-mail are two of the
Internet services most commonly used. Other services are chat rooms, instant
messaging, and VoIP (Internet Protocol voice). To enhance your understanding of
these Internet services, the chapter starts by explaining the Internet context and how
the Internet functions, and then discusses each of these services.
Although many people use the terms World Wide Web and Internet
interchangeably, the World Wide Web is a service of the Internet. While the Internet
was developed in the late 1960s, the World Wide Web emerged in the early 1990s.
Since then, it has grown phenomenally to become one of the more widely used
Internet services. (Shelly, Vermaat, Quasney, Sebok, & Freund, 2010)
The World Wide Web ( WWW), or online, is a series of online documents from
around the world. That Internet-based electronic document is called a Web page,
which may include text, graphics animation, audio, and video. Web pages also
generally have built-in connections to other documents.
Many Web pages are (fixed) static; others are dynamic (changing). Visitors to
a static Web page see the same material for all. In comparison, with an active Web
page, visitors can customize any or all of the viewed content such as preferred stock
prices, a region's environment, or flight ticket availability.
A Website is a list of linked Web pages and related objects, such as
documents and images, that are stored on a Web server. A Web server is a
computer that provides your computer with the requested Web pages. The same
Web Server can manage many websites. Some industry experts use the term Web
2.0 to refer to Web sites that provide users with the means to share personal
information (such as social networking Web sites). It enables users to change the
content of the website and have device features installed on the website for use by
visitors (such as e-mail and word processing programs).

8.3.1 - Browsing the Web

The most commonly used personal computer Web browsers are Internet
Explorer, Firefox, Opera, Safari, and Google Chrome. You start a Web browser with
an Internet connection created. The browser retrieves and displays a Web page that
begins, also called the home page of the user. The initial home page shown is one
225
picked by your Web browser. You can change your browser's homepage at any
given time.

8.3.2 - Web Addresses


A Web page has a unique address, called a URL (Uniform Resource Locator)
or Web address. For example, the home page for the United States National Park
Service Web site has http://www.nps.gov as its Web address. A Web browser
retrieves a Web page using its Web address. If you know the Web address of a Web
page, you can type it in the Address bar at the top of the browser window. (Shelly &
Vermaat, 2011)

A Web address is a protocol, domain name, and often a link to a particular


Web page or location on a Web page. Numerous Web page addresses start with
http:/. The http, which is the Hypertext Transfer Protocol, is a series of rules that
define how pages are transmitted over the Internet. Most browsers and websites do
not require you to enter the Http:/ and www parts of the web address in the address
bar to help eliminate errors. The browser can show a list of similar addresses or
related websites from which you can choose if you enter an incorrect Web address.
When you enter the Web address, http://www.nps.gov/grsm/planyourvisit/
wildlifeviewing.htm in the Web browser, it sends a request to the Web server that
contains the nps.gov Web site. The server then retrieves and delivers the Web page
called wildlifeviewing.htm located in the grsm / planyourvisit route to your browser,

226
which then shows the Web page on the screen. Most users are making bookmarks
for their regularly visited Web pages to save time.
A bookmark, or favorite, is a saved Web address that you can reach by
clicking a list of its name. That is, you can select a previously saved bookmark,
instead of entering a Web address to view a Web page. You submit or pull
information from a Web server when joining a Web address in a browser. Many Web
servers will also send content to your computer at regular intervals or when updates
to the web are made. For example, some web servers can view current sporting
event scores on your computer screen or weather forecasts.

8.3.3 - Navigating Web Pages


Most Web pages contain hypertext or hypermedia links. Hypertext refers to
connections in text-based documents, while hypermedia blends text-based links with
links between images, audio, and video. (Shelly & Vermaat, 2011) Links allow you to
obtain information in a nonlinear way. That is, instead of getting access to the
subjects in a given order, you turn directly to a topic of interest. Branching from one
related subject to another into a nonlinear fashion is what makes the links so deep.
Some people use the term, surfing the Web, which may refer to the activity of using
links to explore the Web.
A relation can be a picture or a text. Text links on the web page may be
underlined and/or illustrated in a different color than other text. Pointing or placing
the pointer on a screen connection usually changes the shape of the pointer to a
small hand with index finger-pointing. They are pointing to a link through causes the
link to alter its appearance.
Every connection on a Web page matches a Web address or a text. You click
on it to trigger a link, that is, point to the link and then press the left mouse button.
Clicking a link may trigger appearance on the screen of the Web page or document
associated with the connection. The connected object may be on the same Web
page, another Web page on the same Web site, or a different Web page on another
Web site in another city or region. A text link also changes color after you click it to
alert you visually that you have clicked on a page. Most current Web browsers
support tabbed browsing, where the top of the browser displays a tab (similar to a file

227
folder tab) for each Web page you open. (Shelly & Vermaat, 2011) You click on the
tab in the Web browser to switch from one open Web page to another. Tabbed
browsing enables users to have several home pages that will open automatically
when the tab begins. You can also arrange tabs in a group, called a tab party, and
save the party as your favorite so you can view all tabs at once. As some websites
seek to monitor your browsing habits or collect personal details, some popular web
browsers have a feature that allows you to disable and/or regulate the distribution of
your browsing habits and personal information more closely.

Lesson 8.4 - Searching the Web

The Web is a worldwide resource of information. The main reason people use
the Web is to look for specific content, like text, images, music, and video. The first
phase in a successful search is to define the essential idea or concept within the
topic you are looking for information about. Search Engines and topic directories are
two variety of research platforms.

A search engine is a software that identifies a specific topic related website,


web pages, photos, videos, news, maps, and other content. A topic directory
classifies Web pages and associated subcategories in an ordered set of categories,
such as sports or shopping. Some webpages offer both a search engine and a
subject directory functionality.

Search Engines helps locate information for which you do not know an exact
Web address or are not seeking a particular Web site. Thousands of search engines
are available.

Other search engines can restrict their searches to a specific type of


information, such as the following items:
Images — pictures, diagrams, and drawings.
Videos — home videos, music videos, television programs, and movie
clips.
228
Audio — music, songs, recordings, and sounds.
Publications — news articles, journals, and books.
Maps — company or address charts, or directions toward a destination.
People or Businesses — addresses and telephone numbers.
Blogs — specific opinions and ideas of others. Search engines require that
you enter a word or sentence, called search text or search query, that
describes the item you want to find.

Lesson 8.5 - Types of Websites

Fifteen types of Websites are portal, news, informational, business/


marketing, blog, wiki, online social network, educational, entertainment, advocacy,
Web application, content aggregator, and personal.

1. Portal
A portal is a Web site that offers a variety of Internet services from a single,
convenient location. Most portals offer free assistance such as search engines,
headlines; sporting events and climate; digital art; reference tools such as yellow
pages, quotations and locations; entertainment; and e-mail, and other
communications. Many portals have online communities.

229
2. Online Community
An online community is a web site that deals with a specific group of people
with common interests or ties. Such groups will provide online photo galleries, chat

rooms, and other tools to promote inter-member contact. A wireless portal is a


platform intended for mobile devices that are available on the Internet.

3. News
A news website contains headline news content, which includes stories and
articles about current events, life, economy, sports, and the weather. Newspapers
and radio and television stations are some of the media that maintain Web sites for

230
news.

4. Informational
A website that offers information on reality. Most government departments in
the United States have information portals that contain information such as census
results, tax codes, and the budget of the Congress. Many organizations, such as
public transport schedules, provide information, and report research results.

5. Business/Marketing
A business/marketing Web site contains content that promotes or sells
products or services. Nearly every enterprise has a business/marketing Web site.

231
6. Blog
A blog, Weblog, in short, is an informal website consisting of time-stamped
documents or messages, in a diary or journal format, usually in reverse chronological
order. A blog featuring video clips is called a video blog, or vlog.
A microblog allows users to post short messages for others to read, usually
between 100 and 200 characters. Twitter is an incredibly common microblog. The
term blogosphere refers to the collection of blogs around the world, and the
vlogosphere refers to all vlogs around the globe. Blogs represent the author's
interests, views, and personalities, called the blogger or vlogger (for vlog author),
and sometimes visitors to the site. Blogs are an essential way of connecting across
the globe. Businesses create blogs to communicate with workers, clients, and
vendors. Teachers create forums for other teachers and students to collaborate with.
Home users create blogs with family, friends, and others to share facets of their
personal lives.

232
7. Wiki
A wiki is a shared website that allows users to create, add, change, or remove
content from the website via their Web browser. Several wikis are open to general
public modification. Usually, wikis collect recent edits on a Web page to allow
someone to check them for accuracy. The difference between a blog and a wiki is
that users can't change the blogger's first posts.

8. Online Social Network


An online social network,
Often known as a social
networking website, it is a
website that allows members of
its online community to share
with other registered users their
interests, thoughts, stories,
images, music, and videos.
Chat rooms, newsgroups, and
other messaging facilities are
the most popular. MySpace and Facebook are popular social networking sites, with
Facebook alone boasting more than 300 million active users. In certain websites of
social networking, such as Second Life, users assume an imaginary persona and
engage in a role-playing environment category with other users.

233
9. A media sharing Website
A website for media sharing is a particular form of online social network that
allows users to share media, including images, songs, and videos. Flickr, Fotki, and
Webshots are famous communities for photo sharing; PixelFish and YouTube are
popular communities for video sharing.

10. Educational
An educational Web site offers exciting, challenging avenues for formal and
informal teaching and learning (Figure 2-15h). You can learn how aircraft travel on
the Internet, or how to prepare a meal. Industries give staff online instruction for a
more organized learning experience, and universities provide online courses and
degrees. Instructors also use the Internet to enhance teaching in the classroom by
posting content, ratings, and other important class information about the course.

234
11. Entertainment
A Web site for entertainment offers an interactive and engaging environment.
Art, videos, sports, games, ongoing web episodes, sweepstakes, chat rooms, and
more are popular entertainment websites.

12. Advocacy
A website for advocacy provides material that explains a cause, viewpoint, or
idea. Typically these websites express views of a specific organization or
association.

235
13. Web Application
A Web application, or Web app, is a website that enables users to access and
communicate with apps on any Internet-connected computer or device via a web
browser. Many Web apps provide free access to their applications. Others give part
of their software free and charge for accessing more advanced functionality or when
requesting a specific action.

14. RSS 2.0


A standard that some content aggregators use to deliver content to
subscribers is Simple Syndication. Atom is yet another standard that web
aggregators often use to distribute content.

236
15. Personal
Typically, a private individual or family not affiliated with any entity may
maintain a personal website or a single website. For many purposes, people publish
personal Web sites. Others are in the work search. Some also want to share their life
experiences with the world.

Lesson 8.6 - E-mail and other Programs


E-mail (short for electronic mail) is the delivery of messages and files via a
computer network. An E-mail was one of the original Internet services which allowed
people to work together and communicate with colleagues elsewhere.

8.6.1 - Mailing Lists


A mailing list is a collection of
email names and addresses given a
single name, often called an email list
or delivery list. When a message is
sent to a mailing list, each individual
on the list receives a copy of the
message in their mailbox. For
237
instance, your credit card company could add you to its mailing list to give you
special offers.

8.6.2 - Instant Messaging


Many IM systems endorse communications over voice and video. Most IM
services will also alert you to details such as calendar meetings, quotations from
suppliers, weather reports, or sports scores. They also allow you to submit receiver
images or other documents, listen to music streaming, and play games with another
online group. For IM to operate, both parties need to be online simultaneously. The
receiver of a message must always be able to receive messages. You may need to
install instant messenger software on your computer or mobile device to use IM,
such as a smartphone, which you intend to use.

8.6.3 - Chat Rooms


A chat is a conversation that is
written in real-time and takes place on a
computer. A chat room is a location on
an internet service that enables users to
talk among themselves. Everyone in the
chat room may take part in the
discussion, which is typically related to a

238
particular subject. As you type into your keyboard, the computer screen displays a
line of characters and symbols. Those linked to the same server in the chat room
always see what you wrote. Some chat rooms allow voice chats and video chats,
where people listen to each other or see each other chatting.

8.6.4 - VoIP
VoIP, also called Internet Telephony (Voice over IP, or Internet Protocol),
allows users to communicate with other users over the Internet. That is, VoIP uses
the Internet to link a calling party to one or more local or long-distance parties
(instead of the public switched telephone network). You need a high-speed Internet
connection (such as a DSL or cable modem) to place an Internet telephone call. An
Internet telephone service, a microphone or telephone line, depending on the
Internet telephone service, and Internet telephone software or a VoIP router, or a
telephone adapter, depending on the Internet telephone services. VoIP services are
also available on some mobile devices which have wireless Internet service. Calls to
other parties with the same Internet telephone service are often free, while calls
connecting to the telephone network usually cost from $15 to $35 a month.

239
When you are speaking in a microphone connected to your computer, or a
telephone connected to the VoIP router, or telephone adapter, the Wireless
telephone program and the sound card of the device or the VoIP router or telephone
adapter, it transforms your spoken words (analog signals) to digital signals. It then
relays the digitized audio over the Wireless to the parties called. Software and
equipment at the receiving end reverse the process so that the receiving parties can
hear what you have said.

8.6.5 - FTP
FTP ( File Transfer Protocol) is an Internet protocol that enables uploading
and sharing of files over the Internet with other computers. Uploading is the opposite
of downloading; in other words, uploading is the process of transferring documents,
graphics, and other objects from your computer to an Internet server.

Lesson 8. 7 - Online Business

6.7.1 - E-Commerce
E-commerce, short for e-commerce, is a commercial activity happening over
an electronic network like the Internet. Anyone who has access to a computer or

240
mobile device, an Internet connection, and a means of paying for goods or services
purchased may participate in e-commerce. Many people use the term m-commerce
(mobile trade) to describe e-commerce using mobile devices.
Consumers' common e-commerce uses include shopping, banking, traveling,
entertainment, and health. Users can buy just about any product or service on the
Web, including grocery stores, flowers, books, computers, music, movies, cars,
airline tickets, and tickets to concerts. They can also pay bills, invest in stocks, make
reservations for flights, book a hotel or car, and fill out prescriptions.
A customer visits an online business via an electronic marketplace containing
product details, photos, and a shopping cart. The shopping cart helps consumers to
pick up orders. The customer enters personal data and the payment method when
they can complete the transaction, which will be over a secure internet connection.
E-commerce, short for online shopping, happens when companies use the Internet
to sell goods.

Let us reflect…
―Can you live without the Internet?‖ That is a question true to many especially
to technology inclined people. But almost of the humanity depends entirely on the

241
internet. Nowadays because of the dependence, or shall we say over depence to the
Internet by many people, technology is now embedded to humanity.
As you can see on the lesson, i.e., the 15 types of Internet sites, the Internet
was made part of everyone‘s lives. And as part of our everyday living, we need to
regulate that technology in order not to control our lives by the Internet.
As a learner, how can you do that especially you, as an IT student, make
yourself not controlled by that technology? Can you reflect on the things of how you
can utilize the Internet without controlling our lives and be addicted to the contents it
offer? You can write your thoughts in a 500 words expressing how do you interact
with the internet.

How much have you learned?


POST-TEST FOR LESSON 8

Name: __________________________________ Date: ____________________


Course & Section: ________________________ Result: __________________

Direction: Write TRUE if the statement is correct and FALSE if it is not.

_____ 1. A single government agency owns and controls the Internet.

_____ 2. DSL provides high-speed Internet connections through the cable television
network.

_____ 3. In general, the first portion of each IP address identifies the network, and
the last portion identifies the specific computer.

_____ 4. A Web 2.0 Web site can never allow users to modify Web site content.

_____ 5. A Web page has a unique address, called a URL or Web address.

242
_____ 6. Hypertext combines text-based links with graphic, audio, and video links.

_____ 7. The major disadvantage with a subject directory is that users have difficulty
deciding which categories to choose as they work through the menus of links
presented.

_____ 8. Most social networking Web sites include chat rooms, newsgroups, and
other communications services.
_____ 9. Streaming disallows users from accessing and using a file while it is
transmitting.

_____ 10. A plug-in is a program that extends the capability of an add-on.

Lesson 8 Final Requirements:


This research activity will further explain the lesson. Answer the questions as
best as you could.

Jesue, the HR officer of a company, wants to email the payslip of all the
employees to their corresponding email address. What method would you
recommend Jesue to use? Explain your answer.
During crisis time, the barangay captain of Longos, Malolos, wants his fellow
citizen to be updated with what is happening in the town. What would you
recommend the barangay captain to use? Why?
Rochelle wants to publish some of her baking techniques, but she doesn't wish to
anybody editing her online articles. What is suitable for Rochelle to use? Explain
your answers.

Suggested Readings:

Books/Journals:

 Wikipedia:Books, https://en.wikipedia.org/wiki/Wikipedia:Books

243
 Sams Teach Yourself Internet and Web Basics All in One Paperback –
May 31, 2003 by Ned Snell
 Computer Fundamentals & Internet Basics, January 1, 2010 by Rohit
Khurana
 The Big Basics Book of the Internet Subsequent Edition by Joseph W.
Habraken
 The World of Internet Marketing: The Basics: Online Brand Building, Social
Media, and Website Design, Volume 1-1st Edition, by Jonathan Edward
Goodman
 Because Internet: Understanding the New Rules of Language By Gretchen
McCulloch
 Level Made Simple: IT Tools & Network Basics (M1-R5) by Prof. Satish
Jain, and M. Geetha Iyer

Websites:

 ―Where Am I? - Internet Basics‖, https://tell.colvee.org/mod/book/


tool/print/index.php?id=87
 ―Learning Internet Basics‖, https://www.oreilly.com/library/view/internet-
simplified/9780470404461/ch01.html
 ―Internet Tutorials‖, https://onlinelibrary.london.ac.uk/support/ information-
skills/finding-information-internet/internet-tutorials
 ―Internet Technologies Tutorial‖, https://www.tutorialspoint.com/ internet_
technologies/index.htm
 ―What is the Internet?‖, https://www.inetdaemon.com/tutorials/internet/
 ―Internet‖, https://edu.gcfglobal.org/en/topics/internet/

244
REFERENCES:
Clement, J. (2020, January 07). Number of internet users worldwide. Retrieved
August 29, 2020, from https://www.statista.com/statistics/273018/number-of-internet-
users-worldwide/

Madijohnson1. (n.d.). Business to consumer B2C e commerce consists of the sale of


goods and services: Course Hero. Retrieved August 29, 2020, from
https://www.coursehero.com/file/p2v5d1h6/Business-to-consumer-B2C-e-commerce-
consists-of-the-sale-of-goods-and-services/

Shelly, G. B., & Vermaat, M. (2008). Discovering computers 2009: Brief. Australia:
Course Technology.

Shelly, G. B., & Vermaat, M. (2011). Discovering computers 2012: Living in a digital
world: Complete. Mason, OH: Cengage Learning.

Shelly, G. B., Vermaat, M. E., Quasney, J. J., Sebok, S. L., & Freund, S. M. (2010).
Discovering computers 2010: Living in a digital world: Complete. Boston, MA:
Course Technology, Cengage Learning.

245
UNIT 03
Application Software, Programming
and Database Concepts

Unit-03: Lessons Composition

I. Lesson 9: Working With Application Software


Duration: 3 Hours per week (Week 10)

II. Lesson 10: Introduction to Programming


Duration: 3 Hours per week (Week 11-12)
6 Hours in two weeks

III. Lesson 11: Introduction to Databases and


Data-mining
Duration: 3 Hours per week (Week 13)

246
Lesson 9: Working With Application Software
Duration: 3 Hours per week (Week 10)

INTRODUCTION

A machine is a powerful resource with the proper program. The software


allows users to create letters, memos, reports, and other documents. It can develop
multimedia presentations, design Web pages, and diagrams. Also, programs can
draw and alter images, record and enhance audio and video clips, prepare and file
taxes, play single player or multimedia games, compose email messages and instant
messages, and much more. Users work with application software to achieve those
and many other tasks.
Application Technology consists of applications aimed at making users more
efficient and/or helping them with personal tasks. Application software has a variety
of uses:
 To make business activities more efficient
 To assist with graphics and multimedia projects
 To support home, personal and educational tasks
 To facilitate communications

OBJECTIVES/COMPETENCIES:

 Explain the usage of an application software


 Analyse what application software fit to the desired software activity
 Describe the different types of software
 Analyse the different types of software
 Understand the different usage of softwares;

247
A pre-test of your application software knowledge…

Direction:
Write TRUE if the statement is correct and FALSE if it is not.

________1. Shareware is copyrighted software that is distributed at no cost


for a trial period.
_______2. Freeware preserves all rights to the software at no cost.
_______3. Proprietary Software has no restrictions from the copyright holder
_______4. Microsoft word is an example of word processing software.
_______5. Notepad is also an example of word processing software
_______6. A web browser is commonly referred to as a server.
_______7. Real-time means that you and the people with whom you are
communicating online at the same time.
_______8. An example of a video conferencing is skype.
_______9. A chat is a dialogue that is written in real-time and takes place on a
computer.
______10. Paint is an example of spreadsheet software.

248
Lesson 9.1 – Application Software

Application software is a program designed for end users or a group of


programs. A word processor, a spreadsheet, an accounting program, a web browser,
an email client, a video player, a file viewer, simulators, a computer game or a photo
editor are all examples of a program.
Figuratively speaking, programs reside on top of system software because
they are unable to run without the operating system and system utilities. Systems
software consists of low-level programs which communicate with the computer at a
very basic level. This includes operating systems, compilers and machine resource
management utilities.

Lesson 9.2 - Kinds of Software


1. Commercial/Shareware VS Freeware
2. Proprietary VS Open Source
3. Business Software
4. Graphics and Multimedia Software
5. Internet Software
6. FTP Client Software
7. Instant messaging (IM)
8. Chat Software
9. Video conferencing
10. Negative Application Softwares

9.2.1 - Commercial/Shareware VS Freeware


Shareware is copyrighted software that is distributed at no cost for a trial
period. You give the payment to the software creator to use shareware software
past that time. Shareware developers expect users to submit the payment if the use
of software continues past the test period specified. In some cases, a scaled-down
version of the software is distributed free, and fee entitles the user to a fully
functional product.
249
Freeware is patented software
provided by a person or a company that
preserves all rights to the software at no
cost. Thus programmers typically cannot
incorporate freeware in applications they
intend to sell. The word free in freeware
indicates software has no charge. (Shelly,
Vermaat, Quasney, Sebok, & Freund,
2010)

9.2.3 - Proprietary VS Open Source


Proprietary Software is a computer
program that is the sole property of its
developers or publishers and can not be
copied or distributed without their licensing
agreements being complied with. Almost all
commercial (shrink wrapped) software is
proprietary, but many excellent new
programs (such as Apache web server,
Linux operating system, and StarOffice office suite) are non-proprietary (and free).
Open-source software (OSS) is software provided for use, modification, and
redistribution. This software has no restrictions from the copyright holder regarding
changes and its redistribution. Typically open source software can be downloaded
from the internet, often at no cost.

Lesson 9.3 - Business Software


 Business software
Business application software that helps
people becomes more effective and
productive while carrying out their daily
business activities. Business software
includes applications such as word

250
processing, table, database, presentation, note-taking, personal information
manager, mobile business software, business software packages, project
management, accounting, document management, and business computing
software.

 Word Processing Technology


It's one of the most commonly used computer software styles. Word processing
software, also known as a word processor, helps users to build and edit documents
containing text and graphics at times. Most people use word processing software
every day to develop forms such as letters, memos, reports, mailing labels,
newsletters, and Web pages. One significant benefit of using word processing
software is that users can quickly modify what they've written.

 Spreadsheet Software
Spreadsheet software is another commonly used type of software program.
Computer Spreadsheet helps users to create information in rows and columns and
enable rapid calculations. These joint rows and columns are dubbed a worksheet.
Before, people used paper to organize data and perform calculations by hand. You
arrange data in the same way in an electronic worksheet, and the computer does the
computations faster and more accurately. Due to the logical method of data
management through spreadsheet software, many people use this software to
arrange and display non-financial data/financial data. Most spreadsheet software has
basic features, including word processing software, to help users build, modify, and
format worksheets. Spreadsheet software also incorporates many of the features
found in word processing software such as macros, checking to spell, changing fonts
and font sizes, adding colors, tracking changes, inserting audio and video clips,
analysis skills, identification of handwritten text and sketches, and development of
Web pages from existing spreadsheet documents.

 Presentation software
Presentation software is application software that allows users to build visual
demonstration aids to convey ideas, updates, and other information to a community.

251
The presentations may be viewed as slides that are shown on a large monitor or a
screen, also called a slide show. Display software usually offers a range of
predefined display formats that describe the context, text, and graphical accents on
the slides as complementary colors. This software also comes with a range of
templates.

Lesson 9.4 - Graphics and Multimedia Software


Often power users, including engineers, architects, digital publishers, and
graphic artists, use sophisticated software that able to work with graphics and
multimedia. This software includes computer-aided design, desktop publishing,
paint/image processing, image editing, video, and audio editing, multimedia
authoring, and authoring of web pages.

 Computer-Aided Design (CAD) software


This is an advanced form of application software that helps a skilled user build
technical, architectural, and science designs. For example, engineers create design
plans for vehicles and security systems. Architects design building structures and
floor plans. Scientists design drawings of molecular structures.
252
CAD software removes the laborious manual drafting that might entail design
processes. Three-dimensional CAD programs allow designers to rotate 3-D object
designs so they can view them from any angle. Some CAD applications can also
create lists of materials for systems to construct.

 Software for Desktop Publishing (DTP)


This software helps talented designers to construct complex documents
containing text, images, and several colors. Professional DTP software is suitable
for generating high-quality color documents, such as textbooks, business
newsletters, marketing literature, category pages, and annual reports. While several
word processing applications have some of the features of the DTP software, since
it supports page layout, skilled designers and graphic artists use DTP software.

 Paint/Image Editing Software


This category of software are graphic artists, multimedia professionals,
technical illustrators, and desktop publishers use paint software and image editing
software to create and modify graphical images such as those used in DTP
documents and Web pages.

 Image Editing Software


These are software that have the paint software features and also includes
the ability to refine and alter current photos and videos. Changes may involve
changing or enhancing image colors, incorporating special effects such as shadows
and glows, making animations, and merging images, which is the process of
integrating several photos into a larger picture.

 Photo editing software


It is a type of image editing software that allows photographers,
videographers, engineers, scientists, and other high-volume digital photo users to
edit and customize digital photos. Professional photo software editing helps users to
save objects in a vast set of file types. With professional photo editing software,
users can retouch photos, crop images, remove red-eye, change image shapes,

253
color-correct images, straighten images, remove or rearrange objects in a picture,
and apply filters. (Shelly, Vermaat, Quasney, Sebok, & Freund, 2010)

 Video editing software


This software enables professionals to change a section of a video, called a
clip. For example, users can shorten a video clip's length, rearrange a series of clips
or add digital effects such as words that travel across the screen horizontally. Video
editing software usually requires the ability to edit audio. The audio editing software
allows users to change audio recordings, create soundtracks of studio quality, and
add audio to video clips. Software for audio editing typically contains filters that are
designed to improve the quality of the audio. A filter, for instance, may eliminate
distracting background noise from the audio recording. Most TV shows and films
are made or updated using software for video and audio editing.

 Multimedia authoring software


In an interactive framework, it allows users to combine text, graphics, audio,

Macromedia Company, a software company that develops various


authoring tools. They are developing software tools for web,
animation, graphics, and presentations. 254
video, and animation. Users monitor text and picture placement with this program,
and the length of sounds, video, and animation. Multimedia displays, once
produced, often take the form of interactive computer-based presentations or web-
based presentations designed to promote instruction, show product functionality,
and involve direct users. To create digital applications, training centers, academic
facilities, and online journal publishers, all use multimedia authoring software. This
software may be available on a floppy drive, through a local area network, or via the
Internet.

 Web page authoring software


This allows people of all experience levels to construct Web pages that
include graphic images, video, audio, animation, and other interactive content
special effects. Moreover, several Web page authoring programs allow users to
organize, administer, and preserve Web pages. Application software, such as Word
and Excel, also contains authoring functionality on the Web page. This helps office
or home business developers to customize simple Web sites using already owned
application software. Users work with Web page authoring tools to build more
complex Web sites. Many Web page developers often use multimedia authoring
software along with web page authoring software for the creation of Web page, or
instead.

 Communication software
This software is used to offer remote device access and to share files and
information between different hosts or users in text, audio, and/or video formats.
This includes terminal emulators, data transfer programs, chat and text messaging
applications, as well as MUDs-integrated related features. Often, the term refers to
software running a bulletin board system, but rarely to those running a computer
system or sharing of Stored Program Power.

255
Lesson 9.5 - Internet Software

A web browser (commonly referred to as a server) is a World Wide Web


software framework for the collection, presentation, and traversal of data sources. An
information resource is identified by a Uniform Resource Identifier (URI/URL). It may
be a web page, image, video, or other pieces of content hyperlinks present in
resources enable users easily to navigate their browsers to related resources.
(2020)The major web browsers are Firefox, Internet Explorer and Google Chrome.

Outlook Express was a mail and news client included with versions 4.0
through 6.0 of Internet Explorer. Outlook Express is distinct from the Microsoft
Outlook program. The two systems do not share a similar codebase but do share a

shared theory of architecture. Similar names allow us to misjudge that Outlook


Express is a stripped-down version of Microsoft Outlook. Outlook showed that the
Windows Address Book to collect and securely integrate contact details.

9.5.1 - FTP Client Software

The File Transfer Protocol (FTP) It is a standard network protocol

used to transfer data files over a TCP-based network from one host to
another, such as the Internet.

256
FTP is designed on a client-server architecture and uses separate client-
server control and data connections. TP users can verify themselves using a clear-
text sign-in protocol, usually in the form of a username and password. Still, they can
securely connect if the server is
configured to allow this. FTP is also
encrypted with SSL / TLS (FTPS) for
secure transmission that controls the
username and password and encrypts
the content. The SSH File Transfer
Protocol (SFTP) is also often but is
distinct from technology.

Command-line applications developed before operating systems had


graphical user interfaces were the first FTP client applications, and are still shipped
with most Windows, Unix, and Linux operating systems. Since then, several FTP
clients and automation tools have been developed for desktops, servers, mobile
devices, and hardware, and FTP has been implemented in productivity applications,
such as Web page editors.

9.5.2 - Instant messaging (IM)

Instant Messaging (IM) is a real-time Internet communications system that


informs you when one or more individuals are online. It then allows you to share
messages or files or enter a private chat room. Real-time means that you and the
people with whom you are communicating online at the same time. Examples of
popular instant messaging client application software are:

 Facebook Messenger
 MSN Messenger

257
9.5.3 - Chat Software

A chat is a dialogue that is


written in real-time and takes place
on a computer. A chat room is a
location on an internet service that
enables users to talk among them.
Anyone in the chat room may take
part in the discussion, which is
usually unique to a particular
subject.

Popular Chat Software

 HubSpot Live Chat


 Olark
 Pure Chat
 Chaport

9.5.4 - Video conferencing

Video conferencing software


enables online communication for
audio meetings, video meetings,
and seminars, with built-in features
such as chat, screen sharing, and
recording. These applications are
introduced to allow long-distance or
global contact, boost teamwork,
and minimize travel expenses.

Video conferencing solutions remove the need for personal involvement in


both fast scrums and significant events, add flexibility to the daily schedules for those
concerned, strengthen customer relationships and ensure open and effective contact
between teams.

258
Popular Video Conferencing

 Skype
 Google Meet
 Zoom

Lesson 9.6 – Negative Application Softwares


Just as positive software is available, there are also negative types of
application software used for malicious purposes. Applications can carry the
following secret programs or utilities:
 Malware - This is malicious software. The most popular types of malware include
Trojan horses, worms and viruses.
 Adware and Spyware: Adware and spyware are common forms of malware.
Adware provides freeware that is supported when you register. Often adware
monitors internet surfing patterns to become invasive and transform into
spyware. It keeps a record of all the places you've been browsing, and comes up
with advertising that it thinks are important to you. Unlike adware, spyware has
negative connotations.
 Greyware: This is a term used to categorize all software that falls between
malicious software and other codes, including trackware and spyware..
 Nagware: This refers to software that comes in the form of pop-ups asking users
to register for a product or to buy an app.
 Bloatware: Software with so many different features that it takes substantial disk
space and memory resources to run
 Slime ware: This applies to software that interferes with user experience by
modifying the key settings.
 Abandonware: Software that is no longer marketed or sponsored by publishers.

259
 Dribble ware: Software with so many changes and patches.

A sample of bloatware in Android phones

Let us reflect…
Application software, as we can see in our lesson, is really important because
we cannot use our computers, gadget and machine hardware to do the particular
tasks we use it for today. We can try to imagine what kind of life we are living if no
software that will help us performs our daily tasks.

But actually, the true question is, what can we do if we didn't use computers at
all? Our PC will be practically useless without application software. In reality, any
program we use to complete a particular task needed application software.

As students, can do your role as a youth, a sibling to your parents, a member


of a family without the help of any gadget run by software? Some say yes but it
would be very difficult. Could you reflect a world without hardware and software that
run every gadget needed for survival? You can document that thought, and may it
drives you more in your dream as an IT practitioner.

260
How much have you learned?
POST-TEST FOR LESSON 9

Name: __________________________________ Date: ____________________


Course & Section: ________________________ Result: __________________

Discuss the following in a separate sheet of paper:

1) Kinds of Application Software

2) Business Software

3) Word Processing

4) Spreadsheets

5) Presentation

6) Desktop Publishing

7) Graphics and multimedia software

Lesson 9 Final Requirements:

Write a research article (not less than 500 words) on the following topics that
will be submitted in a week time.

 In a piece of bond paper, design an application software that will be beneficial


to many medical personnel, especially the front liners, which will help prevent
the spread of Covid-19 virus. Explain only the basic algorithm of your paper.

Suggested Readings:

 Books/Journals:
o Application Software Tutorial by Keiko Pitter
o Clean Architecture: A Craftsman's Guide to Software Structure and
Design by Robert C. "Uncle Bob" Martin
o The Art of Computer Programming by Donald Knuth
261
o Introduction to Algorithms by Thomas H. Cormen, Charles E.
Leiserson, Ronald L. Rivest, and Clifford Stein
o Head First Design Patterns: A Brain-Friendly Guide by Eric Freeman,
Elizabeth Robson, Kathy Sierra, and Bert Bales
o Peopleware: Productive Projects and Teams by Tom DeMarco and
Timothy Lister
o Android Programming: The Big Nerd Ranch Guide, 3rd Edition by Bill
Phillips

 Websites:
o ―Computers - Software‖.https://www.tutorialspoint.com/computer_
fundamentals/computer_software.htm ―
o ―Application Software‖. https://study.com/academy/topic/application-
software.html
o ―Basics of Computers - Software Concepts‖. https://www.tutorialspoint.
com/basics_of_computers/basics_of_computers_software_concepts.ht
m
o ―Video Tutorial Software Programs to Create Effective Video Guides‖.
https://www.ispringsolutions.com/blog/video-tutorial-software-programs
o ―Computer Software‖. https://www.tutorialandexample.com/software/

262
REFERENCES

Clement, J. (2020, January 07). Number of internet users worldwide. Retrieved


August 29, 2020, from https://www.statista.com/statistics/273018/number-of-
internet-users-worldwide/

Floridi, L. (ed.) (2004), The Blackwell Guide to the Philosophy of Computing and
Information, Oxford: Blackwell.

Gotterbarn, D. and S. Rogerson (2005), ―Responsible Risk Analysis for Software


Development: Creating the Software Development Impact Statement,‖
Communications of the Association for Information Systems, 15(40): 730-50.

Huff, C. (2004), ―Unintentional Power in the Design of Computing Systems.‖ in T.


Bynum and S. Rogerson (eds.), Computer Ethics and Professional
Responsibility, Oxford: Blackwell.

Madijohnson1. (n.d.). Business to consumer B2C e-commerce consists of the sale of


goods and services: Course Hero. Retrieved August 29, 2020, from
https://www.coursehero.com/file/p2v5d1h6/Business-to-consumer-B2C-e-
commerce-consists-of-the-sale-of-goods-and-services/

Miller, S. (2008), ―Collective Responsibility and Information and Communication


Technology.‖ in J. van den Hoven and J> Weckert (eds.), Information
Technology and Moral Philosophy, Cambridge: Cambridge University Press,
226-50.

Shelly, G. B., & Vermaat, M. (2008). Discovering computers 2009: Brief. Australia:
Course Technology.

Shelly, G. B., & Vermaat, M. (2011). Discovering computers 2012: Living in a digital
world: Complete. Mason, OH: Cengage Learning.

Shelly, G. B., Vermaat, M. E., Quasney, J. J., Sebok, S. L., & Freund, S. M. (2010).
Discovering computers 2010: Living in a digital world: Complete. Boston, MA:
Course Technology, Cengage Learning.

263
Lesson 10: Introduction to Programming
Duration: 6 Hours in two weeks (Week 11-12)

INTRODUCTION
One of the major business globally is computer programming. Computers,
video games, the internet, and even mobile phones would not exist without it. In
computer engineering today, positions are not scarce. Almost everything we use has
to do with technology, and in order to make projects happen, computer programmers
are needed to be creative and productive to achieve many goals.
One of the world's most challenging occupations is computer programming. In
computer programming, someone who quits easily when things get complicated, or
when something doesn't work the way they want it to, will not succeed. It takes a lot
of time and effort for an employer to complete a task without talented programmers.
Today, there is no need for most people to know how a machine operates.
Most people will simply turn on a computer or mobile phone and point, click a button
or swipe a finger or two at any tiny graphical object on the monitor, and the computer
does something. An instance would be to get and view weather information from the
net. What the average person wants to know is how to communicate with a computer
program. But you are more than that person.
As ICT students, you are blessed to know the basics of programming. This
lesson will be a foundation stone as you journey in the digital world. It‘s a choice for
you whether you equip yourself with a needle, or choose a shield partnered with a
double edged sword. As you focused on why you have taken the Information
Technology program, you must sharpen also your future programming skills. A
workman is needed not to be ashamed of what should he ought to be.

264
OBJECTIVES/COMPETENCIES:

 Understand the what is a computer program.


 Describe the five generations of programming languages.
 Determine the process of program development.
 Provide examples for procedural languages.
 Analyze the steps in the development of a object-oriented programming.
 Understand the importance of different programming languages to a
particular application.
 Understand the concept of web programming.

A pre-test of your basic computer programming knowledge…

Name: _______________________________________ Date:_______________

& Section: ____________________________________Result:_____________

Explain how do you create a Program.

___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________

265
Lesson 10.1 - What is a Computer Program?

A computer program is a series of instructions that direct a computer to


perform tasks. A computer programmer, often called a developer, creates and
modifies computer programs. (Shelly, Vermaat, Quasney, Sebok, & Freund, 2010)To
create a program, programmers sometimes write or code a program‘s instructions
using a programming language.
A programming language is a collection of words, abbreviations, and
symbols, allowing a programmer to express commands to a machine. Other times,
programmers build a program by using a software development tool. A program is
sometimes called a program development tool that provides a user-friendly
environment for building programs. Much as people speak a variety of languages, a
variety of programming languages and techniques are used by programmers to
create programs. Every language has its laws regarding the written instructions.
Languages are also developed for particular purposes, such as scientific
applications, business strategies, or the creation of Web pages. When solving a
problem or building a solution, programmers often use more than one language; that
is, they integrate the languages.

Lesson 10.2 - Hardware/Software Interaction

The role of software is a programming code written to provide instructions to


the hardware so it can perform tasks. How hardware and software communicate as
data processing, a computer helps us to use the machine to perform a lot of
functions. A machine processes data through the application of laws called
algorithms. An algorithm is a collection of simple, logical steps to solve a problem. A
programmer will then write the code in a formal programming language and then
translated to machine language that the computers understand.

266
10.2.1 - Compilers and Interpreters
The computer understands a program only if it is coded in its machine
language. Because the computer can understand only machine language
instructions, programs that are written in a high-level language must be translated
into machine language. Once a program has been written in a high-level language,
the programmer will use a compiler or an interpreter to build the program.
There are generally two types of programming languages: compiled
languages and interpreted languages. A compiler is required to convert a compiled
language-written program into a machine-understood code (that is, binary code)
before you can execute the program on your computer. The binary code can be
saved into an application file when the translation is completed. Unless the program
(source code) is modified and you have to recompile it, you can continue running the
application file without the compiler. The binary code or application file is also called
executable code (or an executable file). Often the binary source or program file is
referred to as executable code.
On the other hand, a program written in an interpreted language can be run
immediately after you finish writing it — or for that matter, while you are writing it. But
such a program still requires an emulator at run-time to translate the high-level
instructions into understandable machine instructions (binary code). You can't run
the program on a computer unless there is the correct interpreter.
However, there is nothing inherent to a compiled language to prevent
someone from providing an interpreter for the language; likewise, people can and
often do write compilers for interpreted languages. It is not common to mix the two
flavors of languages, where a programmer compiles source code into a small binary
file, which is then executed by a run-time interpreter. It is the job of the programmer
to create and check the program. There are four steps in this process:
1. Create the program
2. Compile the program
3. Connect the necessary library resources to the program
4. Run the program.

267
10.2.2 - Five Generations of Programming Languages

10.2.2.1 - First Generation: Machine Language


Machine language is recognized as the first generation of programming
languages and is the only language that the computer understands directly.
Instructions for the computer language use a sequence of binary digits (1s and 0s) or
a combination of numbers and letters representing binary digits. The binary numerals
refer to the electrical on and off state. Coding in the machine language is, as you
would guess, complicated and time-consuming.

Second Generation: Assembly Language


Assembly language is the second generation of programming languages, a
programmer writes instructions using symbolic instruction codes. (Shelly, Vermaat, &
Cashman, 2010).
Symbolic instruction codes are meaningful abbreviations. Assembly
languages also use extended addresses. A symbolic address is a significant name
that specifies a storage place. For example, a programmer can use the name RATE
to refer to the storage location that contains a pay rate. Despite these advantages,
assembly languages can be challenging to learn. (Shelly, Vermaat, & Cashman,
2010)
Furthermore, programmers must translate an assembly language program
into a machine language before the software can execute, or run, the computer. That
is, the machine can not perform the assembly source program. A source program is
a file containing the language instructions or code to be translated into the language
of the computer. Programmers use a program called an assembler to turn the
assembly language source program into a machine language. Typically one
instruction in assembly language is equal to one instruction in machine language.
However, the assembly language does contain macros in some instances. For a
single assembly language instruction an assembly language macro produces several
machine language instructions.

268
During software, creation Macros save programmer time. Today, assembly
languages are used mainly to improve the performance of critical tasks or to monitor
hardware.

10.2.2.3 - Third Generation: High-Level Language


Procedural Languages. In the late 1950s and 1960s, the limitations of computer
and assembly languages (low-level) led to the development of procedural languages.
The developer writes instructions in a procedural language to show the machine
what to achieve and how to do it. A programmer uses a set of English-like words to
construct instructions using a procedural language, often called a third-generation
dialect (3GL). Many 3GLs also use arithmetic operators such as * for multiplication
and 1 for addition. These English terms and arithmetic symbols simplify the
programmer's method of designing programs. These English-like words and
arithmetic symbols simplify the programmer's software creation process. As with an
assembly language program, the 3GL code (instructions) is called the source
program. Programmers must translate this source program into a machine language
before the program can be executed. This method of translation is also quite
complicated since one instruction in the 3GL source program translates into several
instructions in the machine language. For 3GLs, programmers usually perform the
translation using either a compiler or an interpreter.

C as an Examples of Procedural Languages


C programming language, developed in the early 1970s by Dennis Ritchie at Bell
Laboratories, was initially designed for writing system software. C is a powerful
language that requires expert programming skills. C runs on virtually every form of a
machine with any operating system but is most commonly seen with the operating
systems UNIX and Linux.

Object-Oriented Programming Languages and Program Development Tools


Computer programmers use an object-oriented programming (OOP) language
or object-oriented program development tool to implement an object-oriented design.

269
An object is an entity that may include data as well as the procedures that interpret
or modify the data. An object consists of the person, location, event, or transaction.
The ability to reuse and change existing objects is a significant advantage of
OOP. For example, if a program generates an object for the Employee, it can be
used for any other current or future software. So, the developers reuse existing items
frequently.
There are many benefits to programs built using an object-oriented approach.
In several systems, the objects can be repeated, are configured for frequent use,
and stable over time. Furthermore, software developers develop software more
quickly because they design programs using existing objects.
Besides being able to work with objects, an event is driven by an OOP
language. An event is an action that the program's response to. Examples of events
include clicking a key on the keyboard, pressing a button, or speaking an instruction.
An event-driven program checks for and responds to events.
Object-oriented programming languages and program development tools
work well in a RAD environment. RAD (rapid application development) is a
method of developing software, in which a programmer writes and implements a
program in segments instead of waiting until the entire program is completed. Users
continue to work with software parts when they end. In RAD, the use of prebuilt
components is an important principle. For instance, programmers don't have to write
code on Windows forms for buttons and text boxes because they already exist in the
programming language or the software tools provided. Most object-oriented program
development tools are IDEs.
An IDE (integrated development environment) contains graphical user
interface creation tools, an editor, a compiler and/or translator, and a debugger.
Some IDEs work with a single programming language; others, such as Eclipse,
support multiple languages. Eclipse is an open-source, advanced development
environment that works with a variety of programs, including Java and C++.

Types of Object-Oriented Programming Languages and Program Development


Tool
1 - Microsoft .NET Framework or .NET
270
The Microsoft .NET Framework or .NET is a series of technologies that
enable almost any form of software to execute on the Internet or an internal business
network, as well as stand-alone computers and devices. Similarly, ASP.NET is a
Web application framework that provides the tools necessary for the creation of
dynamic Web sites. Features of .NET include the CLR and classes. The CLR
(Common Language Runtime) is an environment that enables programmers to
develop .NET programs using a variety of languages. A .NET-compatible language
compiles the program source code into Microsoft Intermediate Language (MSIL).
The CLR then converts the MSIL into object code using a just in- time compiler. The
CLR supports classes so that .NET programmers can access a variety of standard
functions in their programs, which saves development time. Using .NET and/or
ASP.NET, programmers can easily develop Web applications, Web services, and
Windows programs.

2 - C++
Developed in the 1980s by Bjarne Stroustrup at Bell Laboratories, C++
(pronounced SEE-plus-plus) is an object-oriented programming language that is an
extension of the C programming language. C++ contains all C language elements as
well as additional features to deal with objects, classes, events, and other object-
oriented concepts. Typically programmers use C++ to build Web and Database
applications. A lot of application software is also written in C++; for example, word
processing and spreadsheet programs. To be an excellent C++ programmer, a
programmer doesn't need C programming experience.

3 - C#
C# (pronounced SEE-sharp)It is a C++-based object-oriented programming
language designed mainly by Anders Hejlsberg, Microsoft chief architect, and
respected engineer. C # was adopted as a default for Web applications and Web
Services based on XML. Web services define structured software that allows
programmers to develop software that interacts through the Internet or on an internal
business channel with other client hosts.

271
4 - F#
F# (pronounced EFF-sharp), which is included with the latest version of Visual
Studio is a programming language that combines the benefits of an object-oriented
language with the benefits of a functional language. A functional language is a
programming language whose natural programming structure is useful in
mathematical programs. Benefits of programs written in F# include easy access to
.NET libraries and performance similar to that of C# programs.

5 - Visual Studio
Visual Studio is Microsoft‘s suite of program development tools that assists
programmers in building programs for Windows, Windows Mobile, or operating
systems that support .NET. Visual Studio provides enhanced help for building safety
and integrity in software through its programming languages, RAD tools, IDE, LINQ
(Language Integrated Query), a customized query language, and other services that
minimize development cycles. Visual Studio, for example, contains code snippets
that are precompiled code and templates associated with different programming
tasks.

6 - Visual Basic
Visual Basic Is a language that helps programmers to construct complex
object-oriented programs easily. Visual Basic is based on the programming language
BASIC, established in the early 1990s by Microsoft Corporation. This language is
easy to use and understand. But for starting programmers, Visual Basic is best.

7 - Visual C++
Visual C++ is a programming language based on C++. Not only is Visual C++
a popular object-oriented programming language, but it also helps developers to
quickly and efficiently develop Windows, Windows Mobile, and .NET applications.
Features that make Visual C++ so powerful include reusable templates, direct
access to machine level memory locations, an optimizing compiler, and advanced
error reporting.

272
8 - Visual C#
Visual C# is a programming language that combines programming elements
of C++ with a more manageable, rapid development environment. The purpose of
Visual C# is to take the complexity out of Visual C++ and still provide an object-
oriented programming language. Programmers familiar with the C/C++ programming
language family often migrate to the easier-to-use Visual C#.

9 - Delphi
Borland‘s Delphi is a dynamic tool for software creation, perfect for
developing large-scale business and web application a RAD environment. Software
developers use Delphi to rapidly create programs for platforms running on Windows,
Linux and.NET. Delphi also offers UML-based visual design tools. The UML (Unified
Modeling Language) was introduced as a standard notation for modeling an object.
A visual programming language is a program that uses a graphical or
interface to construct all source code. The graphical interface, known as a visual
programming environment (VPE), enables developers to drag and drop objects for
program development. Examples of languages used for visual programming include
Alice, Mindscript, and Prograph.

10.2.2.4 - Fourth Generation: Very High Programming Languages


A 4GL ( fourth-generation language) is a nonprocedural language that enables
users and programmers to access data in a database. The programmer writes
English-like instructions with a non-procedural language or communicates with a
graphical environment to recover data from files or a database. Usually, non-
procedural languages are more user friendly than procedural languages. Many
object-oriented frameworks for software creation use 4GLs. One preferred 4GL is
SQL. SQL is a query language that allows users in a relational DBMS to access,
search, and recover information.
These powerful languages allow the administrators of databases to define a
database and its structure. They also allow users to hold data in the database and to
view it.

273
1- PowerBuilder
PowerBuilder was eveloped by Sybase, is another robust RAD software
development tool that is better adapted for object-oriented applications based on the
Web,.NET, and large-scale enterprise. Programmers often use the PowerBuilder to
create client/server software on a small to medium scale. PowerBuilder includes a
consistent interface, wizards, and many other features that enable programmers to
develop applications. (Shelly & Vermaat, 2010) Quickly.

10.2.2.5 - Fifth Generation: Natural Language


Natural Language Generation (NLG) is the natural language processing
task of producing natural language from a framework of computer representation like
a knowledge base or a logical type. Psycholinguists tend to use the term language
development when describing such formal representations as templates for mental
representations.

Lesson 10.3 - Planning a Computer Program


Program development or Creation of the software consists of a set of steps
that programmers use to create software applications. The life cycle of the system
implementation directs the practitioners in information technology (IT) by designing
an information system. Likewise, the program development life cycle (PDLC)
directs software developers through application creation. The life cycle of program
creation includes the following phases.
 Analyze Requirements
 Design Solution
 Validate Design
 Implement Design
 Test Solution
 Document Solution
The stages in the life cycle of the program's production form a loop. The
creation of programs is a continuous process within the production of systems. The
Analyze Requirements phase starts again each moment someone finds flaws in or
274
changes to a program and demands modifications to the program. If programmers fix
mistakes or add changes to an existing program, they are said to have the software
preserved. Software maintenance is an ongoing process that takes place after the
software is distributed to clients or put into development.

10.3.1 - Steps in Developing a Program

1.Analyze Requirements
The first step in the development of the software is to examine the
specifications of the issue that the program(s) should fix so that the developer can
begin designing a suitable solution. In most cases, the solution requires more than
one program. The Analyze Requirements step consists of three major tasks:
 Review the requirements
 Meet with the systems analyst and users
 Identify the input, processing, output, and data components.

First, the programmer reviews the requirements. The requirements may be in


the form of deliverables, such as charts, diagrams, and reports. For example, screen
and report layout charts illustrate input and output requirements. Structured English,
decision tables, and decision trees convey processing requirements. The data
dictionary identifies data requirements. By thoroughly reviewing these deliverables,
the programmer understands the nature of the requirements.

2. Design Solution
The next step is to design a solution that will meet the users‘ requirements.
Creating a solution involves devising a solution algorithm to satisfy the requirements.
A solution algorithm, also called program logic, is a graphical or written
description of the step-by-step procedures to solve the problem. (santiagoagcaoili0)
Determining the logic for a program often is a programmer‘s most challenging task. It
requires that the programmer understand programming concepts, usually database
concepts, as well as use creativity in problem-solving.

275
Structured Design
The programmer typically starts with a basic design in structured design,
sometimes called the top-down design, and moves towards a more detailed design.
This method splits the initial collection of demands into smaller , more manageable
parts.
First step in top-down design is to define a program's primary purpose, also
called the main routine or main module. Next, the programmer splits down the
principal routine into smaller parts, called subroutines or modules. The programmer
then evaluates each subroutine to decide whether they can be further decomposed.
Programmers use a ladder map, also known as a structure chart, for graphical
representation of program modules. A plan of Hierarchy includes lines and
rectangles. The modules are rectangles. At the top of the map is the main section.
All other modules are placed underneath the main module. Modules are linked by
lines to signify connections.
Programs developed using structured design benefit from their simplicity,
reliability, readability, reusability, and maintainability. (Shelly & Vermaat, 2010)
Structured design, however, does not provide a way to package the data and the
program (or procedure) together. Each program has to define how it will use the
data. This can result in redundant programming code that must change every time
the structure of the data changes. To eliminate this problem, some IT professionals
use the object-oriented approach for program development.

Design Tools
Programmers use the design tools to help record a solution algorithm. Two
structured design tools include flowcharts and pseudocodes for the software. The
UML is a programming instrument for object-oriented design.
A program flowchart, or simply flowchart, graphically shows the logic in a
solution algorithm. In the early 1960s, the American National Standards Institute (
ANSI) published a set of flowcharts standards for the program. Still used today,
these specifications define symbols for different operations within the structure of a
program.
276
Programmers bind most of the symbols to solid lines on a program flowchart.
These lines indicate the programme's course. Dotted lines attach comment symbols
on a flowchart.
A comment symbol in the solution algorithm, also called an annotation
symbol, describes or clarifies the rationale.
Today, programmers create flowcharts using commercial flowcharting
software. This program makes modification and updating of flowcharts simple.
SmartDraw and Visio are two standard flowcharting software.

Pseudocode
Pseudocode conveys software logic using a simplified form of English. Some
programmers tend to use words to describe the logic of a solution algorithm
(pseudocode), rather than a graphical flowcharting technique. Heuristics set of steps
typically solving a problem; the solution may not be optimal. Useful heuristics provide
a remedy that is not optimal but appropriate for challenging issues—used when
complex/non-existent algorithms are optimal.

3. Validate Design
Once the programmers create the solution algorithm, the program design
should be validated for precision or tested. The programmer checks the logic for
accuracy during this step and attempts to uncover errors in the logic. A logic error is
a design flaw that results in inaccuracies.

4. Implement Design
Implementation of the design includes the use of a program development
method that assists the programmer in producing or supplying some or all code or
includes writing the code that converts the layout into a computer program and
creating the user interface, where necessary.
Coding a program means transforming the solution algorithm into a
programming language and typing it into the device.
277
5. Test Solution
When the programmer codes and the software enters, the next step is to
verify it. It is essential to get rigorous testing. Many users depend on the software
and its output after programmers have put the software into production to help their
everyday activities and decisions. The purpose of software testing is to ensure that
the program is running correctly and is error-free. Errors uncovered during this step
usually are one of two types: (1) syntax errors or (2) logic errors. A syntax error
occurs when the code violates the syntax or grammar of the programming language.

Document Solution
In documenting the solution, the programmer performs two activities: (1)
review the program code and (2) review all the documentation. First, programmers
review the program for any dead code and remove it. Dead code is any program
instructions that a program never executes. When programmers write a program,
they often write a section of code at a time(Shelly, Vermaat, Quasney, Sebok, &
Freund, 2012).
The programmers should run the program one final time to verify it still works.
When the program code has been checked, the programmer provides the system
analyst the program and all its information. The documentation contains all the
tables, solution algorithms, test results, and lists of software code containing global
and internal remarks. The programmer should be sure that all the paperwork is
correct and complete. This becomes particularly important if future improvements are
made to the software. Appropriate paperwork significantly reduces a new
programmer's time spent learning about current systems.

Lesson 10.4 - Introduction to Web Programming


Web programming involves writing, labeling, and coding Web content, web
service and server programming, and data management. The most common
languages used for Web programming are XML, HTML, JavaScript, Perl 5, and PHP.
278
Online programming is distinct from programming alone, which includes
interdisciplinary expertise on domain field, user and server scripting, as well as
database systems.
You may quickly categorize web programming into client and server coding.
The client-side requires programming to manage user data and provide details. It
also needs to ensure there are enough plug-ins to enrich user experience in a
graphic user interface, including security measures.
JavaScript is commonly used to enhance the user interface and related
functionalities on the client-side. It is an incredible tool for the design and
development of software applications on the client-side.
HTML5 and CSS3 provide the majority of the client-side features that other
application frameworks have.
The server side requires programming mainly for the recovery, protection, and
performance of data. Some of the tools used here include ASP, Lotus Notes, PHP,
Java, and MySQL.

10.4.1 - Web Programming Tools


1- PHP
PHP began as a small open source project, expanding as more and more
people became aware of how helpful it was. In 1994, Rasmus Lerdorf published the
first edition of PHP way. It is a recursive acronym for "PHP: Hypertext Preprocessor."
PHP is a language for server-side scripting, embedded in Javascript. It is used to
handle dynamic content, databases, monitoring sessions, and even create whole e-
commerce sites. It is embedded with several popular databases, along with MySQL,
PostgreSQL, Oracle, Sybase, Informix, and SQL Server from Microsoft. In its
implementation, PHP is satisfyingly zippy, particularly when processed on the Unix side
as an Apache module.
PHP supports a wide range of essential protocols, including POP3, IMAP, and
LDAP. PHP4 has introduced support for Java and distributed architectures of objects
(COM and CORBA), allowing the implementation of n-tier a first possibility. PHP
forgives: PHP vocabulary seeks to be as painful as possible. PHP Syntax is similar to C-
Like.
279
2 - MySQL
MySQL is the most common framework for the management of Open Source
Relational SQL databases. MySQL is one of the best RDBMS to use for web-based
software applications creation. MySQL is a fast, easy-to-use RDBMS that is used by
many small and large companies. MySQL is produced, sold, and sponsored by a
Swedish company called MySQL AB. MySQL is becoming so famous for several
good reasons:
 MySQL comes out under an open-source license. And you don't have to pay
to use it.
 MySQL is an exceptionally very efficient program. It manages a broad subset
of the features of the most costly and efficient database packages.
 MySQL uses a simplified version of the popular SQL data language.
 MySQL works for many operating systems and many languages such as PHP,
PERL, C, C++, JAVA, etc.
 SQL works very fast, and even with substantial data sets works perfectly.
 MySQL is the most popular language for web creation; PHP is very lovely.

3 - JavaScript
JavaScript is a scripting language that runs on the user's computer locally,
enabling web pages to respond to user engagement such as clicking on items and
aiming

4 - Python
Python is a scripting language of high quality, translated, dynamic, and
object-oriented. Python is designed to be extremely legible. It also uses English
keywords where punctuation is used like other languages, and it has less syntactical
designs than other languages.

5 - ASP.NET
ASP.NET is a web development framework that combines a programming
model, an integrated software framework, and different services required to establish
280
full PC and mobile device web applications. ASP.NET is used over the internet to
create interactive, data-driven web applications. It consists of a collection of controls
for assembling, customizing, and controlling code to develop HTML pages, such as
text boxes, buttons, and labels.

Let us reflect…
Introducing you to a vast forest of programming makes you feel overwhelmed.
The lesson above is only a tip of the iceberg. Have you examined or seen the
vastness of programming? Introduction to programming is very different to coding. It
is one of the results of the latter. Your basic skill of coding must be founded on the
right start of what you see. Now, can you see yourself as to what kind of programmer
you will be in the future? Can you perceive the gigantic task ahead that needs to be
carefully assessed and build upon it little by little? Go ahead, dream of becoming a
very fluent computer programmer. The one who can program everything as he
wishes to. You can write your thoughts in a notebook, your experience, your dream,
and make those digital pilgrim‘s road a light to your passion in the programming
world.

How much have you learned?


POST-TEST FOR LESSON 10

Name: _______________________________ Date: _______________________


& Section: ____________________________ Result: _____________________

A. Discuss the following:

1. Name at least three programming tools used in web development. Compare and
contrast each.
___________________________________________________________________
___________________________________________________________________

281
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________

2. Five Generation of Programming Languages


___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
B. Multiple Choice. Encircle the letter of the correct answer.

1. A(n) _____ reads a code statement, converts it to one or more machine language
instructions, and then executes those machine language instructions.
a. compiler
b. interpreter
c. source program
d. symbolic address

2. An OOP language is _____, which means an OOP language program checks for
and responds to events such as pressing a key or typing a value.
a. event-based
b. interpreted
c. event-driven
d. Compiled
282
3. When programmers compile a(n) _____ program, the resulting object code is
called a machine-independent byte code.
a. C
b. assembly language
c. Java
d. all of the above
4. _____ is a popular fourth-generation query language that allows users to manage,
update, and retrieve data in a relational DBMS.
a. SQL
b. COBOL
c. XML
d. RPG

5._____ is a subset of the Visual Basic language that allows programmers to add
intelligence and interactivity to Web pages.
a. VBScript
b. Flash
c. Ajax
d. SQL
6._____ is a Web page authoring program that is part of the Microsoft Office and
SharePoint families of products.
a. PHP
b. Ajax
c. SharePoint Designer
d. Flash
7. The concept of packaging data and procedures into a single object is called
_____.
a. object code
b. encapsulation
c. an object program
d. a control structure

283
8. _____________________refers to the writing, markup and coding involved in
Web development, which includes Web content, Web client and server scripting and
network security.
a. object code
b. encapsulation
c. an object program
d. a control structure

Lesson 10 Final Requirements:

Write a research article (not less than 500 words) on the following topics that
will be submitted in a week time.

 Research on how do we guarantee your program or application software is


reliable when hardware may exhibit intermittent and transient faults?
 From the lessons above, research on a related topic of OOP, i.e., modular
programming, and discuss it as how you understand it.

Suggested Readings:

 Books/Journals:
o The Complete Software Developer‘s Career Guide by John Sonmez
o Code Complete: A Practical Handbook of Software Construction,
Second Edition, by Steve McConnell
o Don't Make Me Think, Revisited: A Common Sense Approach to Web
Usability by Steve Krug
o Structure and Interpretation of Computer Programs by Harold Abelson,
Gerald Jay Sussman, and Julie Sussman
o Design Patterns: Elements of Reusable Object-Oriented Software by
Erich Gamma, Richard Helm, Ralph Johnson, John Vlissides
o Code: The Hidden Language of Computer Hardware and Software by
Charles Petzold

284
o Code Complete: A Practical Handbook of Software Construction by
Steve McConnell
o The Pragmatic Programmer: Your Journey to Mastery by Andrew Hunt
and David Thomas

 Websites:
o ―Best & Free Online Websites to Learn Coding for Beginners‖.
https://www.mockplus.com/blog/post/best-website-to-learn-coding
o ―Basic Programming Concepts‖. https://www.cs.princeton.edu/courses/
archive/fall18/cos126/lectures
o ―Computer Programming Concepts‖. https://www.tutorialspoint.com/
computer_programming/computer_programming_tutorial.pdf
o ―Basic Programming Concepts‖. http://www.aimt.edu.in/wp-
content/uploads/2016/12/Basic-Programming.pdf
o ―Programming Concepts‖, http://ptgmedia.pearsoncmg.com/images
/0130473200/samplechapter/0130473200.pdf
o ―Concepts.Techniques.and.Models.of.Computer.Programming‖.
http://aleteya.cs.buap.mx/~jlavalle/papers/books_on_line/MIT.Press.Co
ncepts.

REFERENCES

Clement, J. (2020, January 07). Number of internet users worldwide. Retrieved


August 29, 2020, from https://www.statista.com/statistics/273018/number-of-
internet-users-worldwide/

Floridi, L. (ed.) (2004), The Blackwell Guide to the Philosophy of Computing and
Information, Oxford: Blackwell.

Gotterbarn, D. and S. Rogerson (2005), ―Responsible Risk Analysis for Software


Development: Creating the Software Development Impact Statement,‖
Communications of the Association for Information Systems, 15(40): 730-50.

285
Huff, C. (2004), ―Unintentional Power in the Design of Computing Systems.‖ in T.
Bynum and S. Rogerson (eds.), Computer Ethics and Professional
Responsibility, Oxford: Blackwell.

Madijohnson1. (n.d.). Business to consumer B2C e-commerce consists of the sale of


goods and services: Course Hero. Retrieved August 29, 2020, from
https://www.coursehero.com/file/p2v5d1h6/Business-to-consumer-B2C-e-
commerce-consists-of-the-sale-of-goods-and-services/

Miller, S. (2008), ―Collective Responsibility and Information and Communication


Technology.‖ in J. van den Hoven and J> Weckert (eds.), Information
Technology and Moral Philosophy, Cambridge: Cambridge University Press,
226-50.

Shelly, G. B., & Vermaat, M. (2008). Discovering computers 2009: Brief. Australia:
Course Technology.

Shelly, G. B., & Vermaat, M. (2011). Discovering computers 2012: Living in a digital
world: Complete. Mason, OH: Cengage Learning.

286
Lesson 11: Introduction to Databases and
Data-mining
Duration: 3 Hours per week (Week 13)

Introduction

The term ‗database‘ is defined as any collection of electronic records that can
be processed to produce useful information. The data can be accessed, modified,
managed, controlled, and organized to perform various data-processing operations.
The data is typically indexed across rows, columns, and tables that make workload
processing and data querying efficient. Different types of databases include object-
oriented, relational, distributed, hierarchical, network, and others.
In enterprise applications, databases involve mission-critical, security-
sensitive, and compliance-focused record items that have complicated logical
relationships with other datasets and grow exponentially over time as the user based
increases. As a result, these organizations require technology solutions to maintain,
secure, manage and process the data stored in databases. This is where the
Database Management System comes into play.

OBJECTIVES/COMPETENCIES:

 Understand what is database?


 Identify the different databases types
 Understand the Database Management System
 Identify the various widespread databases
 Understand the data warehousing concepts
 Define what is data warehouse
 Understand the basics of data science and data mining

287
A pre-test of your Database and Data Science knowledge…

Name: __________________________________ Date: ____________________


Course & Section: ________________________ Result: __________________

Direction: Write TRUE if the statement is correct and FALSE if it is not.

__________ 1. A relational database is another type of database where data is


organized into tables to allow us to classify and access data related to other data in
the database.
__________ 2. Entity integrity ensures that there are no duplicate records within the
table and that the field that identifies each record within the table is unique and never
null.
__________ 3. The concept of a data warehouse was originally developed by
MICROSOFT and called ‗information warehouse.‘
__________ 4. Data mining relies on an effective collection of data, data
warehousing, and computer processing.
__________ 5. Data Integrity helps in insertion, modification, and deletion of the
actual data in the database.
__________ 6. Database Management System is the software that is used to
manage databases.
__________ 7. User Administration helps in registering and monitoring users,
enforcing data security, monitoring performance, maintaining data integrity, dealing
with concurrency control, and recovering information corrupted by unexpected
failure.
__________ 8. The data warehouse is not integrated because of the coming
together of source data from different enterprise-wide applications systems.
__________ 9. The ultimate goal of data warehousing is to integrate enterprise-wide
corporate data into multiple repositories from which users can easily run queries,
produce reports, and perform analysis.
__________ 10. A database is a data structure that cannot store logically
systematized data. Mostly contain several tables, which may each include various
fields.
288
Lesson 11.1 - What is Database?

A database is a data structure that stores logically systematized data. Mostly


contain several tables, which may each include various fields. For example, a school
database may contain tables for employees, financial, and student records. Each
has different areas related to the data stored in the table. Systematized means that
the data is organized to be easily stored, manipulated, and retrieved by the users. A
database can be of various complexity and scope. For example, on a laptop
computer, a teacher might keep a small database of her students‘ information that
contains a couple of megabytes of data. An integrated school might have an
extensive database consisting of several terabytes of data.

Lesson 11.2 - Databases Types

11.2.1 - Flat Files Database


Flat files commonly textual content documents that have word processing and
the structured markup removed. A flat file features a table with a single record per
line. To delimit the fields, the different columns in a record use a comma or tab. It
does not have several tables. The data in flat files do not have linked folders or
paths.

11.2.2 - One Flat Database


One flat file database could be challenging to apply if we need to determine
who the excellent student is one of the problems that we will encounter is. It will not
be efficient in searching a text file for large sizes because one has to search
sequentially through the entire file to gather the desired info.
One flat file database could be challenging to apply if we need to determine
who the excellent student is one of the problems that we will meet is. It will not be
proficient in looking for a text file for large sizes because we need to search one after
the other through the whole database to find specific data.

11.2.3 - Relational Databases


289
A relational database is another type of database where data is organized into
tables to allow us to classify and access data related to other data in the database.

Lesson 11.3 - Database Management Systems (DBMS)

11.3.1 - What is DBMS?

Database Management System - is the software that is used to manage


databases. Examples are MySQL, Oracle, etc. These are some commercially
popular DBMS used in various applications. DBMS allows users the following
tasks:

Data Definition - It helps in the creation, modification, and removal of definitions


that define the organization of data in the database.

Data Updation - It helps in insertion, modification, and deletion of the actual data
in the database.

Data Retrieval - It helps in retrieval of data from the database, which can be
used by applications for various purposes.

User Administration - It helps in registering and monitoring users, enforcing


data security, monitoring performance, maintaining data integrity, dealing with
concurrency control, and recovering information corrupted by unexpected failure.

11.3.2 - Characteristics DBMS:

A. Data Integrity - maintains the correctness and consistency of the data. Below
are the types of data integrity:
1. Domain Integrity

290
All categories and values in a database are set, including nulls (e.g., N/A).
The domain integrity of a database refers to the common ways to input and read
this data. For instance, if a database uses monetary values to include dollars and
cents, three decimal places will not be allowed.
Example, a student number is consisting of 10 digits. If the user is trying to
assign a value with a letter, or any non-numeric character or with more than or
less than the given numbers, it should be rejected.

2. Entity Integrity
It depends on the making of primary keys or exclusive values that classify
data items. The purpose is to make sure that data is not recorded multiple times
(i.e., each data item is unique), and the table has no null fields.
Entity integrity is a critical feature of a relational database that stores data in a
tabular format, which can be interconnected and used in a range of ways.

3. Referential Integrity
Referential integrity refers to the accuracy and consistency of data within a
database relationship. Data is linked between two or more tables. This is
achieved by having the reference a primary key value. Because of this, we need
to ensure that data on both sides of the relationship remains intact.
Referential integrity requires that if there is a foreign key value that is being
used, it must reference a valid and existing primary key in the parent table, for
example, is a Student and Course database relationship. If we have course_id as
a foreign key in the Student table, by using referential integrity constraints, we
can avoid creating Student without course or non-existing course.

B. Data Accessibility and Responsiveness - even when it crosses traditional


departmental restrictions, the end-users without programming knowledge can often
recover and display data.

C. Data Security – the data saved in the database is secured with appropriate
access control.
291
Examples of Database Management System

DATABASE MANUFACTURER
Access Microsoft Corporation
DB2 IBM Corporation
Oracle Oracle Corporation
SQL Server TM
Microsoft Corporation
Sybase Sybase, Inc.
MySQL Oracle Corp.

Lesson 11.4 - Data Warehousing Concepts

The concept of a data warehouse was initially developed by IBM and called
‗information warehouse.‘ It is presented as a key for accessing data saved in non-

292
relational systems. The information warehouse was projected to let organizations
use their data archives and help them have a business advantage. But, because of
the steep difficulty and performance glitches connected with the execution of such
solutions, the initial attempts in creating an information warehouse were mostly
rejected. Since then, the idea of data warehousing has been raised many times, but
it is only in current years that the potential of data warehousing is now seen as a
valuable and viable solution. Bill Inmon is the latest advocate for data warehousing
and most successful. Because of his active promotion of the concept, He was called
the ‗father of data warehousing.‘

Data warehouse (Inmon)


Data warehouse (Inmon) is a subject-oriented, integrated, time-variant, and
non-volatile collection of data in support of management‘s decision-making process.
In this definition by Inmon (1993), the data is:
 Subject-oriented as the warehouse is organized around the primary subjects
of the enterprise (such as customers, products, and sales) rather than the
significant application areas (such as customer invoicing, stock control, and
product sales).
 They are integrated because of the coming together of source data from
different enterprise-wide applications systems. The combined data source
must be made consistent with presenting a unified view of the data to the
users.
 Time-variant because data in the warehouse is only accurate and valid at
some point in time or over some time interval. The time-variance of the data
warehouse is also shown in the extended time that the data is held. The
implicit or explicit association of time with all data and the fact that the data
represents a series of snapshots.
 Non-volatile as the data is not updated in real-time but is refreshed from
operational systems regularly. New information is always added as a
supplement to the database, rather than a replacement. The database

293
continually absorbs this new data, incrementally integrating it with the
previous data.

Take note that the ultimate goal of data warehousing is to integrate


enterprise-wide corporate data into a single repository from which users can
efficiently run queries, produce reports, and perform analysis. In summary, a data
warehouse is data management and data analysis technology.

Lesson 11.5 - Introduction to Data Mining

Data Mining is a method used to make useful information from unprocessed


data. With the use of software to look for similarities in large groups of data,
companies can have more ideas with regards to their consumers to create more
effective marketing strategies, to have an increase with their sales, and to lessen
their expenses. Data mining relies on a significant collection of data, data
warehousing, and computer processing.

The development of Information Technology has generated large amount of


databases and huge data in various areas. The research in databases and
information technology has given rise to an approach to store and manipulate this
precious data for further decision making. Data mining is a process of extraction of
useful information and patterns from huge data. It is also called as knowledge
discovery process, knowledge mining from data, knowledge extraction or
data/pattern analysis.

Data mining is a logical process that is used to search through large amount
of data in order to find useful data. The goal of this technique is to find patterns that
were previously unknown. Once these patterns are found they can further be used to
make certain decisions for development of their businesses. Three steps involved
are:

294
 Exploration

In the first step of data exploration data is cleaned and transformed into
another form, and important variables and then nature of data based on the
problem are determined.

 Pattern identification

Once data is explored, refined and defined for the specific variables the
second step is to form pattern identification. Identify and choose the patterns
which make the best prediction.

 Deployment

Patterns are deployed for desired outcome.

KDD Process overview


According to Zainne (1999), we are in an age often referred to as the
information age. In this information age, because we believe that information leads to
power and success, and thanks to sophisticated technologies such as computers,
satellites, etc., we have been collecting tremendous amounts of information. Initially,
with the advent of computers and means for mass digital storage, we started
collecting and storing all sorts of data, counting on the power of computers to help
sort through this amalgam of information. Unfortunately, these massive collections of
data stored on disparate structures very rapidly became overwhelming. This initial
chaos has led to the creation of structured databases and database management

295
systems (DBMS). The efficient database management systems have been very
important assets for management of a large corpus of data and especially for
effective and efficient retrieval of particular information from a large collection
whenever needed. The proliferation of database management systems has also
contributed to recent massive gathering of all sorts of information. Today, we have
far more information than we can handle: from business transactions and scientific
data, to satellite pictures, text reports and military intelligence. Information retrieval is
simply not enough anymore for decision-making. Confronted with huge collections of
data, we have now created new needs to help us make better managerial choices.
These needs are automatic summarization of data, extraction of the ―essence‖ of
information stored, and the discovery of patterns in raw data.

11.5.1 - Kind of Information Collected in Data Mining-Applications


of Data Mining

We have been collecting a myriad of data, from simple numerical


measurements and text documents, to more complex information such as spatial
data, multimedia channels, and hypertext documents. Here is a non-exclusive list of
a variety of information collected in digital form in databases and in flat files.

 Business Transactions
Every transaction in the business industry is (often) ―memorized‖ for perpetuity.
Such transactions are usually time related and can be inter-business deals such as
purchases, exchanges, banking, stock, etc., or intra-business operations such as
management of in-house wares and assets. Large department stores, for example,
thanks to the widespread use of bar codes, store millions of transactions daily
representing often terabytes of data. Storage space is not the major problem, as the
price of hard disks is continuously dropping, but the effective use of the data in a
reasonable time frame for competitive decisionmaking is definitely the most
important problem to solve for businesses that struggle to survive in a highly
competitive world.

296
 Scientific Data
Whether in a Swiss nuclear accelerator laboratory counting particles, in the
Canadian forest studying readings from a grizzly bear radio collar, on a South Pole
iceberg gathering data about oceanic activity, or in an American university
investigating human psychology, our society is amassing colossal amounts of
scientific data that need to be analyzed. Unfortunately, we can capture and store
more new data faster than we can analyze the old data already accumulated.

 Medical and Personal Data


From government census to personnel and customer files, very large collections
of information are continuously gathered about individuals and groups.
Governments, companies and organizations such as hospitals, are stockpiling very
important quantities of personal data to help them manage human resources, better
understand a market, or simply assist clientele. Regardless of the privacy issues this
type of data often reveals, this information is collected, used and even shared. When
correlated with other data this information can shed light on customer behaviour and
the like.

 Surveillance Video And Pictures


With the amazing collapse of video camera prices, video cameras are becoming
ubiquitous. Video tapes from surveillance cameras are usually recycled and thus the
content is lost. However, there is a tendency today to store the tapes and even
digitize them for future use and analysis.
 Satellite Sensing
There is a countless number of satellites around the globe: some are geo-
stationary above a region, and some are orbiting around the Earth, but all are
sending a non-stop stream of data to the surface. NASA, which controls a large
number of satellites, receives more data every second than what all NASA
researchers and engineers can cope with. Many satellite pictures and data are made
public as soon as they are received in the hopes that other researchers can analyze
them.

297
 Games
Our society is collecting a tremendous amount of data and statistics about
games, players and athletes. From hockey scores, basketball passes and car-racing
lapses, to swimming times, boxer‘s pushes and chess positions, all the data are
stored. Commentators and journalists are using this information for reporting, but
trainers and athletes would want to exploit this data to improve performance and
better understand opponents.

 Digital Media
The proliferation of cheap scanners, desktop video cameras and digital cameras
is one of the causes of the explosion in digital media repositories. In addition, many
radio stations, television channels and film studios are digitizing their audio and
video collections to improve the management of their multimedia assets.
Associations such as the NHL and the NBA have already started converting their
huge game collection into digital forms.

 CAD and Software Engineering Data


There are a multitude of Computer Assisted Design (CAD) systems for architects
to design buildings or engineers to conceive system components or circuits. These
systems are generating a tremendous amount of data. Moreover, software
engineering is a source of considerable similar data with code, function libraries,
objects, etc., which need powerful tools for management and maintenance.

 Virtual Worlds
There are many applications making use of three-dimensional virtual spaces.
These spaces and the objects they contain are described with special languages
such as VRML. Ideally, these virtual spaces are described in such a way that they
can share objects and places. There is a remarkable amount of virtual reality object
and space repositories available. Management of these repositories as well as
content-based search and retrieval from these repositories are still research issues,
while the size of the collections continues to grow.
298
 Text Reports and Memos (E-Mail Messages)
Most of the communications within and between companies or research
organizations or even private people, are based on reports and memos in textual
forms often exchanged by e-mail. These messages are regularly stored in digital
form for future use and reference creating formidable digital libraries.

 The World Wide Web Repositories


Since the inception of the World Wide Web in 1993, documents of all sorts of
formats, content and description have been collected and inter-connected with
hyperlinks making it the largest repository of data ever built. Despite its dynamic and
unstructured nature, its heterogeneous characteristic, and its very often redundancy
and inconsistency, the World Wide Web is the most important data collection
regularly used for reference because of the broad variety of topics covered and the
infinite contributions of resources and publishers. Many believe that the World Wide
Web will become the compilation of human knowledge.

Let us reflect…
The topic of Databases and Data Science and Mining is like a vast of ocean. It
needed an artificial intelligence to handle it. They say, ―Data is the new oil‖. It is the
very truth that every IT, Data Engineer, Computer Science, and Data Science guy
must face not only today, but also in the future. Data is the future, and if it is, how do
you handle it? How can you control and manipulate its gigantous attribute to benefit
mandkind? Have you established yourself how to face the future? Reflect on those
things, it is only the beginning of many generation‘s journey.

299
How much have you learned?
POST-TEST FOR LESSON 11

Name: _______________________________ Date: _______________________

Course & Section: _____________________ Result: _____________________

Complete each statement by writing the answer in each blank.

1. Data __________ is a method used to make useful information from


unprocessed data.
2. Data warehouse is __________ as the warehouse is organized around the
major subjects of the enterprise rather than the major application areas.
3. Data Accessibility and __________ means that even when it crosses
traditional departmental restrictions, the end users without programming
knowledge can often recover and display data.
4. Data Definition helps in creation, __________ and removal of definitions that
define the organization of data in the database.
5. A database is a data structure that stores logically __________ data.
6. A __________ features a table with a single record per line. To delimit the
fields, the different columns in a record use a comma or tab.
7. Data Retrieval helps in __________ of data from the database which can be
used by applications for various purposes.
8. The data in flat files does not have __________ folders or paths.
9. A database can be of various complexity and __________. For example, on a
laptop computer, a teacher might keep a small database of her students‘
information that contains a couple of megabytes of information.
10. Prototypes for Object Database Management Systems, or ODBMS, were
created in the early __________.

300
Lesson 11 Final Requirements:

 Write a research article (not less than 500 words) on the following topics:
o How can Data Science impact positively the post Covid-19 era? Explain
your arguments.
o What are the future trends in Data Science? Name one item that will
impact the health sector of our society and explain it by your own
understanding.

Suggested Readings:

 Books/Journals:
o Data Mining Techniques And Applications, Ramageri, B. M., (2010),
Indian Journal of Computer Science and Engineering, Vol. 1 No. 4
o Book Cover of Christian Mancas - Conceptual Data Modeling and
Database Design: A Fully Algorithmic Approach, Volume 1: The
Shortest Advisable Path, by Christian Mancas
o Data Science and Big Data Analytics: Discovering, Analyzing,
Visualizing and Presenting Data 1st Edition by EMC Education
Services
o Principles of Database Management, The Practical Guide to Storing,
Managing and Analyzing Big and Small Data, by Wilfried Lemahieu,
Seppe vanden Broucke, and Bart Baesens
 Websites:
o ―Databases for Beginners – Things You Should Know‖.
https://wiredelta.com/databases-for-beginners/
o ―What Is a Web Database?‖. https://www.techwalla.com/articles/what-
is-a-web-database
o ―Database Management System Tutorial‖. https://www.tutorialspoint.
com/ dbms/index.htm
o ―Machine Learning‖. https://machinelearningmastery.com/
o ―Data Science‖. https://elitedatascience.com/
o ―Deep Learning for Beginners‖. https://www.kdnuggets.com/

301
REFERENCES

Brook, Chrison (2019). DATA PROTECTION 101 - What is Data Integrity? Definition,
Best Practices & More. Retrieved August 14, 2020, from
https://digitalguardian.com/blog/what-data-integrity-data-protection-101

―KDD process of Data Mining‖, (n.d.). Retrieved from http://www2.cs.uregina.ca


/~dbd/cs831/notes/kdd/1_kdd.html

Ramageri, B. M., (2010), Data Mining Techniques And Applications, Indian Journal
of Computer Science and Engineering, Vol. 1 No. 4 301-305

Raza, Muhammad (2018). The Business of IT Blog - DBMS: An Intro to Database


Management Systems. Retrieved August 14, 2020,
https://www.bmc.com/blogs/dbms-database-management-systems/

Tuteja, S. & Desai, P. (2019). Introduction of DBMS (Database Management


System) | Set 1. Retrieved August 14, 2020, from
https://www.geeksforgeeks.org/introduction-of-dbms-database-management-
system-set-1/

Naeem, Tehreem (2020). The Importance of Data Integrity in a Database. Retrieved


August 15, 2020, from https://www.astera.com/type/blog/data-integrity-in-a-
database/

302
UNIT 04
Information Communication
Technology, Ethics and Beyond

Unit-04: Lessons Composition

I. Lesson 12: Information and Communication


Security
Duration: 3 Hours per week (Week 14)

II. Lesson 13: Information, Communication and


Computer Ethics
Duration: 3 Hours per week (Week 15)

III. Lesson 14: Future trends in ICT


Duration: 3 Hours per week (Week 16)

IV. Week 17: Final Examination Week

V. Week 18: Submission of Final Requirements

303
Lesson 12: Information and Communication
Security
Duration: 3 Hours per week (Week 14)

Introduction
In today's worldwide growth of high technology, most companies are more
dependent on their information systems. The public is nervous about using the
system to store their data especially the people who do ecommerce and banking
transactions, in particular, personal information. Furthermore, the possibility of
computer hackers and identity theft has contributed to their anxiety about the use of
the information system, since there are so many hackers from all over the world
today. As a result, many companies would consider their information as their vital
activity that they need to secure their internal control activity. As companies rely
more and more heavily on computers to store confidential corporate and consumer
information, the concerns of stolen or lost data are becoming prominent in all
headline news. Information protection should be concerned because much of the
value of an organization is based on the value of its knowledgeable information.
Information Security is sometimes abbreviated to InfoSec, is a set of
practices intended to keep data secure from unauthorized access or alterations, both
when it's being stored and when it's being transmitted from one machine or physical
location to another. You might sometimes see it referred to as data security. As
knowledge has become one of the 21st century's most important assets, efforts to
keep information secure have correspondingly become increasingly important.

OBJECTIVES/COMPETENCIES:

 Understand what information and communication security is.


 Define the basic terminologies used in this lesson.
 Understand what malware is and why it is dangerous.
 Analyse what is spoofing attack and its functions to harm computers.
 Identify what is network-based attack
 Identify what is denial of service (DoS) attack
 Define and understand what social engineering is.
 Understand how to protect a computer against network security.
304
A pre-test of your Information and Communication Security
knowledge…

Name: __________________________________ Date: ____________________

Course & Section: ________________________ Result: __________________

Direction: Write TRUE if the statement is correct and FALSE if it is not.

__________ 1. The spammer is an individual who frequently uses viruses to control


computers to send out large numbers of unrequested e-mails.
__________ 2. In 2014, Backoff Malware designed to compromise Point-of-Sale
(POS) systems to steal credit card data.
__________ 3. Quid Pro Quo attacks are infamously known for grabbing information
from target uses.
__________ 4. Social Engineering is the hack that requires no knowledge of code.
__________ 5. Black hat is people who use their capabilities to look for weaknesses
in systems then report these weaknesses to the owners of the system so they can
be fixed.
__________ 6. During an IP spoofing attack, a cybercriminal impersonates an IP
address pretending to be another user.
__________ 7. A denial-of-service (DoS) attack occurs when a system or machine
maliciously gets flooded with traffic or information that makes it crash or be otherwise
inaccessible to users.
__________ 8. Phishing in this social engineering attack, hackers ask for critical
data or login credentials in exchange for a service.
__________ 9. A firewall is a piece or set of software or hardware designed to block
unauthorized access to computers and networks.
__________ 10. Domain spoofing is a common type of phishing scam where an
attacker uses a company‘s domain to impersonate the business or its employees.

305
Lesson 12.1 – InfoSec Basic Terminologies

The following terms are frequently linked to information and communication security.
 Threat - is the expressed possible manifestation of an ―attack.‖ This term is
often interchanged and misused with the term attack, and vulnerability.
 Attack - to harm and take action against a target.
 Vulnerability - a flaw that marks targets prone to an attack.
 Hacker – recently, this term is usually used in a negative way to define a
person with malicious intent who tries to have unauthorized access to network
resources but historically, this has been used as a common term for a
computer programmer.
 Cracker - It is the more accurate word that is used to describe a person with
malicious intent who tries to have unauthorized access to network resources.
 Phreaker - A person who is breaking into the phone network to cause it to
perform a purpose that is not allowed usually. For example, to have free
phone calls.
 Spammer - is an individual who frequently use viruses to control computers to
send out large numbers of unrequested e-mails.
 Phisher - The phisher pretends as a trusted party that would have an exact
need for the confidential information. For example, someone tries to pretend
to others, usually via e-mail or other means of communication, to ask for
sensitive information, such as bank account numbers or pin codes.
 White Hat - These are people who use their capabilities to look for
weaknesses in systems then report these weaknesses to the owners of the
system so they can be fixed.
 Black hat - these are people who use their capabilities to break into systems
that they are not legally allowed to use.

306
Lesson 12.2- Malware

A brief look at the history of malware shows us that this malicious menace has
been with us since the dawn of computing itself. According to Scientific American,
the idea of a computer virus extends back to 1949, when early computer scientist
John von Neumann wrote the ―Theory and Organization of Complicated Automata,‖
a paper that postulates how a computer program could reproduce itself. In the
1950s, employees at Bell Labs gave life to von Neumann‘s idea when they created a
game called ―Core Wars.‖ In the game, programmers would unleash software
―organisms‖ that competed for control of the computer.
The earliest documented viruses began to appear in the early 1970s.
Historians often credit the ―Creeper Worm,‖ an experimental self-replicating program
written by Bob Thomas at BBN Technologies with being the first virus. Creeper
gained access via the ARPANET and copied itself to remote systems where it
displayed the message: ―I‘m the creeper; catch me if you can!‖
The term ―virus,‖ however, wasn‘t introduced until the mid-eighties. Fred
Cohen often considered the father of what we know today as a computer virus,
coined the term in his 1986 Ph.D. thesis. He defined a ―virus‖ in a single sentence
as: ―A program that can infect other programs by modifying them to include a,
possibly evolved, version of itself.‖
From these benign and straightforward beginnings, a massive and sinister
industry was born. Today, according to The Anti-Phishing Workgroup, malware has
infected one-third of the world‘s computers. The consequences are staggering.
Cyber security Ventures reports that losses due to cybercrime, including malware,
are anticipated to hit $6 trillion annually by 2021.

12.2.1 - History of Malware – State-Sponsored, Sophisticated and Profitable


Between 2010 and the present time, we‘ve again observed significant evolution
in the sophistication of malware. Organized crime and state sponsors upped the
game dramatically with large, well-funded development teams. These malicious
workgroups continue to evolve today, developing advanced malware with evasion
tactics that outsmart many conventional anti-malware systems. Infiltrating factories
307
and military systems became an everyday reality. The monetization of malware
overgrew with dramatic growth in ransomware and other illegal schemes.

12.2.2 - Notable Varieties of Malware Impact between Year 2010-2020

 2010 – Stuxnet Worm: Shortly after its release, security analysts openly
speculated that this malicious code was designed with the express purpose of
attacking Iran‘s nuclear program and included the ability to impact hardware
as well as software. The incredibly sophisticated worm is believed to be the
work of an entire team of developers, making it one of the most resource-
intensive bits of malware created to date.

 2011 — Zeus Trojan: Although first detected in 2007, the author of the Zeus
Trojan released the source code to the public in 2011, giving the malware new
life. Sometimes called Zbot, this Trojan has become one of the most
successful pieces of botnet software in the world, impacting millions of
machines. It is often used to steal banking information by man-in-the-browser
keystroke logging and form grabbing.

 2013 – Cryptolocker: One of many early ransomware programs,


Cryptolocker, had a significant impact globally and helped fuel the
ransomware era.

 2014 – Backoff: Malware designed to compromise Point-of-Sale (POS)


systems to steal credit card data.

 2016 – Cerber: One of the heavy-hitters in the ransomware sphere. It‘s also
one of the most prolific crypto-malware threats. At one point, Microsoft found
more enterprise PCs infected with Cerber than any other ransomware family.

 2017 – WannaCry Ransomware: Exploiting a vulnerability first uncovered by


the National Security Agency, the WannaCry Ransomware brought significant
308
computer systems in Russia, China, the UK, and the US to their knees,
locking people out of their data and demanding they pay a ransom or lose
everything. The virus affected at least 150 countries, including hospitals,
banks, telecommunications companies, warehouses, and many other
industries.

 2020 Latest Malwares:

o Clop Ransomware - is a malware which encrypts your files until you


pay a ransom to the hackers. ―Clop‖ is one of the latest and most
dangerous ransomware threats. It‘s a variant of the well-known
CryptoMix ransomware, which frequently targets Windows users. The
Clop ransomware has evolved since its inception, now targeting entire
networks — not just individual devices. Even the Maastricht University
in the Netherlands became a victim of the Clop ransomware, with
almost all Windows devices on the university‘s network being
encrypted and forced to pay a ransom.
o Fake Windows Updates (Hidden Ransomware) - Hackers have been
increasingly sending emails that instruct readers to install urgent
Windows OS updates. The emails trick readers into installing the
―latest‖ Windows updates, which are actually ransomware ‗.exe‘ files in
disguise. The ransomware contained in these emails is known as
―Cyborg‖. It encrypts all of your files and programs and demands a
ransom payment to un-encrypt the files. Unfortunately, many email
service providers and basic antivirus software aren‘t able to detect and
block these emails. This is why you must be using an antivirus that
provides proper internet security, protecting you from dangerous
emails.
o Zeus Gameover - Zeus Gameover is part of the ―Zeus‖ family of
malware and viruses. This piece of malware is a Trojan — malware
disguised as something legitimate — that accesses your sensitive bank
account details and steals all of your funds. The worst thing about this
particular variant of the Zeus malware family is that it doesn‘t require a
309
centralized ―Command and Control‖ server to complete transactions —
which is a flaw found in many cyberattacks that authorities can target.
Instead, Zeus Gameover can bypass centralized servers and create
independent servers to send sensitive information. In essence, you
cannot trace your stolen data.
o News Malware Attacks - Cybercriminals often use current news
stories and global events to target people with malware. One example
is hackers using the wave of the COVID-19 (Coronavirus) outbreak to
target individuals with malware. Hackers send out emails that are
disguised as legitimate information about the outbreak. Readers are
prompted to click a link to learn more about the information, but the link
contains malware that copies the files on your device and steals your
personal information. Research currently focuses on the spread of this
malware in Japan. Still, it will become an issue worldwide during any
kind of newsworthy outbreak.
o IoT Device Attacks - As the popularity of IoT (Internet of Things)
devices grows in 2020 — things like smart speakers and video
doorbells — hackers are looking to exploit these devices for valuable
information. There are multiple reasons why hackers choose to target
IoT devices. For one, most IoT devices don‘t have enough storage to
install proper security measures. These devices often contain easy-to-
access data such as passwords and usernames, which then can be
used by hackers to log into user accounts and steal valuable
information, such as banking details. Hackers can also use internet-
based cameras and mics to spy on and communicate with people —
including young children via smart baby monitors. These devices can
also act as weak points in a corporation‘s network, meaning hackers
can gain access to entire systems through unsecured IoT devices —
spreading malware to other devices across the network.
o Artificial Intelligence (AI) Attacks - As more tools become available
to developers who want to program AI scripts and software, hackers
will be able to use this same technology to carry out devastating

310
cyberattacks. Although cybersecurity companies are using artificial
intelligence and machine learning algorithms to help combat malware,
these technologies can also be exploited to hack devices and networks
on a massive scale. Cyberattacks can often cost cybercriminals a lot in
terms of time and resources. So, with the expansion of AI and machine
learning technologies, we can only expect hackers to develop highly-
advanced and destructive AI-based malware in 2020 and beyond.

Lesson 12.3 - What is Spoofing Attack?

According to a recent study by the Center for Applied Internet Data Analysis
(CAIDA), almost 30,000 spoofing attacks occurred each day from March 2015 to
February 2017. Today, the number of attacks continues to increase across the world
exponentially.
Companies and other organizations that fall victim to spoofing attacks can end
up losing millions in revenue. The good news is many of these attacks are
preventable with the correct system configuration, employee training, and high-
quality cybersecurity tools

12.3.1 - Most Common Types of Spoofing Attacks


Spoofing attacks are perpetrated in many different ways. The most common
types that target organizations include IP, email, and domain or website spoofing
attacks.
Understanding how each type of attack works can help your organization
more easily combat them.

How IP Spoofing Attacks Work


During an IP spoofing attack, a cybercriminal impersonates an IP address
pretending to be another user. The attacker sends inbound packets from a fake
source address to devices within a network, often operating as part of a DDoS
(Direct Denial of Service) attack.

311
The use of multiple packet addresses overwhelms and shuts down the
targeted device. These types of attacks can be detected with a network analyzer or
bandwidth monitoring tool.
Monitoring normal traffic usage can assist you in recognizing illegitimate traffic
so you can do a more in-depth investigation. It‘s essential to catch IP spoofing
attacks as soon as possible because, as part of a DDoS attack, they can take your
network completely offline, disrupting normal business activities.
Another malicious IP spoofing method is a Man-in-the-Middle attack that
interrupts communication between two computers, alters the packets, and transmits
them without the original sender or recipient being aware of it.
Eventually, attackers can gather loads of personal information they can sell or
use for other fraudulent purposes.

How Email Spoofing Attacks Work


Email spoofing is used in email phishing attacks and spam campaigns to trick
recipients into the opening and/or replying to an attacker‘s solicitation. The email
header is forged to make it appear that the message comes from someone the
recipient trusts who is different from the actual source.
Usually, the purpose of email spoofing is to acquire personal information like
passwords or credit card numbers and/or to commit identity theft. A fake email might
even pretend to be from a retail business offering a link with a limited-time deal,
which, when clicked, downloads and installs malware on the recipient‘s device.
In the case of business email compromise (BEC) attacks, email spoofing is
used to send emails appearing to be from the CEO or CFO of a company requesting
fraudulent wire transfers be sent to a supplier, also known as display name spoofing.

How Domain Spoofing Attacks Work


Domain spoofing is a common type of phishing scam where an attacker uses
a company‘s domain to impersonate the business or its employees. Attackers send
emails with fake domain names that seem real and create websites with
imperceptibly altered characters to trick visitors into thinking they‘re being sent to the
correct site.

312
Usually, a spoofed email or website will have the logos, branding, and visual
design of the legitimate business. Visitors are then guided to enter their financial
details or other sensitive information that the attacker intercepts.
In the ad tech industry, domain spoofing allows a low-quality publisher to
perpetrate ad fraud by disguising themselves as a premium publisher on an ad
exchange. Fraudsters substitute a fake URL through ad networks to trick advertisers
into thinking their bidding on a premium site for their ad to be served on, when in
fact, the ad is performed on a different lower-quality website.
Domain spoofing can also be accomplished in more complex ways with bots.
These bots can spoof a site‘s URL so that when an ad reads the URL from the
browser, it reports back the spoofed URL to the advertiser.
Malware can also inject ads inside the pages of premium sites without the
operator noticing while the fraudster collects the revenue.

Lesson 12.4 - Denial of Service (DoS) Attack

A denial-of-service (DoS) attack occurs when a system or machine


maliciously gets flooded with traffic or information that makes it crash or be otherwise
inaccessible to users. The most common method is a buffer overflow attack, which
sends more traffic to a network address than it can handle.
Hackers also try other tactics, such as using fake data packets that send
content to every machine on a network instead of only one, or by carrying out an
SYN flood. The latter sends a server connection request but doesn‘t complete the
handshake. This kind of attack targets every open port, so there are none left for
legitimate customers to use. Another technique exploits existing vulnerabilities in the
system, rather than increasing traffic, to cause it to crash.
DoS attack victims also target high-profile organizations' web servers, such as
banking, trade, and media firms, or government and trade organizations. While DoS
attacks usually do not result in theft or loss of important data or other properties, they
can cost the victim a lot of time and money to deal with.

12.4.1 Two General Methods of DoS Attacks

313
1. Flooding services or crashing services. If the device receives too much
traffic for the server to buffer, flood attacks occur , causing them to slow down
and stop eventually. Popular flood attacks include:
a. Buffer overflow attacks – the most common DoS attack. The idea is
to submit a network address with more traffic than the programmers
have designed the framework to manage. This includes, in addition to
others designed to exploit vulnerabilities unique to some applications or
networks, the attacks mentioned below.
b. ICMP flood - by sending spoofed packets that ping each computer on
the targeted network, instead of just one particular machine, it
leverages misconfigured network devices. To amplify the traffic, the
network is then enabled. This attack is often referred to as the death
smurf attack or ping of death.
c. SYN flood-sends a script, but never completes the handshake, to
connect to a server. It continues until all open ports are overloaded with
requests and no requests are available to connect to legitimate users.

2. Other DoS attacks merely exploit vulnerabilities that cause a crash of the
target system or service as shown in the image above. In these attacks,
input is sent that takes advantage of target bugs that crash or seriously
destabilize the machine subsequently, so that it cannot be reached or used.

314
12.4.2 – DDoS –Distributed Denial of Service

The Distributed Denial of Service (DDoS) attack is an additional sort of DoS


attack. A DDoS attack occurs when a coordinated DoS attack is orchestrated on a
single target by multiple systems. The fundamental difference is that the target is
attacked from several locations at once instead of being attacked from one spot. The

distribution of hosts describing a DDoS offers several advantages for the attacker
and these are:
 The higher volume of the computer can be used to launch a severely
destructive attack.
 To launch a severely destructive attack, the higher volume of the device can
be used.
 Multiple devices are more difficult to shut down than one
 The true attacking party is very difficult to identify, as they are disguised
behind many (mostly compromised) systems.

315
Modern security technologies have evolved mechanisms to protect against
most types of DoS attacks, but it is still regarded as an elevated threat because of
the specific characteristics of DDoS and is of greater concern to organizations that
fear being threatened by such an attack.

Lesson 12.5 - Social Engineering

Social Engineering is the hack that requires no knowledge of code. Despite its
relative simplicity, the risks associated with social engineering are just as serious as
the numerous hacks that have populated recent headlines. For everyday citizens,
awareness of social engineering scams and the methods they use that prey on
weaknesses in human behavior should be at an all-time high. Everyone is a target,
and you should be vigilantly aware of anyone asking for personal or private
information.

12.5.1 - Five Common Types of Social Engineering Attacks

1. Phishing
It is the most common but dangerous type of social engineering attack.
Phishing attacks are infamously known for grabbing information from target uses.
Phishers carry out this attack by sending malicious or spoofed emails to targets to
get their data. This attack is mainly deployed to accomplish three things:
 Obtain personal information like user‘s credentials, social security numbers, or
financial details.
 Redirect users to suspicious websites, which host phishing landing pages.
 For the quick response from users by manipulating them with attempts of
incorporating threats or show urgency.

Usually, phishing emails contain poor grammar, spelling errors, or malicious


attachments like doc files or URLs.
316
2. Quid Pro Quo
In this social engineering attack, hackers ask for critical data or login
credentials in exchange for a service. For example, the hacker impersonates itself as
a technical expert and phone calls an end-user. Then hacker offers a free service of
IT assistance in exchange for the user‘s login credentials. Once the end-user is lured
into handing over its secretive details, the hacker‘s mission is accomplished. There
are various ways to deploy this social engineering attack as fraudsters make victims
believing it as a fair exchange.

3. Pretexting
Pretexting is equivalent to phishing activity. Here hackers create a false sense
of trust to get information out of their victims. If a hacker targets an end-user, then it
impersonates itself as a user‘s co-worker or a higher dignity from the user‘s
organization. By this, the hacker wins the user‘s trust and quickly gets access to the
user‘s login credentials. These attacks shockingly come out to be effective, and most
of the sophisticated attackers use this method for the vicious intent.

4. Baiting
Just like various similar phishing attacks, baiting is one of the ways to entice
victims. In this social engineering attack, cyber-attackers promise goods or services
to users in return for their login credentials. They use baits like ―offer‖ or ―free‖
downloads, which could be of anything like movies, music, game, video, etc.
Furthermore, it attracts users, and they give away their login credentials easily.
Baiting attacks do not restrict to online schemes. Attackers go way beyond to exploit
human curiosity by using physical media too.

5. Piggybacking
Also known as tailgating, piggybacking is a practice of attackers trying to seek
access to a restricted area. This attack is deployed when an unauthorized person
physically follows the authorized person to a restricted place that lacks proper
authentication. This type of social engineering attack can take place in any form. For

317
instance, a hacker can either ask an employee to borrow his/her laptop for some
work and can quickly install malware software stealthily.

Lessons 12.6 - Protecting the Network

Computer and network security breaches seem to be in the news every day,
and they cost the organizations that fall prey millions of dollars. IBM reports that the
average cost per incident rose yet again in 2019 to $8.1 million for U.S companies,
more than twice as much as the global average. The healthcare industry remains the
most vulnerable and experiences the highest average losses.
The facts surrounding cyber security can be downright scary, and protecting
your system is critical. Yet, it can be a challenge for small- and medium-size
organizations that don‘t have full-time IT staff to oversee system maintenance.
It‘s hard to know how to protect your network. Fortunately, there are several
network security best practices that business owners can implement today to secure
their data and build more impenetrable protection against hackers and viruses.
Below are practices to protect the your network:

1. Put In and Monitor Firewall Performance


A firewall is a piece or set of software or hardware designed to block
unauthorized access to computers and networks. In straightforward terms, a firewall
is a series of rules that control incoming and outgoing network traffic; computers and
networks that ―follow the rules‖ are allowed into access points and those that don‘t
are prevented from accessing your system.
Firewalls are becoming more and more sophisticated (right along with
hackers), and the latest in integrated network security platforms that consist of a
variety of approaches and encryption methods, all working in tandem to prevent
breaches.

2. Update Passwords At Least Every Quarter


Hopefully, by now, your employees know to avoid default passwords or
phrases like ―password,‖ ―12345,‖ and their dates of birth, in addition to using
318
passwords that feature both letters, symbols, and numbers. Some uppercase letters
were added for security that requires employees to regularly change any personal
passwords used on systems that have access to business networks. Your business
will have its own, but many computers also allow personal passwords.
Let employees know that when choosing passwords, substituting letters with
similarly shaped characters, like ―pa$$w0rd‖ for ―password,‖ is a bad idea. Hackers
are onto that trick!
Every quarter is the recommended frequency, but more often is better.
However, there is a fine line: changing passwords too often can confuse, leading
employees to reach out to IT for reminders of their username and passwords (and
we all know how much IT likes getting calls like that!).

3. Maintain Your Anti-Virus Software


If you‘re not performing regular updates of your anti-virus software, you‘re
putting your network at greater risk and creating potential cybersecurity issues, as
hackers find ways to ―crack‖ these tools and can deploy new viruses. Staying ahead
of them by using the latest versions of software is critical.
It‘s also a good idea to help employees identify the signs to look for to know if
their computer has been hacked. Cybercriminals are increasingly cunning, and an
equally vigilant hacker could compromise even the most vigilant efforts to secure
your network.

4. Create a Virtual Private Network (VPN)


VPNs create a far more secure connection between remote computers (home
networks or computers used by people on the road) and other ―local‖ computers and
servers. These networks are essentially only available to people who should have
access to your systems, including your wireless network, and to equipment that‘s
been authorized in your network settings. A VPN can dramatically decrease the
likelihood that hackers can find a wireless access point and wreak havoc on your
system.

319
5. Be Educated
All the tips and instructions in the book won‘t help if you are not following
those computer safety practices. Reminders about the threats and the phases to
lessen the threats will support keeping the network security as a priority. Some
groups make these types of updates as a required consultation to help communicate
the significance of it. In fighting cybercrime, being knowledgeable on how to avoid
significant safety threats is probably the extreme defense you have.

6. Ask for Help


There is so much pressure to make sure that you are satisfactorily secure
against viruses and hacking. While having all these measures in place and ensuring
that you are following best practices, it is still tough to keep up with the newest
threats.

Let us reflect…
Information security and cyber security is a growing concern not only for
governments but for the whole humanity. With the universal push for the universal
access not only for the ICT world but especially with information security, the
growing concern for system and data protection is very fast expanding. As you have
learned in the last lecture, data is the future and it needs protection. The future will
be data and information and one of the areas of it is its protection. The universal
future of digital world is how to manipulate, control and protect that future. InfoSEc
and cyber security will be a part of a very long journey in the digital universe. In this,
what path you will choose in the area of your specialization? What skills you must
hone in order to cope and ride in the future. It‘s your choice in what area of InfoSec
and cyber security will you choose, it is an ocean of opportunities that are lies ahead
for you.

320
How much have you learned?
POST-TEST FOR LESSON 12

Name: _______________________________ Date: _______________________

Course & Section: _____________________ Result: _____________________

Complete each statement by writing the answer in each blank.

11. A/An __________ is a series of rules that control incoming and outgoing
network traffic.
12. On 2013, __________ had a significant impact globally and helped fuel the
ransomware era.
13. Black Hat group is people who use their capabilities to break into systems that
they are not __________ allowed to use.
14. Cracker is the more accurate word that is used to describe a person with
malicious intent who tries to have __________ access to network resources.
15. On 1949, __________ wrote the ―Theory and Organization of Complicated
Automata.
16. Phishing obtain personal __________ like user‘s credentials, social security
numbers, or financial details.
17. In pretexting __________ create a false sense of trust to get information out
of their victims.
18. Also known as tailgating, __________ is a/an practice of attackers trying to
seek access to a restricted area.
19. Threat is the expressed possible manifestation of a/an __________. This term
is often interchanged and misused with the term attack, and vulnerability.
20. A spammer is an individual who frequently use __________ to control
computers to send out large numbers of unrequested e-mails.

321
Lesson 12 Final Requirements:

Write a research article (not less than 500 words) on the following topics that
will be submitted in a week time.

 Write a research paper regarding the security challenges of our time with
respect to COVID-19 Pandemic Crisis and explain its Implications on
Cybersecurity of the current and future time.

Suggested Readings:
 Books/Journals:
o Cybersecurity for Beginners 2nd Edition by Raef Meeuwisse
o Networking All-in-One For Dummies Paperback, 2018, by Doug Lowe
o Social Engineering: The Science of Human Hacking 2nd Edition, 2019,
by Christopher Hadnagy
o Cybersecurity for Executives: A Practical Guide 1st Edition by Gregory
J. Touhill and C. Joseph Touhill
o Threat Modeling: Designing for Security, 2014, by Adam Shostack
o Journal of Cybersecurity, Oxford University Press,
https://academic.oup.com/cybersecurity
o Computer and Information Security / Cybersecurity,
https://ncu.libguides.com/c.php?g=628732&p=4387732
 Websites:
o ―Introduction to Cyber Security Specialization‖.
https://www.coursera.org/ specializations/intro-cyber-security
o ―Learn the Fundamentals of Cybersecurity‖. https://www.cyberaces.org/
courses.html
o ―Cybersecurity: Managing Risk In The Information Age‖.
https://harvardx-onlinecourses.getsmarter.com/presentations/
lp/harvard-cybersecurity-online-short-course/
o ―InfoSec‖. https://resources.infosecinstitute.com/free-online-cyber-
security-training-courses-hands-on-training-practice-exams/

322
o ―The Hacker News, Site for the Current Learning for Cybersecurity‖
https://thehackernews.com/
o ―All About Cybersecurity and InfoSec‖. https://www.darkreading.com/

REFERENCES
Fruhlinger, Josh (2020). What is information security? Definition, principles, and jobs.
Retrieved August 24, 2020, https://www.csoonline.com/article/3513899/what-is-
information-security-definition-principles-and-jobs.html

Love, John (2018). A Brief History of Malware — Its Evolution and Impact - Retrieved
August 24, 2020, from https://www.lastline.com/blog/history-of-malware-its-
evolution-and-impact/

Kuwahara, Rick (2020). Domain Spoofing: How It Works and What You Can Do to
Avoid It. Retrieved August 24, 2020, from
https://www.paubox.com/blog/domain-spoofing-how-it-works-and-what-you-
can-do-to-avoid-it/

Matthews, Kayla (2018). Denial-of-Service Attacks 101: What Are They? Retrieved
August 25, 2020, from https://www.globalsign.com/en/blog/what-is-denial-of-
service-attack

Dutta, Pallavi (2019). 5 Dangerous Social Engineering Attacks. Retrieved August 25,
2020, https://www.kratikal.com/blog/5-dangerous-social-engineering-attacks/)

DuPaul, Neilh (2013). Hacking the Mind: How & Why Social Engineering Works.
Retrieved August 25, 2020, from
https://www.veracode.com/blog/2013/03/hacking-the-mind-how-why-social-
engineering-works

Eichkorn, David (2019). 6 Proven Ways to Secure a Computer Network Retrieved


August 25, 2020, from https://www.gflesch.com/elevity-it-blog/ways-to-secure-
a-computer-network

323
Lesson 13: Information, Communication and
Computer Ethics
Duration: 3 Hours per week (Week 15)

INTRODUCTION
Ethics in Information Communication Technology is not a legal law, it is a
moral duty that allows us to direct our actions and conduct. All government must
find out what kind of ethical difficulties an IT professional in any organization can
face. The ethics of ICT practitioners are not different from those of general people;
they are far more accountable because they are open to accessing a lot of resources
and knowledge and their unethical actions can have a significant effect on either the
employee or the whole organization.

New fields of communication and the use of technology are continually being
developed. From an ethical as well as an affective viewpoint, the human relationship
to technology and his psychological behaviour then becomes important to consider.
According to various studies, information technology needs to be improved and a
communicative viewpoint should be specifically included. It is important to recognize
ethical issues related to the implementation and use of ICT ( Information and
Communication Technology) as these issues constitute the conditions for human
attitudes and values that characterize human conduct and acts, and imply conditions
for the usefulness and maintenance of such systems.

As student and future practioner of ICT, it is a great foundation to embed


mostly the necessary ethics that will guide them starting from their tertiary learning
days throughout their lifetime. Ethics should be a part of every living thing in this
world because it must be the natural law that will guide him to live. Likewise, ICT
students should make ethics the foremost beacon of their professional life.

324
OBJECTIVES/COMPETENCIES:

 Understand what is Ethics and why Is It Important?


 Understand computer and information ethics
 Analyse the different Internet and network etiquette
 Understand the Association for Computing Machinery (ACM) code of
ethics and professional conduct.
 Analyse the lifetime application of ICT ethics to practitioning IT
porfessionals.

A pre-test of your ICT ethics knowledge…

Name: __________________________________ Date: ____________________


Course & Section: ________________________ Result: __________________

Direction: Direction: Answer the following. Write your answer briefly.

1. What is Network Etiquette, and why is it important?


________________________________________________________________
________________________________________________________________
________________________________________________________________
2. Give three situations that can show proper network etiquette.
A._______________________________________________________________
________________________________________________________________
_______________________________________________________________
B._______________________________________________________________
________________________________________________________________
________________________________________________________________
C._______________________________________________________________
________________________________________________________________
_________________________________________________________

325
Lesson 13.1 - What is Ethics and Why Is It Important?

Ethics or moral philosophy is a branch of philosophy that involves


systematizing, defending, and recommending concepts of right and wrong conduct.
The term ethics derives from the Ancient Greek word ἠθικός ethikos, which is
derived from the word ἦθος ethos (habit, ―custom‖). The branch of philosophy
axiology comprises the sub-branches of ethics and aesthetics, each concerned with
values.
As a branch of philosophy, ethics investigates the questions, ―What is the best
way for people to live?‖ and ―What actions are right or wrong in particular
circumstances?‖ In practice, ethics seeks to resolve questions of human morality by
defining concepts such as good and evil, right and wrong, virtue and vice, justice,
and crime. As a field of intellectual inquiry, moral philosophy also is related to the
fields of moral psychology, descriptive ethics, and value theory.

Three significant areas of study within ethics recognized today are:

Meta-ethics, concerning the theoretical meaning and reference of moral


propositions, and how their truth values (if any) can be determined
Normative ethics, concerning the practical means of determining a moral
course of action
Applied ethics, concerning what a person is obligated or permitted to do in a
specific situation or a particular domain of action.

Lesson 13.2 - Scope of Ethics

1) Man and Fellow Man.


It deals with the ―oughts‖ or ―shoulds‖ of human existence concerning
others. The questions like: ―how should I treat other people? Is helping
other people in need something I ought to do? So it investigates how a
person should live his life with others because he does not live in
absolute freedom. His desires and action, how he treats himself, and
326
others are necessarily regulated by generally accepted principles of
morality that consider the welfare of others.

2) Man and His Society.


Ethics is also a study of man as a member of a moral community. It
investigates how a man should relate to his community and vice versa. It
prescribes how a man should best contribute to the welfare of his
community and how the community should best foster his personal
growth and improvement. ―The question like: does my action benefit the
society in general? Is it right to prioritize the interest of society over the
interest of the individuals? Does society respect my rights and dignity?

3) Man and other Sentient Being.

Ethics also deals with the relationship between human beings and
other sentient creatures (lower forms of animals). The main concern here
is about the proper attitude toward the sentient being that is capable of
feeling the pain. How do we see this sentient being around us? Do we
see them as an object or subject? Do we see them in their instrumental
value or intrinsic value? Is it ethical to use other sentient beings who are
also capable of experiencing pains, for the advancement of human
knowledge?

4) Man and His Natural Environment

It deals with how a man treats his natural environment. It tries to


provide a rational basis for environmental protection in view of the duty to
respect the right of the future members of the community. Is it ethical to
sacrifice the environment for the sake of progress and development? The
basis for our respect to the environment is not purely based on their
instrumental value but their intrinsic values in which we respect the
environment because they have value in themselves despite their use.

327
13.3 - Importance of Ethics

The First reason is that we may get more light for our daily problems. We
often encounter a moral dilemma in our life. We sometimes reach a point that as if
we are at a crossroads, either going to the right or the left, there is no better choice.
Going to the right is wrong and going to the left is also wrong. Within such a
situation, one has to decide because not deciding would mean avoiding
responsibility, and it would be morally wrong. Thus, the concern is, how are we going
to decide in dealing with those problems? On what ground are we going to choose?
Ethics will guide us in those situations. Thus, ethics play an essential role to guide
our decision in our daily problems.
The second reason is that it makes it more evident to us why one act is better
than another. It is only through ethics; we can compare two acts or persons why one
is good and is bad. The third reason is that Morality is the best way of living. The
fourth reason is that morality helps us to see what are the prevalent sins and moral
dangers of our day and thus arouse us to put the weight of our blame and praise
where they are needed.
The purpose of ethics was evident at the beginning. The goal of a theory of
ethics was to determine what is right, both for the individual and for the society as a
whole. For the Greeks, Ethics was to develop virtuous and moral character. They
believe that such character would make one know the right thing to do and live the
right way of life. Later, philosophers have taken different positions in defining what is
right. They learned how to deal with conflicting priorities of individuals versus the
whole over the universality of ethical principles versus ―situation ethics‖ in which
what is right depends upon the circumstances rather than on some general law and
over whether goodness is determined by the results of the action or the means by
results are achieved.

328
Lesson 13.4 - Computer and Information Ethics

Computer Ethics

Just as criminals stealing cars and money from others, they're criminals who
are stealing by electronic means, and they made such behavior as a career for them
to enjoy and to score points that they can brag about it. Such a small group who we
call them black hackers represent a massive problem for modern societies.

Harvey (n.d.) explained that it‘s crucial as a society to differentiate between an


incent behavior of an innocent exercise of intellectual curiosity from a young person
and hardened criminals with deliberate actions to commit computer crimes. A young
person who created a computer device used to place long-distance calls to his
girlfriend, who moved to Australia without paying for it, is not intellectual curiosity; it‘s
a criminal act.

Harvey (n.d.) also argued that putting the computer ethics problems in the
same category as other ethical problems doesn‘t solve them; the right approach to
the ethical issue in the computer world should be established to find the right
solutions for such problems. Two methods can achieve answers to such problems:

1. Technology control
Such an approach can be achieved through tightening the security
implemented within the technology to make it uneasy for hackers to break into the
technology and web sites to gain access to sensitive information, and destroy
businesses, and expose confidential information.

2. Moral training
Teaching young computer enthusiasts to be responsible and be part of the
computer communities without defining them as computer criminals is a vital step
toward the correction of computer ethical problems.
Kuruvill (2005) explained that the policy vacuum is usually facing problems
when dealing with computer ethics. With the impact of computer technology on

329
social behaviors, the creation of rules that can justify the policies for the ethical use
of technology is imperative.
It is also important to point out that computer ethics is a dynamic field of study
where factors such as values, policies, and ever-changing computer technology
have to be considered to establish such ethical rules for computer professionals. In
creating such ethics, a mix of rules of ethics and science has to be combined to
make these rules.

13.4.1 - Ethics of Computer Professional

Association for Computer Machinery (ACM) is the right place for computer
professionals to learn about professional conduct and the code of ethics of computer
professionals. ACM.org (2011) explained that the code of ethics is represented
through the association that reflects a set of guidelines that define various issues
that members of the association may deal with through their careers in the computer
world. The code will serve computer professionals as a basis for ethical decision
making. Some of the guidelines or principles for such code are:

 Contribute to human well-being and society – People have an obligation


toward the protection of human rights and respect the diversity of different
cultures within the community. That principle encourages computer
professionals to minimize the negative consequences of computer systems
where health and safety and threats can be avoided.
 Avoid harm to others – Computer professionals should avoid any cause of
undesirable loss of property or information.
 Be trustworthy and honest – The honest computer professional will avoid
making any deliberate deceptive of false claims about system design or a
system. Computer professionals have a responsibility to be frank about any
circumstances that might lead to a conflict of interest and their qualifications.
 Take action not to discriminate and be fair. Computer professionals should
represent the values of quality and avoid discrimination based on religion,
race, sex, age, national origin, or disability.

330
 Honor property rights, including patent and copyrights – Computer
professionals should honor trade secrets, copyrights, and the terms of license
agreements. Give proper credit for intellectual property – Computer
professionals should keep and protect the integrity of the intellectual property.
 Respect the privacy of others – Computer professionals should avoid any
violation of the individual's or groups' privacy and maintain the integrity and
confidentiality of the data describing individuals.
 Honor confidentiality – Computer professionals have to honor the
confidentiality of the information belongs to individuals. Such a principle is the
extent of the honesty principle where a promise was made to honor the
confidentiality of such information, or such promise was implicitly made when
such private information becomes available.

Lesson 13.5 - Network Etiquette

Netiquette came from the words network and etiquette. It is described as a set
of rules for standard behavior online. Likewise, online ethics is more on the
reasonable practice of internet resources in the virtual community.
Also, netiquette is often combined with the concept of a ―netizen,‖ which came
from the words internet and citizen. It refers to an individual who uses the internet to
contribute to society, and also recognized the accountability of using the internet is
dynamic and publicly responsible ways.

13.5.1 - Dos and Don’ts of Email Etiquette

 Do have a clear subject line.


Most of us have to compete with the hundreds of emails clogging our inbox
every day, so the clearer your subject line, the more likely your message will be
read. For example, if you‘re sending a proposal to someone, be specific and write,
―The Fitch Proposal Is Attached.‖

331
 Don't forget your signature.
Every email should include a signature that tells the recipient who you are and
how to contact you. Set it up to automatically appear at the end of each email.
Include all of your contact details, so the recipient doesn‘t have to look up your
address, email, or phone number.
 Do use a professional salutation.
Using ―Hey,‖ ―Yo,‖ or ―Hiya‖ isn‘t professional, no matter how well you know
the recipient. Use ―Hi‖ or ―Hello‖ instead. To be more formal, use ―Dear (insert
name).‖ Using the person‘s name in the salutation -- ―Hello Robert‖ -- is entirely
appropriate, but remember not to shorten a person's name unless you're permitted to
do so.

 Don't use humor.


Humor does not translate well via email. What you think is funny has a good
chance of being misinterpreted by the other party, or taken as sarcasm, without the
accompanying vocal tone and facial expressions. When in doubt, leave humor out of
business communications.

 Do proofread your message.


Don't be surprised if you're judged by the way you compose an email. For
example, if your email is littered with misspelled words and grammatical errors, you
may be perceived as sloppy, careless, or even uneducated. Check your spelling,
grammar, and message before hitting ―send.‖

 Don't assume the recipient knows what you are talking about.
Create your message as a stand-alone note, even if it is in response to a
chain of emails. This means no ―one-liners.‖ Include the subject and any references
to previous emails, research, or conversations. It can be frustrating and time-
consuming to look back at the chain to brush up on the context. Your recipient may
have hundreds of emails coming in each day, and likely won‘t remember the chain of
events leading up to your email.

332
 Do reply to all emails.
Give a timely and polite reply to each legitimate email addressed to you. Even
if you do not have an answer at the moment, take a second to write a response
letting the sender know you received their email. Inform the sender if their email was
sent to the wrong recipient, too.

 Don't shoot from the lip.


Never send an angry email, or give a quick, flip response. Give your message
some thoughtful consideration before sending it. If you feel angry, put your message
into the ―drafts‖ folder, and review it again later when you are calmer and have time
to formulate an appropriate response.

 Do keep private material confidential.


It is far too easy to share emails, even inadvertently. If you have to share
highly personal or confidential information, do so in person or over the phone. Ask
permission before posting sensitive material either in the body of the email or in an
attachment.

 Don't overuse exclamation points.


Exclamation points and other indications of excitement such as emoticons,
abbreviations like LOL, and all CAPITALS do not translate well in business
communications. Leave them off unless you know the recipient extremely well. It‘s
also not professional to use a string of exclamation points!!!
It may take some practice to keep your emails professional and to the point, but you
will look more polished and organized in the long run.

Lesson 13.6 – ACM (Association of Computing Machine)


Code of Ethics and Professional Conduct

Association for Computing Machinery (ACM) is the world‘s largest educational


and scientific computing society that delivers resources that advance computing as a

333
science and a profession. ACM also provides the computing field's premier Digital
Library and serves its members and the computing profession with leading-edge
publications, conferences, and career resources.

13.6.1. GENERAL MORAL IMPERATIVES


13.6.1.1. Contribute to society and human well-being.
This principle concerning the quality of life of all people affirms an obligation to
protect fundamental human rights and to respect the diversity of all cultures. An
essential aim of computing professionals is to minimize the negative consequences
of computing systems, including threats to health and safety. When designing or
implementing procedures, computing professionals must attempt to ensure that the
products of their efforts will be used in socially responsible ways, will meet social
needs, and will avoid harmful effects to health and welfare.

In addition to a safe social environment, human well-being includes a safe,


natural environment. Therefore, computing professionals who design and develop
systems must be alert to and make others aware of any potential damage to the
local or global environment.

13.61.2 Avoid harm to others.

"Harm" means injury or negative consequences, such as undesirable loss of


information, loss of property, property damage, or unwanted environmental impacts.
This principle prohibits the use of computing technology in ways that result in harm
to any of the following: users, the general public, employees, and employers.
Harmful actions include intentional destruction or modification of files and programs
leading to serious loss of resources or unnecessary expenditure of human resources
such as the time and effort required to purge systems of "computer viruses."

Well-intended actions, including those that accomplish assigned duties, may


lead to harm unexpectedly. In such an event, the responsible person or persons are
obligated to undo or mitigate the negative consequences as much as possible. One

334
way to avoid unintentional harm is to carefully consider potential impacts on all those
affected by decisions made during design and implementation.

To minimize the possibility of indirectly harming others, computing


professionals must minimize malfunctions by following generally accepted standards
for system design and testing. Furthermore, it is often necessary to assess the social
consequences of systems to project the likelihood of any serious harm to others. If
system features are misrepresented to users, coworkers, or supervisors, the
individual computing professional is responsible for any resulting injury.

In the work environment, the computing professional has the additional


obligation to report any signs of system dangers that might result in severe personal
or social damage. If one's superiors do not act to curtail or mitigate such troubles, it
may be necessary to "blow the whistle" to help correct the problem or reduce the
risk. However, inconsistent or misguided reporting of violations can, itself, be
harmful. Before reporting violations, all relevant aspects of the incident must be
thoroughly assessed. In particular, the assessment of risk and responsibility must be
credible. It is suggested that advice be sought from other computing professionals.

13.6.1.3. Be honest and trustworthy.

Honesty is an essential component of trust. Without trust, an organization


cannot function effectively. The honest computing professional will not make
deliberately false or deceptive claims about a system or system design, but will
instead provide full disclosure of all pertinent system limitations and problems.
A computer professional must be honest about his or her qualifications and
about any circumstances that might lead to conflicts of interest.
Membership in volunteer organizations such as ACM may, at times, place individuals
in situations where their statements or actions could be interpreted as carrying the
"weight" of a larger group of professionals. An ACM member will exercise care not to
misrepresent ACM or positions and policies of ACM or any ACM units.

335
13.6.1.4 Be fair and take action not to discriminate.

The values of equality, tolerance, respect for others, and the principles of
equal justice govern this imperative. Discrimination based on race, sex, religion, age,
disability, national origin, or other such factors is an explicit violation of ACM policy
and will not be tolerated.

Inequities between different groups of people may result from the use or
misuse of information and technology. In a fair society, all individuals would have
equal opportunity to participate in, or benefit from, the use of computer resources
regardless of race, sex, religion, age, disability, national origin, or other such similar
factors. However, these ideals do not justify the unauthorized use of computer
resources, nor do they provide an adequate basis for a violation of any other ethical
imperatives of this code.

13.5.1.5 Honor property rights, including copyrights and patents.


Violation of copyrights, patents, trade secrets, and the terms of license
agreements is prohibited by law in most circumstances. Even when the software is
not so protected, such violations are contrary to professional behavior. Copies of
software should be made only with proper authorization. Unauthorized duplication of
materials must not be condoned.

13.6.1.6 Give proper credit for intellectual property.


Computing professionals are obligated to protect the integrity of the
intellectual property. Specifically, one must not take credit for other's ideas or work,
even in cases where the work has not been explicitly protected by copyright, patent,
etc.

13.6.1.7 Respect the privacy of others.


Computing and communication technology enables the collection and
exchange of personal information on a scale unprecedented in the history of
civilization. Thus there is increased potential for violating the privacy of individuals

336
and groups. It is the responsibility of professionals to maintain the confidentiality and
integrity of data describing individuals. This includes taking precautions to ensure the
accuracy of data, as well as protecting it from unauthorized access or accidental
disclosure to inappropriate individuals. Furthermore, procedures must be established
to allow individuals to review their records and correct inaccuracies.
This imperative implies that only the necessary amount of personal
information be collected in a system. Retention and disposal periods for that
information be clearly defined and enforced. That personal information gathered for a
specific purpose not be used for other purposes without the consent of the
individual(s). These principles apply to electronic communications, including
electronic mail, and prohibit procedures that capture or monitor electronic user data,
including messages, without the permission of users or bona fide authorization
related to system operation and maintenance. User data observed during the regular
duties of system operation and maintenance must be treated with the strictest
confidentiality, except in cases where it is evidence for the violation of the law,
organizational regulations, or this Code. In these cases, the nature or contents of
that information must be disclosed only to proper authorities.

13.6.1.8 Honor confidentiality.


The principle of honesty extends to issues of confidentiality of information
whenever one has made an explicit promise to honor confidentiality or, implicitly,
when private information not directly related to the performance of one's duties
becomes available. The ethical concern is to respect all obligations of confidentiality
to employers, clients, and users unless discharged from such obligations by
requirements of the law or other principles of this Code.

13.6.2 - More Specific Professional Responsibilities

13.6.2.1 Strive to achieve the highest quality, effectiveness, and dignity in both
the process and products of professional work.

337
Excellence is perhaps the most important obligation of a professional. The
computing professional must strive to achieve quality and to be mindful of the
serious negative consequences that may result from low quality in a system.

13.6.2.2 Acquire and maintain professional competence.


Excellence depends on individuals who take responsibility for acquiring and
maintaining professional competence. A professional must participate in setting
standards for appropriate levels of competence and strive to achieve those
standards. Upgrading technical knowledge and competence can be achieved in
several ways: doing independent study; attending seminars, conferences, or
courses; and being involved in professional organizations.

13.5.2.3 Know and respect existing laws pertaining to professional work.

ACM members must obey existing local, state, province, national, and
international laws unless there is a compelling ethical basis not to do so. Policies and
procedures of the organizations in which one participates must also be obeyed. But
compliance must be balanced with the recognition that sometimes existing laws and
rules may be immoral or inappropriate and, therefore, must be challenged. Violation
of a law or regulation may be ethical when that law or rule has an inadequate moral
basis or when it conflicts with another law judged to be more important. If one
decides to violate a law or rule because it is viewed as unethical, or for any other
reason, one must fully accept responsibility for one's actions and the consequences.

13.6.2.4 Accept and provide an appropriate professional review.

Quality professional work, especially in the computing profession, depends on


professional reviewing and critiquing. Whenever appropriate, individual members
should seek and utilize peer review as well as provide critical thinking of the work of
others.

13.6.2.5 Give comprehensive and thorough evaluations of computer systems


and their impacts, including analysis of possible risks.

338
Computer professionals must strive to be perceptive, thorough, and objective
when evaluating, recommending, and presenting system descriptions and
alternatives. Computer professionals are in a position of special trust, and therefore
have a special responsibility to provide objective, credible evaluations to employers,
clients, users, and the public. When providing evaluations, the professional must
also identify any relevant conflicts of interest, as stated in imperative 13.4.1.3.

As noted in the discussion of principle 13.4.1.2 on avoiding harm, any signs of


danger from systems must be reported to those who have the opportunity and/or
responsibility to resolve them. See the guidelines for imperative 13.4.1.2 for more
details concerning harm, including the reporting of professional violations.

13.6.2.6 Honor contracts, agreements, and assigned responsibilities.

Honoring one's commitments is a matter of integrity and honesty. For the


computer professional, this includes ensuring that system elements perform as
intended. Also, when one contracts for work with another party, one has an
obligation to keep that party properly informed about progress toward completing
that work.

A computing professional has a responsibility to request a change in any


assignment that he or she feels cannot be completed as defined. Only after serious
consideration and with full disclosure of risks and concerns to the employer or client
should one accept the assignment. The primary underlying principle here is the
obligation to accept personal accountability for professional work. On some
occasions, other ethical principles may take greater priority.
A judgment that a specific assignment should not be performed may not be
accepted. Having clearly identified one's concerns and reasons for that judgment,
but failing to procure a change in that assignment, one may yet be obligated, by
contract or by law, to proceed as directed. The computing professional's ethical
judgment should be the final guide in deciding whether or not to proceed. Regardless
of the decision, one must accept responsibility for the consequences.

339
However, performing assignments "against one's judgment" does not relieve
the professional of responsibility for any negative consequences.

13.6.2.7 Improve public understanding of computing and its consequences.


Computing professionals have a responsibility to share technical knowledge
with the public by encouraging understanding of computing, including the impacts of
computer systems and their limitations. This imperative implies an obligation to
counter any false views related to computing.

13.6.2.8 Access computing and communication resources only when


authorized to do so.
Theft or destruction of tangible and electronic property is prohibited by
imperative 13.4.1.2 - "Avoid harm to others." This binding addresses trespassing and
unauthorized use of a computer or communication system. Trespassing includes
accessing communication networks and computer systems, or accounts and/or files
associated with those systems, without explicit authorization to do so. Individuals
and organizations have the right to restrict access to their systems so long as they
do not violate the discrimination principle (see 1.4). No one should enter or use
another's computer system, software, or data files without permission. One must
always have appropriate approval before using system resources, including
communication ports, file space, other system peripherals, and computer time.

13.6.2.9 Design and implement systems that are robustly and usably secure.
Breaches of computer security cause harm. Robust security should be a
primary consideration when designing and implementing systems. Computing
professionals should perform due diligence to ensure the system functions as
intended, and take appropriate action to secure resources against accidental and
intentional misuse, modification, and denial of service. As threats can arise and
change after a system is deployed, computing professionals should integrate
mitigation techniques and policies, such as monitoring, patching, and vulnerability
reporting. Computing professionals should also take steps to ensure parties affected

340
by data breaches are notified in a timely and clear manner, providing appropriate
guidance and remediation.
To ensure the system achieves its intended purpose, security features should
be designed to be as intuitive and easy to use as possible. Computing professionals
should discourage security precautions that are too confusing, are situationally
inappropriate, or otherwise inhibit legitimate use.
In cases where misuse or harm are predictable or unavoidable, the best
option may be to not implement the system.

13.7 – ORGANIZATIONAL LEADERSHIP IMPERATIVES

13.7.1 Articulate the social responsibilities of members of an organizational


unit and encourage full acceptance of those responsibilities.
Because organizations of all kinds have impacts on the public, they must
accept responsibilities to society. Organizational procedures and attitudes oriented
toward quality and the welfare of society will reduce harm to members of the people,
thereby serving the public interest and fulfilling social responsibility. Therefore,
organizational leaders must encourage full participation in meeting social obligations
as well as quality performance.

13.7.2 Manage personnel and resources to design and build information


systems that enhance the quality of working life.
Organizational leaders are responsible for ensuring that computer systems
enhance, not degrade, the quality of working life. When implementing a computer
system, organizations must consider the personal and professional development,
physical safety, and human dignity of all workers. Appropriate human-computer
ergonomic standards should be considered in system design and the workplace.

13.7.3 Acknowledge and support proper and authorized uses of an


organization's computing and communication resources.

341
Because computer systems can become tools to harm as well as to benefit an
organization, leadership has the responsibility to define appropriate and
inappropriate uses of organizational computing resources clearly. While the number
and scope of such rules should be minimal, they should be fully enforced when
established.

13.7.4 Ensure that users and those who will be affected by a system have their
needs clearly articulated during the assessment and design of requirements;
later, the method must be validated to meet requirements.
Current system users, potential users, and other persons whose lives may be
affected by a system must have their needs assessed and incorporated in the
statement of requirements. System validation should ensure compliance with those
requirements.

13.7.5 Articulate and support policies that protect the dignity of users and
others affected by a computing system.
Designing or implementing systems that deliberately or inadvertently demean
individuals or groups is ethically unacceptable. Computer professionals who are in
decision making positions should verify that systems are designed and implemented
to protect personal privacy and enhance personal dignity.

13.7.6 Create opportunities for members of the organization to learn the


principles and limitations of computer systems.
This complements the imperative of public understanding (13.5.2.7).
Educational opportunities are essential to facilitate the optimal participation of all
organizational members. Opportunities must be available to all members to help
them improve their knowledge and skills in computing, including courses that
familiarize them with the consequences and limitations of particular types of
systems. In particular, professionals must be made aware of the dangers of building
systems around oversimplified models, the improbability of anticipating and
designing for every possible operating condition, and other issues related to the
complexity of this profession.
342
13.7.7 Use care when modifying or retiring systems.
Interface changes, the removal of features, and even software updates have
an impact on the productivity of users and the quality of their work. Leaders should
take care when changing or discontinuing support for system features on which
people still depend. Leaders should thoroughly investigate viable alternatives to
removing support for a legacy system. If these alternatives are unacceptably risky or
impractical, the developer should assist stakeholders' graceful migration from the
system to an alternative. Users should be notified of the risks of continued use of the
unsupported system long before support ends. Computing professionals should
assist system users in monitoring the operational viability of their computing
systems, and help them understand that timely replacement of inappropriate or
outdated features or entire systems may be needed. (Credit to the source:
https://www.acm.org/about/code-of-ethics)

Let us reflect…
With a holistic reading and study of the concepts above by the learner, ICT
students who will be programming professionals in the future, should approach the
problem and analyze their computing situation with thorough consideration of
everyone‘s security. It is of parmount importance in all situations, as the learner‘s
concern, the computing novies as well professional should put in their heart public
good and security first everytime they will operate smart gadgets and computers.
May the lessons above will give you a moral foundation in using any gift of talent in
the digital world. In this, you may write a reflection paper of how you will see yourself
as a disciplined and morally upright ICT practitioner. Who do you like to be in a moral
sense after you have finished your undergraduate studies. Document it again and
compile it for your future‘s reading and make an everyday reminder and light of your
dream.

343
How much have you learned?
POST-TEST FOR LESSON 13

Name: _______________________________ Date: _______________________

Course & Section: _____________________ Result: _____________________

Direction: Answer the following. Write your answer briefly.

1. Give 3 General Moral Imperatives of the ACM Code of Ethics and


Professional Conducts and discuss each briefly.
A. ___________________________________________________________
___________________________________________________________
___________________________________________________________
___________________________________________________________
B. ___________________________________________________________
___________________________________________________________
___________________________________________________________
___________________________________________________________
C. ___________________________________________________________
___________________________________________________________
___________________________________________________________
___________________________________________________________

2. Choose three from the dos and don’ts of email etiquette and cite 1
example/scenario each.
A. __________________________________________________________
__________________________________________________________
__________________________________________________________
__________________________________________________________

344
B. __________________________________________________________
__________________________________________________________
__________________________________________________________
__________________________________________________________
C. __________________________________________________________
__________________________________________________________
__________________________________________________________
__________________________________________________________

Lesson 13 Final Requirements:

 Cite articles of a global hacking incident of the topics below and write a summary
criticism of the ethical conduct violated from the above lessons. (Minimum of 500
words per incident)
o A top-secret medical virology files that will be used as a bioweapon by an
advance country.
o An invention that should be a great help to humanity.

Suggested Readings:

 Books/Journals:
o Computer Ethics In The Undergraduate Curriculum: Case Studies And
The Joint Software Engineer's Code. Retrieved from
http://web.cs.wpi.edu/~jb/CS3043/Readings/06%20-%20Ethics/Ethics
CaseStudies.pdf
o Ethics in Information Technology 5th Edition, 2020, by George W.
Reynolds
o Gift of Fire, A: Social, Legal, and Ethical Issues for Computing
Technology 5th Edition, 2019, by Sara Baase and Timothy Henry

345
o Tavani, H.T. ICT ethics bibliography 2012–2014: A select list of recent
books. Ethics Information Technology, pp. 243–247 (2015).
https://doi.org/10.1007/s10676-013-9327-0
o Cyberethics: Morality and Law in Cyberspace 7th Edition by Richard A.
Spinello
 Websites:
o ―ACM Code of Ethics and Professional Conduct‖.
https://www.acm.org/code-of-ethics/case-studies
o ―IT Ethics at Workstation ―. https://www.tutorialspoint.com/it-ethics-at-
workstation
o ―Ethics for Technology Use in the Classroom‖. https://study.com/blog/
ethical-issues-with-using-technology-in-the-classroom.html
o ―Promoting Responsible and Ethical Digital Citizens‖.
https://www.education world.com/a_tech/responsible-student-
technology-use.shtml
o ―Ethical & Security Issues in Information System‖. https://www.guru99.
com/mis-ethical-social-issue.html
o ―Ethical Issues in Information Technology‖.
https://www.geeksforgeeks.org/ethical-issues-in-information-
technology-it/

346
REFERENCES
Association for Computing Machinery. Retrieved on August 29, 2020, from
https://www.acm.org/binaries/content/assets/about/acm-code-of-ethics-
booklet.pdf

Gotterbarn, Miller, D. K. and S. Rogerson. Software Engineering Code of Ethics


and Professional Practice. (n.d). Retrieved May 28, 2004, from
http://csciwww.etsu.edu/gotterbarn/SECEPP .

Dameano (2013). The Role of Ethics in Our Daily Life. Retrieved on August 28,
2020, from http://dameanusabun.blogspot.com/2013/12/ethics-and-daily-
life.html

Laura, Annabelle (2017). Ethics Defined. Retrieved on August 28, 2020, from
https://medium.com/the-ethical-world/ethics-defined-33a1a6cc3064

Soliman, Bryan (2011). Computer Ethics and Ethical Decision. Retrieved on August
28, 2020, from https://bryansoliman.wordpress.com/2011/10/02/computer-
ethics-and-ethical-decision/

Whitmore, Jacqueline (2016). The Dos and Don'ts of Email Etiquette. Retrieved
August 28, 2020, from https://www.entrepreneur.com/article/272780

347
Lesson 14: Future Trends in Information and
Communication Technology
Duration: 3 Hours per week (Week 16)

Introduction

Information technology is a growing industry, and the nature of companies,


job development , and new technologies will all change in the coming years. In fields
like medicine, entertainment, business , education, marketing, law enforcement, and
more, current trends are enhancing and presenting new functions everyday. Yet,
only now is other much-anticipated technology is coming on the scene.
IT advances change internal most of business procedures, but they also
change the way consumers encounter buying and service, not to mention
fundamental life habits, such as locking up your house, visiting the doctor, and
storing information. The future of information technology developments are main
areas to track in 2021 and feasible factors that may impact your future career
choices.
In 2020, the new management approaches and best practices will largely
derive from emerging information technology trends. IT systems advancements
contribute to what the market is either leaning towards or disregarding. Information
technology is advancing so rapidly that existing forecasts are easily replaced by new
technologies.
As in the education sector, new technologies and other trends in innovation
will surely dominate every pedagogical arena of academic institutions. Are we ready
for the great technology leap of the future?

348
OBJECTIVES/COMPETENCIES:

 Understand Artificial Intelligence and the future effects of it to humanity.


 Explain why Artificial Intelligence is the future
 Describe the different application of Artificial Intelligence
 Analyze the pros and cons of AI
 Describe the aspects of pervasive computing in the area of personal
computing
 Understand the advancement of the next generation of Networking and
cloud computing.
 Describe the future trends in technological innovation and the new
technological leap.

A pre-test of your knowledge in the future of ICT…

Name: _______________________________ Date: _______________________


Course & Section: _____________________ Result: _____________________
Direction: Answer the following. Write your answer briefly.

3. Give at least three applications of Artificial Intelligence in our current life and
briefly describe your answer.

D. ____________________________________________________________
____________________________________________________________
______________________________________________________
E. ____________________________________________________________
____________________________________________________________
______________________________________________________

349
F. ____________________________________________________________
____________________________________________________________
______________________________________________________

4. Can you give at least three real-life applications of cloud computing in the
various industries of our current times?

D. ____________________________________________________________
____________________________________________________________
______________________________________________________
E. ____________________________________________________________
____________________________________________________________
______________________________________________________
F. ____________________________________________________________
____________________________________________________________
______________________________________________________

350
Lesson 14.1 – Artificial Intelligence
Artificial intelligence (AI) is an area of computer science that emphasizes the
creation of intelligent machines that work and react like humans. Some of the
activities computers with artificial intelligence are designed for include:
● Speech recognition
● Learning
● Planning
● Problem-solving

Artificial intelligence is a branch of computer science that aims to create


intelligent machines. It has become an essential part of the technology industry.
Research associated with artificial intelligence is highly technical and
specialized. The core problems of artificial intelligence include programming
computers for specific traits such as:
● Knowledge
● Reasoning
● Problem-solving
● Perception
● Learning
● Planning
● Ability to manipulate and move objects

Knowledge engineering is a core part of AI research. Machines can often act


and react like humans only if they have much information relating to the world.
Artificial intelligence must have access to objects, categories, properties, and
relations between all of them to implement knowledge engineering. Initiating
common sense, reasoning, and problem-solving power in machines is a tedious and
challenging approach.
Machine learning is another core part of AI. Learning without any supervision
requires an ability to identify patterns in streams of inputs, whereas learning with
adequate control involves classification and numerical regressions.

351
Classification determines the category an object belongs to, and regression
deals with obtaining a set of numerical input or output examples, thereby discovering
functions enabling the generation of suitable outputs from respective inputs.
Mathematical analysis of machine learning algorithms and their performance is a
well-defined branch of theoretical computer science, often referred to as
computational learning theory.
Machine perception deals with the capability to use sensory inputs to deduce the
different aspects of the world. At the same time, computer vision is the power to
analyze visual inputs with few sub-problems such as facial, object, and speech
recognition.
Robotics is also a major field related to AI. Robots require intelligence to handle
tasks such as object manipulation and navigation, along with sub-problems of
localization, motion planning, and mapping.

Lesson 14.2 - Applications of AI

14.2.1 - Applications and Uses of Artificial Intelligence

14.2.1.1 - Artificial Neural Systems (ANS)


A neural network is an electronic model of the brain consisting of many
interconnected simple processors. ANS imitates how your actual mind works.
Applications of artificial neural systems
● Learning to read postcodes
● Stock market prediction
● Debt risk assessment

Advantages of artificial neural systems


● These do not need to be programmed to be able to learn.

Disadvantages of artificial neural systems


● Set up – time and money as this requires plenty of expert advice.

352
14.2.1.2 - Vision systems
The need to interpret, fully understand, and make sense of visual input on the
computer, i.e., Artificial Intelligence is used to try and analyze and understand an
image - industrial, military use, satellite photo interpretation.
Spy plane takes a photograph, and experts would then analyze it to try and
figure it out - see if it was an enemy area.
Police using the computer to come up with a photofit drawing of a criminal.
Doctors using the system to make a diagnosis of the patient.

14.2.1.3 - Speech recognition


Speech recognition is the ability of the computer to understand a human
talking to it. There are many problems associated with this – humans have different
accents, slang words, noise in the background, feeling poorly (flu, cold, etc.). This
means that the computer has to be trained to recognize the voice of the human. This
means that the human has to ensure that by talking to the computer system before,
i.e., train it, the system will be able to recognize their words, sentences, etc.
Honda C.R.V. has the following range of voice commands that the driver can
use while driving. By using the mobile phone, it can turn the temperature up or down
and turn the air conditioner on or off. The mobile device can also ask the car to
navigate using the satellite navigation system and turn the radio on or off. Disabled
people can use them to write a memo or use the Internet on their computers. The
latest phones have a built-in program that allows the human to make calls or find out
the weather conditions.

14.2.1.4 – Handwriting Recognition


This technology can turn human handwriting into text that can then be edited
when input into a palmtop computer or a tablet. A stylus is used to write on the
computer screen, and then handwriting recognition software will then change it into
the text, e.g., a teacher using a smartboard can turn their writing into a book in the
same manner.

353
Image recognition allows you to scan in a page containing text, and the OCR
software will convert this into editable text. It does this by recognizing the shapes of
the letters and converting them into ASCII text.
There is a great need to train the computer system to recognize different
human handwriting since humans all write individual letters in different ways.

14.2.1.5 - Intelligent Robots


A robot can carry out many tasks, such as the production of cars in a factory.
Robots can weld, insert windscreens, paint, etc. The robot follows a control program
to carry out the task given to it by a human. All these robots have sensors. These
robots are NOT intelligent; they do the same thing over and over again, as instructed
by the control program. A sensor is a device that can detect biological data from its
surroundings. Then this data is input into a computer system—examples of sensors:
light, heat, movement, bump, pressure, temperature, sound.
An intelligent robot has many different sensors, large processors, and large
memory to show that they have intelligence. The robots will learn from their mistakes
and be able to adapt to any new situation that may arise.
An intelligent robot can be programmed with its expert system, e.g., a factory
floor is blocked with fallen boxes. A smart robot will remember this and take a
different route.
These intelligent robots carry out many different tasks, such as automated
delivery in a factory, pipe inspection, bomb disposal, exploration of
dangerous/unknown environments.

Advantages
● Work 24/7, 365 days/year, unlike human workers; do not need holidays
● Cheaper – do not need to be paid - company make more money in the long
run
● More accurate
● Safer than sending a human into dangerous places, e.g., nuclear power
stations

354
Lesson 14.3 - Pervasive Computing (Ubiquitous
Computing)

Pervasive computing (also called ubiquitous computing) is the growing trend


towards embedding processors in everyday objects so they can communicate
information.
Pervasive computing is the growing trend towards embedding
microprocessors in everyday objects so they can communicate information. The
words pervasive and ubiquitous mean "existing everywhere." Pervasive computing
devices are completely connected and continuously available.

14.3.1 - Personal Area Network (PAN)


A personal area network (PAN) is the interconnection of information
technology devices within the range of a person, typically within a range of 10
meters. For example, a person traveling with a laptop, a personal digital assistant
(P.D.A.), and a portable printer could interconnect them without having to plug
anything in, using some form of wireless technology. Typically, this kind of personal
area network could also be interconnected without wires to the Internet or other
systems.
In another usage, a personal area network (PAN) is a technology that could
enable wearable computer devices to communicate with other nearby computers
and digital exchange information using the electrical conductivity of the human body
as a data network. For example, two people, each wearing business card-size
transmitters and receivers, conceivably could exchange information by shaking
hands. The transference of data through intra-body contacts, such as handshakes, is
known as linkup. The human body's natural salinity makes it a good conductor of
electricity. An electric field passes tiny currents, known as Pico amps, through the
body when the two people shake hands. The handshake completes an electric
circuit, and each person's data, such as e-mail addresses and phone numbers, are
transferred to the other person's laptop computer or a similar device. A person's
clothing also could act as a mechanism for sharing this data.
355
The concept of a PAN first was developed by Thomas Zimmerman and other
researchers at MIT's Media Lab and later supported by IBM's Almaden research lab.
In a research paper, Zimmerman explains why the concept might be useful:
As electronic devices become smaller, lower in power requirements, and less
expensive, we have begun to adorn our bodies with personal information and
communication appliances. Such devices include cellular phones, personal digital
assistants (P.D.A.s), pocket video games, and pagers. Currently, there is no method
for these devices to share data. Networking these devices can reduce functional I/O
redundancies and allow new conveniences and services.

14.3.2 - Wireless Sensor Networks (WSN)


A wireless sensor network is a group of specialized transducers with a
communications infrastructure for monitoring and recording conditions at diverse
locations. Commonly monitored parameters are temperature, humidity, pressure,
wind direction and speed, illumination intensity, vibration intensity, sound intensity,
power-line voltage, chemical concentrations, pollutant levels, and vital body
functions.
A sensor network consists of multiple detection stations called sensor nodes,
each of which is small, lightweight, and portable. Every sensor node is equipped with
a transducer, microcomputer, transceiver, and power source. The transducer
generates electrical signals based on sensed physical effects and phenomena. The
microcomputer processes and stores the sensor output. The transceiver receives
commands from a central computer and transmits data to that computer. The power
for each sensor node is derived from a battery.
Potential applications of sensor networks include:
● Industrial automation
● Automated and smart homes
● Video surveillance
● Traffic monitoring
● Medical device monitoring
● Monitoring of weather conditions
● Air traffic control
356
● Robot control.
14.3.3 - RFIDs
RFID (radio frequency identification) is a technology that incorporates the use
of electromagnetic or electrostatic coupling in the radio frequency (RF) portion of the
electromagnetic spectrum to identify an object, animal, or person uniquely. RFID is
coming into increasing use in industry as an alternative to the bar code. The
advantage of RFID is that it does not require direct contact or line-of-sight scanning.
An RFID system consists of three components: an antenna and transceiver (often
combined into one reader) and a transponder (the tag). The antenna uses
radiofrequency waves to transmit a signal that activates the transponder. When
activated, the title sends data back to the antenna. The data is used to notify a
programmable logic controller that an action should occur. The act could be as
simple as raising an access gate or as complicated as interfacing with a database to
carry out a monetary transaction. Low-frequency RFID systems (30 kHz to 500 kHz)
have short transmission ranges (generally less than six feet). High-frequency RFID
systems (850 MHz to 950 MHz and 2.4 GHz to 2.5 GHz) offer longer transmission
ranges (more than 90 feet). In general, the higher the frequency, the more expensive
the system. RFID is sometimes called dedicated short-range communication
(DSRC).

14.3.3.1 - Tag Antennas


Tag antennas collect energy and channel it to the chip to turn it on. Generally,
the larger the tag antenna's area, the more power it will be able to collect and
channel toward the tag chip, and the other read range the tag will have.
There is no perfect antenna for all applications. It is the application that
defines the antenna specifications. Some tags might be optimized for a particular
frequency band. In contrast, others might be tuned for good performance when
357
attached to materials that may not typically work well for wireless communication
(certain liquids and metals, for example). Antennas can be made from a variety of
materials; they can be printed, etched, or stamped with conductive ink, or even
vapor-deposited onto labels.
Tags that have only a single antenna are not as reliable as tags with multiple
antennas. With a single antenna, a tag's orientation can result in "dead zones," or
areas on the label where incoming signals cannot be easily harvested to provide
sufficient energy to power on the chip and communicate with the reader. A tag with
dual antennas can eliminate these dead zones and increase its readability but
requires a specialized chip.

14.3.3.2 - RFID Readers


An RFID reader, also known as an interrogator, is a device that provides the
connection between the tag data and the enterprise system software. It provides
signals that carry information. The reader communicates with tags that are within its
field of operation, performing any number of tasks, including simple continuous
inventorying, filtering (searching for titles that meet specific criteria), writing (or
encoding) to selected tags, etc.
The reader uses an attached antenna to capture data from tags. It then
passes the data to a computer for processing. Just like RFID tags, there are many
different sizes and types of RFID readers. Readers can be affixed in a stationary
position in a store or factory, or integrated into a mobile device such as a portable,
handheld scanner. Readers can also be embedded in electronic equipment or tools
and vehicles.

358
14.3.3.3 - What Are RFID Standards?
RFID standards are guidelines or specifications for all RFID products.
Standards provide guidelines about how RFID systems work, what frequencies they
operate at, how data is transferred, and how communication works between the
reader and the tag.

14.3.3.4 - Why Are RFID Standards Important?


RFID standards help ensure that RFID products are interoperable, regardless
of the vendor or user. They also provide guidelines by which companies can develop
complementary products, such as different types of tags, readers, software, and
accessories. Additionally, standards help broaden markets and increase competition
within the industry, which brings the prices of standardized RFID products down.
RFID standards also help increase widespread confidence in the technology.

14.3.3.5 - Who Sets RFID Standards?


Standards are developed and issued by industry-specific, national, regional,
and global bodies. The more global the bar is, the more bodies are involved in its
development. International organizations that issue RFID-related standards include
EPCglobal (a GS1 venture), the International Electrotechnical Commission (IEC), the
International Standards Organization (ISO), and the Joint Technical Committee (JTC
1), a committee formed by ISO and IEC. Regional regulatory entities that govern the
use of RFID include the Federal Communication Commission (FCC), which is in
charge of the United States, the European Telecommunications Standards Institute
(ETSI), which operates in Europe. Other regions have their regulatory entities.
Organizations that oversee RFID standards for specific industries include the
Association of American Railroads (AAR), the Automotive Industry Standards Group
(AIAG), the American Trucking Associations (ATA), and the International Air
Transport Association (IATA). Additionally, the GS1 VICS Item Level RFID Initiative
(VILRI) oversees standards around item-level tagging and the use of RFID
technology throughout the retail supply chain.

359
14.3.3.6 Future RFID Chip Microprocessor Design

Several computer giants are revising their microprocessor development


roadmaps in favor of a new microprocessor architecture called Chip Multi-Threading
(CMT). One of the pioneers in this area is Sun Microsystems which has already
introduced the first design of this new architecture. This is just in time for the
expected volume spike from RFID data as the US Department of Defense (DoD) and
major retailers around the world go into full deployment mode with their RFID
mandates. Simply put, CMT architecture bucks the trend of traditional
microprocessor design and architecture that primarily seeks to perform single tasks
faster and faster. Instead, CMT is an architecture that allows the efficient execution
of many tasks simultaneously. This is parallel computing taken all the way to the
core of the microprocessor.

Lesson 14.4 - Next-Generation Networks (NGN)

Next-Generation Networks (NGN) is a packet-based network that can provide


telecommunication services to users. It can make use of multiple broadbands like
QoS-enabled transport technologies. NGN can also do service-related functions that
are independent of the underlying transport-related technologies. It enables
unfettered access for users to networks and to competing service providers and
services of their choice. It supports generalized mobility, which will allow the
consistent and ubiquitous provision of services to users.
Next-Generation Networking (NGN) is a broad term to describe some key
architectural evolutions in telecommunication core and access networks that will be
deployed over the next 5-10 years. The general idea behind NGN is that one system
transports all information and services (voice, data, and all sorts of media such as
video) by encapsulating these into packets like it is on the Internet. NGNs are
commonly built around the Internet Protocol, and therefore the term "all-IP" is also
sometimes used to describe the transformation towards NGN.
The following fundamental aspects characterize the NGN:

360
● Packet-based transfer
● Separation of control functions among bearer capabilities, call/session,
and application/service
● Decoupling of service provision from transport, and provision of open
interfaces
● Support for a wide range of services, applications, and mechanisms
based on service building blocks (including real-time/streaming/non-real-
time services and multimedia)
● Broadband capabilities with end-to-end QoS and transparency
● Interworking with legacy networks via open interfaces
● Generalized mobility
● Unfettered access by users to different service providers
● A variety of identification schemes which can be resolved to IP
addresses to route in IP networks
● Unified service characteristics for the same service as perceived by the
user
● Converged services between Fixed and Mobile networks
● Independence of service-related functions from underlying transport
technologies
● Support for multiple last-mile technologies
● Compliant with all Regulatory requirements, for example, concerning
emergency communications and security/privacy, etc.

IP Convergence implies the carriage of different types of traffic such as voice,


video, data, and images over a single network. The integrated system is based on
the Internet Protocol (IP).

14.4.1 - The benefits of IP Convergence


1. Excellent support for multimedia applications. Improved connectivity means
that devices can be assigned specific tasks; the number of tools required is
less, which makes installation, deployment, and learning an easier task.

361
2. A converged IP network is a single platform on which interoperable devices
can execute in innovative ways. Since IP is an open standard, it is vendor-
independent, and this helps in fostering interoperability and improving network
efficiency in terms of time and cost. The ambit of IP convergence
encompasses networks, devices, and different technologies and systems that
can be operated on a unified infrastructure.
3. A converged IP network is easier to manage because of the uniform setup in
which the system resources operate. Training users are comfortable.
4. An enterprise can achieve flexibility in terms of molding its communication
patterns to its management practices. This is a dynamic process that can
continually improve the collaboration from network partners. What this results
in is the right information to the right person at the right time leading to
improved decision making.
5. IP networks have proven to be remarkably scalable. It has been one of the
prime reasons that even large enterprises have gone ahead with
implementing IP Applications that run on IP networks are available all over the
world; most new business applications include inbuilt IP support.
6. An IP convergent network is capable of making use of the developments in a
class of service differentiation and QoS-based routing. The process leads to
better utilization of resources and also allows for capacity redundancy to take
care of an increase in the number of users.
7. A uniform environment requires fewer components in the network. Smoother
maintenance and management result from this and, in turn, lead to improved
processes. Affordable deployment results from the elimination of multiple
systems operating in parallel, and manageability improves. In a converged
environment, fewer platforms need to test, and gateways between networks
are eliminated.
8. Business applications have different tolerance levels for transit delays,
dropped packets, and error rates. IP architecture is capable of handling these
so that the QoS reflects the requirements of the different applications.

362
9. Device integration has the potential to simplify end-to-end security
management and, at the same time, make it more robust. Continuous
development is taking place in the field of security for IP data communication.
10. A converged IP network offers a business tremendous cost savings in terms
of hardware and space utilization. It opens up more markets that can be
reached, more products that can be introduced increases employee
productivity and mobility, and enables even smaller companies to compete
with larger ones because of faster information relay.

Lesson 14.5 - Cloud Computing

Cloud computing is a general term for anything that involves delivering hosted
services over the Internet. These services are broadly divided into three categories:
 Infrastructure-as-a-Service (IaaS),
 Platform-as-a-Service (PaaS)
 Software-as-a-Service (SaaS).

The name cloud was inspired by the symbol that's often used to represent the
Internet in flowcharts and diagrams.
Cloud computing enables companies to compute resources as a utility -- just
like electricity -- rather than having to build and maintain computing infrastructures
in-house.
Cloud computing promises several attractive benefits for businesses and end-
users. Three of the main advantages of cloud computing include:
 Self-service provisioning: End users can spin up computing resources for
almost any type of workload on-demand.
 Elasticity: Companies can scale up as computing needs increase and then
scale down again as demands decrease.
 Pay per use: Computing resources are measured at a granular level, allowing
users to pay only for the help and workloads they use.

363
14.5.1 - Cloud Computing Services Can Be Private, Public, Or Hybrid.
Private cloud services are delivered from a business's data center to internal
users. This model offers versatility and convenience while preserving management,
control, and security. Internal customers may or may not be billed for services
through IT chargeback.
In the public cloud model, a third-party provider delivers the cloud service over
the Internet. Public cloud services are sold on-demand, typically by the minute or the
hour. Customers only pay for the CPU cycles, storage, or bandwidth they consume.
Leading public cloud providers include Amazon Web Services (AWS), Microsoft
Azure, I.B.M./SoftLayer, and Google Compute Engine.
Hybrid cloud is a combination of public cloud services and on-premises
private cloud – with orchestration and automation between the two. Companies can
run mission-critical workloads or sensitive applications on the private cloud while
using the public cloud for bursty workloads that must scale on-demand. The goal of a
hybrid cloud is to create a unified, automated, scalable environment that takes
advantage of all that a public cloud infrastructure can provide, while still maintaining
control over mission-critical data.
Although cloud computing has changed over time, it has always been divided
into three broad service categories: infrastructure as a service (IaaS), platform as a
service (PaaS), and software as service (SaaS).
IaaS providers such as AWS supply a virtual server instance and storage, as
well as application program interfaces (APIs) that let users migrate workloads to a
virtual machine (VM). Users have allocated storage capacity and start, stop, access,
and configure the VM and storage as desired. IaaS providers offer small, medium,
large, extra-large, and memory- or compute-optimized instances, in addition to
customized instances, for various workload needs.
In the PaaS model, providers host development tools on their infrastructures.
Users access those tools over the Internet using APIs, Web portals, or gateway
software. PaaS is used for general software development, and many PaaS providers
will host the software after it's developed. Common PaaS providers include
Salesforce.com's Force.com, Amazon Elastic Beanstalk, and Google App Engine.

364
SaaS is a distribution model that delivers software applications over the
Internet; these are often called Web services. Microsoft Office 365 is a SaaS offering
for productivity software and e-mail services. Users can access SaaS applications
and services from any location using a computer or mobile device that has Internet
access.

14.5.2 – The Future of Cloud Computing


According to the various technology experts, 90 percent of business
workloads will be in the cloud by 2021 which means that 2020 will show an growing
trend closing in on this figure. Using virtualization, companies can migrate their
stored data through various sources. This degree of virtualization is already being
used by businesses, but it will be more adopted in the coming year. Another positive
effect of cloud computing is less installation across enterprise computers since the
Internet enables direct access to shared technologies and information. Cloud
computing is a growing movement due to the freedom of new products and services.

Lesson 14.6 - Grid Computing

Grid computing is a distributed architecture of large numbers of computers


connected to solve a complex problem. In the grid computing model, servers or
personal computers run independent tasks and are loosely linked by the Internet or
low-speed networks. Computers may connect directly or via scheduling systems.
Most applications for grid computing projects have no time dependency, and
large projects typically deploy across many countries and continents. Search
programs and others use the idle power of computers, also known as cycle-
scavenging, running in the background for many weeks.
The grid computing concept differs from parallel computing in
supercomputers. Supercomputers run highly connected applications, rather than
independently functional nodes. They operate over high-speed networks and are
typically housed in one specialized data center. Grid computers, on the other hand,
exchange little or no data and feed the project over Internet connections from
geographically dispersed locations.
365
The Future of Grid Computing
The Net, as we know it today, is merely the first attempt to create a stable and
scalable global network. In a way, the mantle of the Internet will be borne by grid
computing, doing for energy what it has done for knowledge. It will promote the
development of distributed inter-enterprise applications and also encourage the
adoption of web services as it is happening now, but will grow more grid models in
web services especially attached to various social media platform. The creation of
grid computing will eventually imply in the future a more reliable and secure grid
systems.

Lesson 14.7 - Information and Communication


Technologies for Development (ICT4D)

Information and communication technologies for development (ICT4D) refers


to the use of information and communication technologies (ICTs) in the fields of
socio-economic development, international development, and human rights. The
theory behind this is that more and better information and communication furthers
the development of a society.
Aside from its reliance on technology, ICT4D also requires an understanding
of community development, poverty, agriculture, healthcare, and primary education.
This makes ICT4D appropriate technology, and if it is shared openly, open-source
the right technology. Richard Heeks suggests that the I in ICT4D is related to
"library and information sciences," the C is associated with "communication studies,"
the T is linked with "information systems," and the D for "development studies." It is
aimed at bridging the digital divide and aid economic development by fostering
equitable access to modern communications technologies. It is a powerful tool for
economic and social development. Other terms can also be used for "ICT4D" or
"ICT4Dev" ("ICT for development") like ICTD ("ICT and development," which is used
in a broader sense) and development informatics.
ICT4D can refer to assisting disadvantaged populations anywhere in the
world, but it is usually associated with applications in developing countries. It is
concerned with directly applying information technology approaches to poverty
366
reduction. ICTs can be applied directly, wherein its use directly benefits the
disadvantaged population, or indirectly, wherein it can assist aid organizations or
non-governmental organizations or governments or businesses in improving socio-
economic conditions.
The field is an interdisciplinary research area through the growing number of
conferences, workshops, and publications. This is partly due to the need for
scientifically validated benchmarks and results that can measure the effectiveness of
current projects. This field has also produced an informal community of technical
and social science researchers who rose out of the annual ICT4D conferences.

Main Technological Trend in 2020 and Beyond


 Hyper automation - This branch of robotics is about automating business
processes as far as possible to make them more precise, more efficient and
up to 10 times faster by combining technologies like RPA (Robotic Process
Automation), Artificial Intelligence (AI) and machine learning, amongst others.

 Multiexperience - Virtual Reality (VR), Augmented Reality (AR) and Mixed


Reality (MR) are transforming our way of perceiving the digital world and
interacting with it. This change is bringing us closer to a future with
applications that will offer the user multiple experiences.

 Democratization of the use of technology - Access by people to technical


and business experience will take place without expensive requirements and
will revolve around four big areas: data and analysis, development, design
and know-how.

 Human perfection - Technological trends also involve the use of innovation


to improve our physical and cognitive abilities, from subcutaneous implants to
greater access to information.

367
 Transparency and traceability - Consumers are demanding greater control
over their personal data. Transparency and traceability are fundamental in this
sense to meet regulatory requirements, maintain ethics in the use of
technology and halt the increase in mistrust of companies.

 Edge computing - This branch of IT will have a big impact on the Internet of
Things (IoT) by making it possible for data generated by devices to be
processed locally, without it needing to be uploaded to the cloud or sent to an
external data center.

 Hybrid clouds - We will be seeing the decentralization of most cloud


services. However, the provider of the source public cloud will retain
responsibility for the operation, control, updating and evolution of the services.

 Autonomy of things - As social acceptance grows, and so far as regulations


and technological progress allow, we will be seeing more autonomous
vehicles, drones, robots and the like on the streets.

 Blockchain - Blockchain stands out for its ability to undertake secure Internet
transactions without intermediaries, such as smart contracts that can be used
in urban management.

 Artificial Intelligence (AI) and Cybersecurity – The popularization of AI and


machine learning will bring new challenges to information security since they
will considerably increase system vulnerability. This makes it essential to
develop new technologies and profiles to strengthen cybersecurity.

 Other Key Technological Elements For 2020


o The 5G network the fifth generation of the mobile telephone arrived in
2020 and its commercial use is expected to grow exponentially starting
from 2021.

368
o Wi-Fi 6: this new standard for wireless connections is already at the test
stage and will provide greater coverage, security, speed and traffic
density.
o Data analysis and decision making: augmented analysis will be a
determining factor for business intelligence, data platforms and machine
learning.
o IoT for industry, transport and town planning: the standardization of
IoT will transform industry towards as a service models, improve
autonomous driving and vehicle connectivity, and contribute to the
development of smart cities.
o Voice search: more and more people are choosing to ask their devices
rather than writing their questions in the search box.
o Chatbot: these applications, thanks to the rise of AI, improve performance
when it comes to holding personalized conversations in real time with
users.
o Video streaming: streamed audiovisual content will continue to dominate
over other formats throughout 2020.

369
ICT Trend 2020, courtesy of Iberdrola .com

Let us reflect…
The Internet will become the platform for all information and computing, and if
the Internet will be the universal platform, then the universal user interface
application is the Internet browser. As a matter of fact, the browser is the only user
interface platform that runs anywhere- whether it is in Windows, IOS, Linux, Android,

370
and even in your wristwatch. If that is the case, you must master the ins and out of
the browser. As a student, do you see this truth and the coming trend that will have a
great impact, not only to your life, but to all humanity? If yes, how does this affect
your foundation of ICT? How does the coming technological innovation and
advancement form your foundation? Reflect on these things, do more, study more,
research more of the things discussed above, and with determination, faith,
diligence, and passion in ICT, success is not hard to find in your life. Above all,
commit all what you have in the hands of your Creator.

How much have you learned?


POST-TEST FOR LESSON 14

Name:__________________________________________ Score:_________
Course/Year/Section:__________________________ Date:__________
Professor/Instructor:__________________________________________

Direction: Answer the following:


1. What are the different applications of artificial intelligence?
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________

371
2. Give examples of gadgets that can be used in a personal area network (PAN).
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________

3. Cloud computing services can be private, public, or hybrid. Discuss each.


___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________

4. What is cloud computing? Cite a specific application of cloud computing.

372
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________

Lesson 14 Final Requirements:


The theory behind ICT4D is that more and better information and
communication furthers the development of a society. Cite pieces of evidence of
social development through advancement in ICT and document your answer as a
research paper, and put it in a minimum of 500 words for the whole research work.

Suggested Readings:

 Books/Journals:
o Shaping the Future of ICT: Trends in Information Technology,
Communications Engineering, and Management/ Reaction Automata
Direct Graph (RADG) Design on Elliptic Curve Cryptography (chapter
24 ). Retrieved from https://www.researchgate.net/publication/
320624628_Shaping_the_Future_of_ICT_Trends_in_Information_Tech
nology_Communications_Engineering_and_Management_Reaction_A
utomata_Direct_Graph_RADG_Design_on_Elliptic_Curve_Cryptograp
hy_chapter_24
o Blockchain 2035: The Digital DNA of Internet 3.0 by Jared Tate and
Andrew Knapp
o The Future Is Faster Than You Think: How Converging Technologies
Are Transforming Business, Industries, and Our Lives (Exponential
373
Technology Series) Hardcover – January 28, 2020 by Peter H.
Diamandis and Steven Kotler
 Websites:

o ―TECHNOLOGY TRENDS 2020 ―.https://www.iberdrola.com/innovation


/technology-trends
o ―Current Trends in Information Technology‖. https://www.vistacollege
.edu/blog/careers/it/trends-in-information-technology-for-2019/
o ―10 Global Trends in ICT and Education‖.
https://blogs.worldbank.org/edutech/10-global-trends-in-ict-and-
education
o ―New Technological Gadgets‖. https://www.engadget.com/
o ―Latest News in Technology‖. https://thenextweb.com/
o ―Most Popular New Technologies‖. https://www.wired.com/

REFERENCES

4. Bynum, T. (2008). Information and Technology and Moral Philosophy.


Cambridge: Cambridge University Press
5. Matthew, S. (2008). Identity and Information Technology. Cambridge:
Cambridge University Press
6. Shelly, Gary, et al. (2012). Discovering Computers, Complete: Your
Interactive Guide to the Digital World. CENGAGE Learning
7. ―Innovation trends in 2020: ready for the 'great technological leap'?‖.
Retrieved from https://www.iberdrola.com/innovation/technology-trends.

374

You might also like