IT102 Final Copy Complete-1
IT102 Final Copy Complete-1
IT 102
INTRODUCTION
TO COMPUTING
AUTHORS:
Mr. Luis S. Mallari
Dr. Josephine R. Bayonito
Mrs. Michelle Tansinsin
Mrs. Ma. Lourdes Tiongson
Ms. Ruffa Ribot
0
Overview of the Module
INTRODUCTION
The module ―IT102 - Introduction to Computing‖,
aside from the course description, aims to give general
overview of what a computer is and lay foundation of the
science of computing. The module contents examines the
overall aspect of computing, its relationship to Information
Communication Technology, components, operating
systems, future trends and technologies, and internal
organization of the computer system which include CPU
elements, memory, internal storage, and input/output units.
The module includes concepts of computer storage
devices, its functionality, the CPU terminology, memory
functionality, future trends and concepts, monitor and their
controllers, video graphic, driver software et cetera. Basic
knowledge of data representation, data communication,
networking, operating systems, database systems, artificial
intelligence, webserver and its properties, internet
communication and its security will also be acquired in this
module.
1
BULACAN STATE UNIVERSITY
City of Malolos, Bulacan
2.1 Preliminaries
2.1.1 Title page
2.1.2 Overview of the module
2.1.3 Table of Contents
2.1.4 Course syllabus
2.1.5 Pre-test
2.2 Contents
2.2.1 Unit title
2.2.2 Title of the lesson
2.2.3 Duration
2.2.4 Introduction
2.2.5 Objectives/Competencies
2.2.6 Pre-test
2.2.7 Lesson Proper/Course
Methodology (followed the
Kolb’s Experiential Learning
Cycle/ 4As Model)
2.2.8 Reflection/Learning Insights
2.2.9 Post-test
2.2.10 Final Requirement
2.3 Other Parts
2.3.1 Suggested Readings and
Websites
2.3.2 Glossary
2.3.3 Answer Key
2.3.4 References
2
3. Illustrations/Tables/Graphs complement
to the contents.
4. The given format was used, to wit:
4.1 Font (Arial)
4.2 Font Size (12)
4.3 Margin (Left-1.5; top, bottom &
right – 0.5”)
4.4 Justified Alignment
4.5 Paper Size (A4)
4.6 Portrait Orientation
Other recommendations:
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
__________________
Checked by:
____________________________
Content Editor
3
Table of Contents
Cover Page…………………………………………………………………...................1
Overview of the Module………………………………………………………………...2
Module Content Checklist……………………………………………………………...3
Table of Contents……………………………………………………………………….4
Course Syllabus………………………………………………………………………..11
4
2.3 Basic components of a computer system……………………………….72
Post Test for Lesson 2………………………………………………………….82
Final Requirements…………………………………………………………….84
Suggested Readings…………………………………………………………...84
References………………………………………………………………...........86
10
COURSE SYLLABUS
Introduction to Computing
First Semester, AY 2020-2021
COURSE DESCRIPTION:
University Vision
Bulacan State University is a progressive knowledge-generating institution,
globally-recognized for excellent instruction, pioneering research, and responsive
community engagements.
University Mission
Bulacan State University exists to produce highly competent, ethical and
service-oriented professionals that contribute to the sustainable socio-economic
growth and development of the nation
University Mission
Program Educational Objectives (PEO)
AIG-a AIG-b AIG-c AIG-d
12
b. Understand best practices and
standards and their applications.
13
Course Outcomes and Relationship to Program Outcomes
LEARNING EPISODES:
Learning Topics Week Learning Activities
Outcomes No.
LO6 Discussion of BulSU 1 Oral Participation
Foundational Statement
LO1 and Vision, Mission, Goals
and Objectives of the
LO2 College
-Basic operations of a
computer system
-Data Processing Cycle
-Basic components of a
computer system
LO7 Lesson 3: Processing data 3 Oral Participation
Transforming data into Quiz
information
-What is a network
-Uses of networks
-Common types of networks
-Networks topology
-Network media
-Network hardware
LO6 Lesson 7: Data 7 Oral Participation
LO9 communications Quiz
LO10
-Data communication on
telephone lines (usage of
modems)
-Using digital data
connections
-Wireless Networks
LO9 Lesson 8: Presenting the 8 Internet activity
LO10 Internet Group Discussion
-Artificial Intelligence
- Applications of AI
-Pervasive Computing
personal area networks
wireless sensor networks
RFIDs
-Next-generation
Networking (NGNs)
-Cloud computing
-Grid computing
-ICT for development
Final Exam Week 17
Submission of Final 18
Requirements, Remedial
Exams, Consultations, Etc.
18
position. main points.
Conclusion
effectively
wraps up and
goes beyond
restating the
thesis.
MAIN POINTS Well-developed Three or more Three or more Less than three
Body main points main points are main points are main points,
Paragraphs directly related related to the present. The and/or poor
to the topic. topic, but one narrative shows development of
Supporting may lack the events, but ideas. The
examples are details. The may lack narrative is
concrete and narrative shows details. undeveloped,
detailed. events from the and tells rather
The narrative is author's point of than shows, the
developed with view using story.
a consistent some details.
and effective
point-of-view,
showing the
story in detail.
ORGANIZATION Logical Logical Organization is No discernable
Structure progression of progression of clear. organization. Tr
Transitions ideas with a ideas. Transitio Transitions are ansitions are
clear structure ns are present present. not present.
that enhances equally
the throughout
thesis. Transiti essay.
ons are mature
and graceful.
STYLE Writing is Writing is clear Writing is clear, Writing is
Sentence flow, smooth, skillful, and but sentences confusing, hard
variety and sentences have may lack to
Diction coherent. Sent varied variety. Diction follow. Contain
ences are structure. Dictio is appropriate. s fragments
strong and n is consistent. and/or run-on
expressive with sentences.
varied structure. Inappropriate
Diction is diction.
consistent and
words well
chosen.
MECHANICS Punctuation, Punctuation, A few errors in Distracting
Spelling, spelling, spelling, punctuation, errors in
punctuation, capitalization capitalization spelling, punctuation,
capitalization are correct. No are generally capitalization. spelling,
errors. correct, with few (3-4) capitalization.
errors. (1-2)
19
OTHER REQUIREMENTS AND ASSESSMENTS:
Aside from the final output, the student will be assessed at other times during
the term by the following:
Regular Class Attendance / Work Ethics
Research/Reflection Activities
Major Examinations (Midterm and Final Term)
Projects / Machine Problems
Quizzes
GRADING SYSTEM:
SL/AOL
Major Examinations (Midterm and Final Exam) 30%
Quizzes/Activities 40%
Projects/Research Works 20%
Attendance/Work Ethics/Class Participation 10%
TOTAL 100%
RPL
Major Examinations (Midterm and Final Exam) 30%
Quizzes/Activities 40%
Projects/Research Works 20%
Attendance/Work Ethics/Class Participation 10%
TOTAL 100%
Range Grade
97-100 1.00
94 – 96 1.25
91 – 93 1.50
88 – 90 1.75
85 – 87 2.00
82 – 84 2.25
79 – 81 2.50
76 – 78 2.75
75 3.00
20
REFERENCES:
1. Bynum, T. (2008). Information and Technology and Moral Philosophy. .
Cambridge : Cambridge University Press
2. Matthew, S. (2008). Identity and Information Technology . Cambridge :
Cambridge University Press
3. Shelly, Gary et al.(2012). Discovering Computers, Complete: Your Interactive
Guide to the Digital World . CENGAGE Learning
ONLINE RESOURCES:
1. http://techopedia.com
2. http://www.tutorialspoint.com
3. http://compnetworking.about.com
4. http://computer.howstuffworks.com
Class Policies:
21
Prepared by:
Luis S. Mallari
Instructor
Evaluated by:
Raquel C. Adriano, Ph.D.
Program Chair, BSIT Program
Approved:
Ma. Magdalena V. Gatdula, DT.
Dean
22
Declaration
I have read and understood the above syllabus in full and in participating in this course I agree to the
above rules. I have a clear understanding of the policies and my responsibilities, and I have discussed
everything unclear to me with the instructor.
I will adhere to the academic integrity and policy and I will treat my fellow students and my teacher
with due respect.
I understand that this syllabus can be modified or overruled by announcements of the instructor in
class or on any social media site at any time
______________________________________ ____________________ _______________
Student’s Printed name Signature Date
Student’s Copy
-------------------------------------------------------Cut here----------------------------------------------------------
Declaration
I have read and understood the above syllabus in full and in participating in this course I agree to the
above rules. I have a clear understanding of the policies and my responsibilities, and I have discussed
everything unclear to me with the instructor.
I will adhere to the academic integrity and policy and I will treat my fellow students and my teacher
with due respect.
I understand that this syllabus can be modified or overruled by announcements of the instructor in
class or on any social media site at any time
______________________________________ ____________________ _______________
Student’s Printed name Signature Date
23
UNIT 01
BASIC CONCEPTS in COMPUTING
24
INTRODUCTION
Lesson 1, Basic Definitions, aside from the course description, aims to give a
general overview of what a computer is and lay the foundation of the science of
computing. The module contents examine the overall aspect of computing, its
relationship to Information Communication Technology, components, operating
systems, and internal organization of the computer system, which include CPU
elements, memory, internal storage, and input/output units. The module contains
concepts of computer storage devices, its functionality, the CPU terminology,
memory functionality, trend and concepts, monitor and their controllers, video
graphic, driver software, et cetera. Basic knowledge of data representation, data
communication, networking, operating systems, database systems, web server and
its properties, internet communication, and security will also be acquired in this
module.
ICT has become a necessary and acknowledged piece of regular day to day
existence for some individuals. ICT is expanding in significance in individuals' lives,
and it is expected that this pattern will proceed, to the degree that ICT education will
turn into a useful necessity for individuals' work, social, and individual lives.
Present day data and technology advances have made the world a "global
village," in which individuals can speak with others worldwide as though they were
living nearby. Hence, ICT is regularly concentrated with regards to how present day
correspondence innovations influence society.
25
OBJECTIVES/COMPETENCIES:
Observing the lives in your community, could you describe how computers
affect the lives of the people?
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
Could you describe life without any smart device and the Internet?
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
26
Lesson 1.1 - DATA AND INFORMATION
Data as a general concept refers to the fact that some existing information or
knowledge is represented or coded in some form suitable for better usage or
processing. It is a series of observations, measurements, facts, and communication.
Computer data are information that is stored or saved inside a computer or a
computing device.1 There are multiple types of data. Some of the more common
types of data include the following:
• Single character
• Boolean (true or false)
• Text (string)
• Number (integer or floating-point)
• Picture
• Sound
• Video
Information
1 0
0011010001010100101010011110000110101011000110100
0011101010001110101001010010101100110000110011110
0111001001100100100010010011100000011111101010101
010100001100101000101000101001000
For the decision to be meaningful, the processed data must qualify for the following
characteristics:
28
Lesson 1.2 - What is Information Communication
Technology (ICT)?
ICT stands for "Information and Communication Technologies." It refers
to technologies that provide access to information through telecommunications 4. It is
similar to Information Technology (IT) but focuses primarily on communication
technologies. ICT includes the Internet, wireless networks, cell phones, and other
communication mediums.
30
Lesson 1.3.1 - The Input Devices
In a computer system, the input devices are hardware peripherals that are
used for communication between humans and computers. Input devices send signal
to the computer as input to command a computer machine what to do. Some of the
popular input devices are:
KEYBOARD
The keyboard is one of the many ways to
communicate with a computer. It looks like a
typewriter, has many buttons and are called
―keys‖. You use the keyboard to type letters,
numbers, and symbols to give instructions to the
computer.
MOUSE
The mouse is another important tool for
communicating with computers. Commonly known as
a pointing device, it lets you point to objects on the
screen, click on them, and move them. The mouse
allows you to control the movement of an on-screen
pointer, and when you move the mouse, the cursor
will also move. You can use the mouse to tell the
computer what to do.
MICROPHONE
A microphone is a sound-detecting device that can be
attached to a computer. It allows you to input sounds like
speech and songs into the computer. You can record your
voice with the help of a microphone.
31
WEB CAMERA
A web camera is used to take live photos videos. You can
save them in the computer. All cameras are made of
semiconductor device called CCD, which means, Charged
Coupled Device. It is the sensor that sense images and convert it
to digital signals.
JOYSTICK
A joystick makes computer games a lot more fun. When it is
moved, it passes information to the computer. Most joysticks are
used in game applications and program simulation of animations.
SCANNER
A Scanner scans and copies pictures and pages, and
turns them into images that can be saved on a computer. It is
often part of a printer and one of the features of it. Scanners
are like Xerox machines that can directly duplicate text and
images.
Things to explore…
The System Unit or Processing device is the metal and plastic box that
contains the main components of the computer, including the motherboard,
memories, central processing unit (CPU), on/off button, and power supply. When you
think, you use your brain. In the same manner; system unit has the CPU as the main
brain of the processing device. It tells the other parts of the computer what to do. It is
the controlling part of a computer that controls all the input and out peripheral
devices.
33
MONITOR
The monitor works with a video card, located
inside the computer case, to display images and text on
the screen. Most monitors have control buttons that
allow you to change your monitor's display settings, and
some monitors also have built-in speakers. The monitor is
like a window or a rectangular screen that are made of special
semiconductors that light when a signal is triggered by the system unit. Inside
the screen are texts and graphics that perform interaction between human
and the computer.
PRINTER
A printer prints the results of your work from the
computer screen on a sheet of paper. This is called a
printout. It takes data from the system unit and output
those data as printed document. Those printed
documents are composed of texts and images.
SPEAKERS/HEADPHONES
The speakers and headphones are the output
devices that produce different types of sounds processed
by the computer. Speakers are made of electrical
components called transducers that convert electrical
signal from the processing unit to audible signals. You
can listen to songs or speeches stored in the computer
with the help of speakers.
34
Lesson 1.3.4 - The Storage Devices
The storage devices that are used in computers are special devices made of
special materials. Some are made of special mechanical devices that are coupled
with magnetic materials. Many years ago, data was stored in papers and
cardboards. Nowadays, most storage devices are made of special semiconductor
materials using special and advanced physics technology. Both of the mechanical
and semiconductor types of storage materials used these advanced technologies to
store data and digital signals. Below are some of these storage devices.
HARD DISKS
The hard disk is a part of a computer which is
used for storing data. Storing data devices are called
storage devices. These medium of storage are semi-
magnetic disks that are called platter. They help in
storing any work done on a computer permanently.
Inside the system unit is a hard disk that is made up
of one or more metallic disks. It stores a large
amount of information.
FLOPPY DISKS
A floppy disk stores small amounts small
amounts of information. It works when it is inserted
into the floppy drive. The floppy drive is fixed in the
system unit. It is also made of magnetic devices
formed in a thin film type disk-shaped inside the disk
cartridge. Currently, floppy disks are not used
anymore because of its small storage capacity.
A little break…
Are you wondering how those little digital molecular bits stored in many storage
devices? You can do a simple research document on those memory technology.
35
COMPACT DISKS
A Compact Disk or CD stores many times
more information than a floppy disk. It is made
using glass and laser technology. Data are stored
using sophisticated light technology and light
beam aimed into the glass disk by mechanical
precision achieving high data storage capacity. This compact disk works when
it is inserted into the CD drive wherein a laser reader and sensor read the
data impose from the compact disks. The CD drive is fixed in the CPU. Take
note that compact disk is a light sensitive storage device and improper
handling of it may result in the loss of data stored.
It is an inanimate object.
o It needs outside intervention for it to run.
o It can only do things for which it is intended.
It is electronic.
o It is made up of electronic circuits.
o It is powered by electricity.
It is automatic.
o It can set up its internal operations on its own.
o The various functions are executed automatically by way of a stored
computer program.
It has a memory.
o It can remember what it has done.
o It can store instructions in its memory and follow these through
unaided.
o It can store a large amount of data in a compact and easily retrievable
form.
37
Lesson 1.3.6 - Capabilities and Limitation of Computer
CAPABILITIES
3. Accuracy. When the machines are programmed correctly, and when input
data is error-free, the accuracy of the output is relatively assured.
5. Store and retrieve information. It can save and retrieve information for
future use.
LIMITATIONS
38
Lesson 1.4 - ANALOG, DIGITAL, AND HYBRID
COMPUTERS
There are three basic kinds of computers. These kinds are based on the
hardware structure and the way physical quantities are represented in a computer.
The following are the three types.
Analog
Digital
Hybrid
39
Lesson 1.4.2 - Different applications of Analog Computers5
Hybrid Controller
Simulation of a Spaceship
Mass-Spring-Damper System
Simulation of Car-Suspension System
Vehicle Simulation
Speedometer
Telephone lines
Frequency of Signal and Voltage
Oscilloscope
Television
Analog Sound Processor
Operational Amplifiers
An Analog type computer
Mechanical Integrators
Wheel balancing computer
40
1.4.3.1 - Slide Rules
A Slide Rule is the most straightforward type of analog computer, and this
computer helps to produce an approximate result for simple mathematical
operations. All users slide the hashed rod to line up along with several marking in the
other rod, and it helps to read this equipment depending on the line up of different
kinds of hash marks.
41
computational part of this computer permitted users to set11 variable
length of the day depends on the running season. In the picture above is a sample
castle clock from Dinan, France.
42
1.4.3.6 Pneumatic Analog Computer
Pneumatic analog computers use the compressed air in the form of a
power source that is very simple and inherently analog, and these computers are
mostly used in the military and non-residential building areas. Input signal lines were
calculated by the use of controlled air supplied to the inside of the computer, and the
desired output signal in the form of air pressure was achieved through configurations
in the analog box. Most pneumatic analog computer principle today was integrated
into many medical devices like the mechanical and digital ventilators that were used
in almost all hospitals for helping patients with lung problems.
43
Lesson 1.4.4 Comparison Between Analog and Digital Computer17
44
Lesson 1.5 - Types of Computers by Classifications
There are four types of computers with their classification, such as:
• 1.5.1 - By Size and Capacity
• 1.5.2 - By Operating System Capabilities
• 1.5.3 - Based on Number of Microprocessors
• 1.5.4 - Based on the Number of Users
Functions are:
A supercomputer, courtesy of Microsoft Corporation
Industrial function
Space exploration
Weather forecasting
Nuclear testing
45
Mainframe Computer
memory.
46
Some examples of minicomputers are:
Tablet PC
Desktop minicomputer
Functions are:
Process monitoring
Data acquisition
Feedback Control
Micro Computer
The microcomputer is small in size. You can say it equivalent to personal
computers. Microcomputers use different technologies like CPU (one single chip),
Microprocessor, Input/output devices, and other storage parts. This is a multi-User
computer that is a significant advantage.
47
Embedded Computer
Examples are:
DVD Player/Recorder
Medical Equipment
Printer
Fax Machines
Washing Machine
Industrial Equipment An embedded computer for Industrial Control systems
Home Automation
Your computer's operating system (OS) manages all of the software and
hardware on the computer. Several different computer programs are running
simultaneously, and they all need to access your computer's central processing unit
(CPU), memory, and storage. The operating system coordinates all of this to make
sure each program gets what it needs.
Operating systems usually come pre-loaded on any computer you buy. Most
people use the operating system that comes with their computer, but it's possible to
48
upgrade or even change operating systems. The most common operating systems
for personal computers are Microsoft Windows, macOS, Unix, and Linux.
Microsoft Windows
macOS
49
According to StatCounter
Global Stats, macOS users
account for less than 10% of
global operating systems—much
lower than the percentage of
Windows users (more than
80%). One reason for this is that
Apple computers tend to be
more expensive. However, many
people do prefer the look and
feel of macOS over Windows.
Apple‘s macOS operating system, courtesy
of Apple Corporation
Linux
According to StatCounter Global Stats, Linux users account for less than 2%
of global operating systems. However, most servers run Linux because it's relatively
easy to customize.19
1. Sequential Computers:
The sequential computing is traditional architecture. In this model, all
instructions are performed one by one, so the speed of this computing is slow
compare to parallel computing.
2. Parallel Computers:
Parallel computing is an imaging type of model in which many processors or
applications execute simultaneously. In parallel computing splits the overload
work into more than one processor and computation simultaneously.
1. Single User
In this model, only one user can perform a task at a time.
2. Multi-User
In this model, only multiple users can perform tasks at a time.
51
3. Network Types
In this model, which has unique functionality, the connection between computers
and other terminals is connected with the local area network.
52
Everyday life Transport Engineering
Education
Technology helped us in our
education as well. This has introduced the
most comfortable way of learning and
teaching for both students and teachers. It
has also introduced us to know about
53
modern discoveries and even historical things as well. We can use the internet
everywhere in different books, and again we can watch videos on the internet to get
more ideas about the topic that we want to research on.
Nowadays, we use a projector in our school and other educational fields to
discuss the work with the whole class.
We can also get ideas by reading blogs about different things and also
discuss each other‘s views about some topics that are related to education using
blogs. We can again ask a question from our teacher using emails while we are at
home, which could be very important, especially before the exam day and we can
also research on the internet, and we don't have to look at the books and find the
right page. This saves a lot of time for the students. We can also take help from our
friends to learn in a collaborative environment.
Although there are some advantages of using IT in our education, it also has
some disadvantages as well. Nowadays, people rely on the Internet too much that
they believe in everything that is written on the web page. It has also taken jobs from
the library because most of the people rely on the internet library because they can
buy their favorite books on the internet. So libraries are shutting down because
people depend on the Internet library.
54
WAN (Wide area Network.) We can also get a monthly statement using the internet,
so we can compare our information every month and make our plan for the
upcoming months. Money transfer for another country through banking will be a
simple task. IT has also introduced us to an Eco-friendly world by using fewer papers
for money and banking. All the information can be stored on our computer, and we
don't have to worry about losing important documents.
We sometimes face significant problems using IT in Money and banking.
Many people make malicious software that is used to hack other information on the
computer. So when someone stores their bank information on their computer, those
hackers steal their data and use it for their gain. Sometimes it can happen to any
company, and as a result, they can lose all of their consumers' data. Phishing is
another method used by those people to hack information using the internet. The
company also needs to hire a lot of staff who have IT skills, which means a lot of
resources need to be spent on staff and computers to store customers‘ information.
Business
Communication is an essential
technique that is used to make a business
very famous. In earlier days, people used
to communicate differently. They had to
go to everyone's house to promote their
products, which could take a long time to
promote their work. They sometimes used
to take a long journey so that they can
deal with someone, and they can expand their business. Since technology has
arrived, people still using the technique, which is communication, but they have
changed the method of promoting their products or dealing with someone who is far
from one another. Instead of going to everyone's house separately, people are
making an advertisement, which not involves one area or a country but the whole
world and we can also use IT to communicate someone who too far from each other.
55
We can use the e-mailing method to learn more about our customers. They can
again frequently ask us some questions related to our business.
But sometimes we can't rely heavily on writing e-mails because we can't
sometimes share what we are feeling or what we are want to ask. So it becomes
very compulsory for us to have face to face communication with them. This is when
we exploit IT in our life. Video conferencing assembled us via the internet. We can
use this technique to communicate with someone face to face, and we can use this
benefit for meeting or if we are trying to work together with other companies which
can be situated in other countries.
Information Technology also has some adverse effects on Business. We rely
too much on technology, and so we always put whatever we do on our computers.
So it increases the cost of a company as the company needs to use LAN and WAN
to expand its businesses. Our servers can also crash or get damaged, and it can
cost millions of pounds for the company to repair. The chance of losing the whole
companies files are random as well. It can sometimes make it easier for hackers to
break the firewall of the company and use it for their purposes. So the company
needs an extra employer, which is a network administrator who deals with these
things and therefore, the company has to pay him as well.
Health
When we get sick, we don't want to
go to many places other than home. But
from home going for a consultation to a
doctor, we need to move physically.
Taking an appointment, talking to the
receptionist, describing the problem we
have, and then waiting for it increases our
illness. This is when IT comes to helping us. Nowadays, we don't need to go to the
doctor's and describe our problems; we can use the Internet to contact our doctor.
We can use also use IT to do face to face communication with our doctor even
though we are at home. We can again frequently ask a question to our doctors, and
they can also answer us using E-mails.
56
Making an appointment is not necessary to contact our doctors, and we can
get our prescriptions at whatever point we need. We can likewise utilize this office to
find out about our ailment and how to fix ourselves. We can look on the web to
explore about the illness and the medication we need to use to show signs of
improvement. It can benefit students who are studying to become doctors and who
like to know more about different kinds of medicines.
IT provides us with a lot of advantages. But it also has some disadvantages. If
someone uses a computer for a long time, then they can get a headache, it can also
cause neck pain, can make them nothing apart from sitting in front of the computer.
Some teenagers also put too much time on their games instead of studying or taking
part in different physical activities. Some people even get stretch if they get bullied
on the internet, which may stop them from going outside, and they sometimes feel
scared to talk to anybody.
57
The main disadvantage created by the technology system is that anyone who
knows how to make a program, they can hack others device using viruses, Phishing,
and also Malicious software. They can be very threatening because they can take
your information, which can be very confidential for you. I.e., Your bank card.
Sometimes people also delete other files to annoy people, which can lead someone
to lose their essential work as well.
Retailing
IT has impacted on Retailing, and we
are immensely enjoying the benefit of using IT
on Retailing. We are using IT on Retailing,
which helps us to buy anything 24/7 every
day. We can use this facility to choose
whatever we want at any time we want. We
can select a range of items on the internet,
and we don't even have to go to a place to
choose whatever we want. We can also
reserve the items on the internet. We can pay for the items on the internet with a
safe internet payment option, which is PayPal. We can also choose products from
different countries on the internet and buy them using the advantage of IT. IT also
helped companies to make more money and spend less on their business. The
company does not need to hire more staff for the company.
Although it has some advantages in retailing, there is some disadvantage as
well. It can sometimes become very discouraging for small shops as they can't
compete with big supermarkets like Tesco, which has both online shopping and
average shopping facility for the consumers. So they have to close their shops.
Sometimes the customers can't get their necessary staff when they needed because
of the late delivery.
58
Let us reflect…
Most people who appreciate ICT wonder in the power of it and how it is useful
and helpful. Also, insights have given to you that through ICT, the work on the job
field can be done more effectively.
As a student, how can you develop your knowledge base on the basics of
computing? Can you measure the fundamental effect of Information Communication
Technology for your future?
59
60
C. What are the different types of computers? Discuss each.
D. What is ICT?
E. What are the importance and applications of ICT in our daily living?
61
Lesson 1 Final Requirements:
Write a research article (not less than 500 words) on the following topics that
will be submitted in a week time.
Suggested Readings:
Books/Journals:
o Complete ICT for Cambridge IGCSE® Second edition, Complete ICT
for Cambridge IGCSE
o INFORMATION COMMUNICATION TECHNOLOGY (ICT) [Concepts
and Application], Yekini Nureni (2014).A Journal at Researchgate.net
o Introduction to Information and Communication Technology in
Education. (Moursund, 2015)
o Computers Made Easy, From Dummy To Geek by James Bernstein,
2018
o Scientific Research in Information Systems-A Beginner's Guide by Jan
Recker (2012)
Websites:
o TechCrunch.com
o TheNextWeb.com
o Wired.com
o Tech2.com
o Gizmodo.com
o Mashable.com
o TheVerge.com
o DigitalTrends.com
o TechRadar.com
62
REFERENCES
7 – ―Clip Force Video and Animation‖ ClipForce 2020, Image retrieved from
http://www.clipforce.nl/wp-content/uploads/2018/09/ICT-en-online-video.jpg
63
12 – ―What is Analog Computer: Definition, Examples, Types‖ Lesson part retrieved
from http://digitalthinkerhelp.com/what-is-analog-computer-definition-and-its-
examples/. Image retrieved from https://cdn.arstechnica.net/wp-content/uploads
/2015/04/VCSE-1.jpg;
16- ―The MONIAC (based on Alas‘ works), also known as the Phillips Hydraulic
Computer‖. Retrieved from https://en.wikipedia.org/wiki/MONIAC.htm
64
Lesson 2: Basic operations and Components
of a Computer System
Duration: 3 Hours per week (Week 2)
INTRODUCTION
Saying that PCs have changed our lives cannot be denied. These machines
have changed how we play out every day by day task. It affects our lives in a great
deal in a way that it runs almost all our needed equipment in our everyday lives. The
different operations and functions of computers are also increasing and becoming
very powerful that many people cannot cope with the operations of a simple
computer. It created and developed many cause and effect events in our society.
In this lesson, those computer components with functions and operations will
be dealt with in a lay manner that can be understood by a user beginning to grasp
the usefulness of the computer. The lesson will also prepare the learner‘s experience
of how does a computer‘s part and component interact with each other.
In the first lesson, data and information were discussed. Those terms will be
dealt with more profoundly, mainly how those are processed by the different
components of a computer system. The various information cycle processes inside a
computer will help the learners understand and grasp the internal operation of a
computer as a foundation for the different interface processes to other devices. The
lesson will give the learner an understanding of the internal communication and
passing of data inside a computer with the manipulation and control of a user. Lastly,
this lesson will prepare the learner of how to program each device, giving the
foundation of the data processing inside the computer.
65
OBJECTIVES/COMPETENCIES:
66
________________________________________________________________
________________________________________________________________
The basic operations of a computer system are input, processing, output, and
storage, as illustrated in the figure below:
1. Inputting
2. Processing
3. Outputting
4. Storing
5. Controlling
67
2.1.1 Inputting
Inputting is an essential operation of a computer system. This is the act of
feeding in the data and instruction to the computer (by computer here, it means the
processing unit).
A computer system consists of different functional units, and the Input Unit
does the operation of Inputting. By inputting, you should understand that it is to send
data and instruction to the computer in the required format. Information and
programs are entered into the computer through Input devices such as the keyboard,
disks, or through other computers via network connections or modems connected to
the Internet.2
The input device also retrieves information off disks. Because Computers
work with bits, there should be some mechanism to make data understandable by
CPU (the process is called encoding). Also, the information produced by the CPU
must be converted to the human-readable form (called decoding). Input Unit devices
take care of encoding.
As it is discussed in Lesson 1, the devices that help you to input data and
instructions are known as Input Devices. Keyboard, Mouse, Light Pen, JoyStick,
Scanners, Microphone, etc. are some examples of input unit devices. The devices
that can send data directly to the CPU or which does not need to encode it before
sending it to CPU are considered Direct Entry Input Devices such as scanners.
Devices such as a keyboard which require encoding data so that it is in the form a
CPU can understand are Indirect Entry Input Devices. 3
68
storage are transferred to it as when required. ALU may produce Intermediate
results and keep it in the memory, which is also moved back to the ALU for the final
processing. After completion of processing, the final results are sent to storage units
from ALU.4
2.1.3 Outputting
This unit takes care of receiving processed information from the processing
unit and presents it to the user in a suitable form.
A computer produces results in binary form, and the output unit does
decoding to make it usable to the users. The devices that can output information
from a computer are known as output unit devices. Monitors, Speakers, Projectors
are soft output devices, whereas printers, plotters produce hard copy output. Soft
copy output is something that is temporary or is available only as long as the output
device is turned on. Contrary to these are hard copy output, which is permanent. The
printout in a paper is not lost because the printer is turned off! 4
2.1.4 Storing
Before the actual processing start, data & instructions entered to the computer
must be stored somewhere inside the computer. Similarly, results produced by the
computer are required to be held before it is passed to the output unit. The
intermediate product made by the computer must also be stored for further
processing. Thus the importance of storage units in a computer system is vital.
Based on whether the storage device is inside the main machine or not, it can
be internal or external storage. Similarly, looking at whether the storage device
works close with CPU or works as backup media, they can be primary storage or
secondary storage. Primary storage is also called primary memory. Secondary
69
storage is known by other names such as backup storage or secondary memory. 1
For storage purposes, a computer system may have different devices such as
registers, cache, RAM/ROM, flash, magnetic disks, optical disks, etc.
2.1.5 Controlling
ALU dose does not know what should be done with the data; likewise, the
output unit does not know when the result should be displayed. By selecting,
interning, and seeing to the execution of the program, the CU can maintain order and
direct the operations of the entire system. CU doesn't perform any actual processing
on data, yet it is known as a central nervous system for the comforts of the
computer. It manages and coordinates the entire system. 1b I hope this discussion
helps you and makes you select the correct answers in your exam. The following
questions are probable from this topic.
70
Data Collection
Data collection is a stage of gathering data from the environment and
preparing it for input. The collection process is the first step that provides the
data. Collecting data is hard work on its own, but it is the most essential on
which the results depend. The quality of input will determine the quality of
output. This data collection can be done in various ways by primary or
secondary sources. This data might include census data, GDP or other
monetary figures, data about several industries, the profit of a company, etc.
Depending upon the data requirement, its source must be identified from
which data will be collected.
Input
This is the feeding of raw and filtered data for processing. If the inputs
are not given correctly or entered wrong, the output will be directly affected.
This is because the product observes the standard of "Garbage in – garbage
out." Utmost consideration ought to be taken to give the right information.
Processing
Processing is the step where data is processed by electronic data
processing, mechanical processing, or automated means. The processed
data is one who gives information to the user and can be put to use. The raw
data cannot be understood and thus needs processing, which is done in this
step.1d Processing of data may take time depending on processing power, the
complexity of the data, computer systems, and the volume of input data. The
step of preparation mentioned above helps in making this process faster.
Output
This is the step where data is processed by electronic data processing,
mechanical processing, or automated means. The processed data is one who
gives information to the user and can be put to use. The raw data cannot be
understood and thus needs processing, which is done in this step. Processing
of data may take time depending on processing power, the complexity of the
71
data, computer systems, and the volume of input data. The step of
preparation mentioned above helps in making this process faster.
Storage
The output data may be stored on a disk or permanent memory media
for future reference or use.
72
Hardware
It is the physical or tangible parts of the computer. Computer hardware is
classified as follows:
1. Input devices – allow the user to input data/facts into the computer in
a form that the computer understands. An input device also allows the
system to command the computer through text or graphical user
interface. The keyboard is a standard input device. Other input devices
include a mouse, scanner, microphone, touch screen, webcam,
barcode reader, joystick, and trackball.
73
stores data permanently, while RAM is volatile for its store data
The motherboard with the processing device, Central Processing Unit (CPU), and with
RAM, random access memory device.9
3. Secondary storage devices – these are the devices outside the system
board that allows data and programs to be stored. These are storage
devices that operate alongside the computer‘s primary storage, RAM, and
cache memory. Secondary storage is for any amount of data, from a few
megabytes to petabytes. These devices store almost all types of programs
and applications. This can consist of items like the operating system,
device drivers, applications, and user data. For example, internal
secondary storage devices include the hard disk drive, the tape disk drive,
and compact disk drive. Secondary storage typically backs up primary
74
Examples of secondary storage devices, courtesy of slideshare.net 8
75
5. Communication devices – these are used to communicate with another
computer via telephone lines or radio links. USB network adapter and
network card, sometimes called Ethernet card, are examples of its device.
76
The figures above show the chipset of a computer categorize as North and South
bridge. Courtesy of Google Free Images.
77
An almost complete hardware system:
78
Software
Software – it is the collection of related programs that contain the step-by-step
instructions telling the computer how to perform a task. There are two major
types of software. These are:
79
System software – this software manages the computer hardware and
works with the other software. It is computer software designed to operate
the computer hardware and to provide a platform for running application
software. The system software also provides services to computer users
and application programs.10 Examples of system software are operating
system, device driver and utility programs, DOS (Disk Operating System),
Windows, Unix, Linux, Novell Netware, Android, etc.
80
Difference between System Software and Application Software:
Dataware - is an extensive
collection of computer data used to
help an organization make decisions.
It also consists of all the data needed
in data processing. Dataware is
synonymous with a data warehouse.
81
Let us reflect…
The lesson Different Operations and Components of Computer Systems is
one of the foundations of the computer world. It is important to grasp that knowledge
in order to master the future intellectual dimension of computing especially in the
programming skillset aspect of the student and the different underlying technologies
of those different components of the computer system.
As a student, how do you view the aspect above in reference to the hardware
dimension of the computer? As a future IT expert, how does the lesson drives you to
establish your sense of specialty in the area of hardware or software? Reflect on
that, document that experience, because it will help you to stand on your ground in
the world of computing.
Name:__________________________________________ Score:_________
Course/Year/Section:______________________________ Date:__________
Professor/Instructor:_______________________________
Direction: Select the best answer from the choices by writing the letters on the
blank before the questions.
82
_____4. Which of the following unit does encoding?
a. Input Unit b. ALU c. CU d. Output Unit
_____8. After completion of processing, the final results are sent to the ___ before it
goes to the output device.
a. Monitor b. Printer c. Storage d. ALU
_____10. The unit that manages and coordinates the whole system is
a. Input Unit b. CPU c. ALU d. CU
83
4. ____________ refers to the data that has been processed into a form that has
meaning and is useful.
5. A _______________ consists of hardware, software, peopleware and
dataware.
6. The ____________________ is the electronic circuitry that manipulates data to
produce information.
7. The Northbridge is usually paired with a Southbridge, also known as
______________.
8. The ____________ manages the computer hardware and works with the other
software.
9. Even the most powerful supercomputers require _________ interactions.
10. ______________ consists of all the data needed in the data processing.
Suggested Readings:
Books and Journals:
o Input and Output Devices by Benjamin David Lunt, 2016 Edition
o Input/Output Technologies: Current Status And Research Needs, the
National Academic Press (2020), pp 71-120
o From Hardware to Software,Input and Output Devices, Graham Lee
(2020). pp 205-216. Springer Link: https://doi.org/10.1007/978-1-349-
16786-9_12
o ―Hardware and Software Technologies‖. Academia.org
84
Websites:
o ―How Computers Work: Input and Output‖. https://homepage.
cs.uri.edu/faculty/wolfe/book/Readings/Reading06.htm
o Introduction to Information Technology, 2nd Edition by ITL Limited ITL
Education Solutions Limited. https://www.oreilly.com/library/view/
introduction-to-information/9789332525146/xhtml/chapter004.xhtml
o Processing device. https://www.computerhope.com/jargon/p/
procdevi.htm
o https://www.electronicsforu.com/
o ―Automating Input-output Devices‖ https://sensi.emerson.com/en-
us/blog/home-automation-benefits
o ―Automating your Home‖ https://informinc.org/home-devices/how-to-
fully-automate-your-home/
o ―The Input-Ouput Devices‖. https://www.khanacademy.org/ computing/
computer-components/input-output-devices
o https://allaboutbasic.com/2010/12/14/277/
o ―Different Computer Terms and Terminology.‖ https://www.unm.edu/
~tbeach/terms/inputoutput.html
85
References
86
Lesson 3: Processing Data: Transforming
Data into Information
Duration: 3 Hours per week (Week 3)
INTRODUCTION
87
OBJECTIVES/COMPETENCIES:
88
Lesson 3.1 - TRANSFORMING DATA INTO INFORMATION
Computers cannot understand anything, though they seem that they know us
because we understand the information it produces. Computers recognize two
distinct physical states produced by electricity, magnetic polarity, or reflected light.
Essentially, they understand whether the switch is on or off. The CPU, which acts as
the ―brain‖ of the computer, consists of several million tiny electronic switches, called
transistors. A computer appears to understand information only because it operates
at such phenomenal speeds, grouping its individual on/off switches into patterns that
become meaningful to us.
In computing, data is the term used to describe the information represented
by groups of on/off switches. In the strictest sense, data consist of the raw numbers
that computers organize to produce information. Some of the objectives of data
processing are:
To provide mass storage for relevant data.
To make easy access to the data for the user.
To provide prompt response to user requests for data.
To eliminate redundant data.
To allow multiple users to be active at one time.
To allow for growth in the database system.
To protect the data from harm like physical and unauthorized access.
89
Data pen - a device for reading or scanning magnetically coded data on
labels, packets, etc.
90
Software piracy - intentional copy and use of a software product without the
permission of its owner.
91
when a switch is on, it means a one (1). Because there are only two values, the
computer functions in base 2, which is also known as the binary number system.
Binary numbers are made of bits. A bit represents a switch. A byte
comprises 8 bits and represents one character. With one byte, the computer can
mean one of 256 different symbols or characters because the eight 1s and 0s in a
byte can be combined in 256 different ways.
The value 256 is more than the number of symbols; it is the number of
patterns of 0 and 1 that can be created using eight bits. This number can be
obtained using a calculation. There are only two possible states for a switch, on and
off. In a byte, there are eight switches. To calculate the number of patterns, raise 2
to the number of bits: 28 = 256.
92
3.3.1 Text Codes
The text codes are standard codes necessary for data transfer, like converting
letters into binary. The famous text code systems are the following:
ASCII. This stands for American Standard for Information Interchange. Today,
the ASCII character set is by far the most commonly used in computers for all
types.
Extended ASCII. This is an eight-bit code that specifies the character for
values from 128 to 255. The first 40 symbols represent pronunciation and
particular punctuation. The remaining signs are graphic symbols.
93
3.3.2 How Data Is Represented In the Computer
Integer
Each integer is represented in binary, where a single number
will usually be expressed in one byte.
Characters
Each character is usually one byte (8 bits), represented in
binary.
Unicode
It is a standardization of assigning values to a specific character;
94
this is needed as there are hundreds of different characters in different
languages. If done by each community, there would likely be overlaps.
Strings
Strings are a concatenation of characters and were represented
in binary, as each 8-bit character following each other. Each word will
be around 16-32 bits.
Colors
Colors are represented in the hexadecimal number system. It
will be six hexadecimal values 2 for each prime color, in the order of
Red, Green, Blue (RGB.) For example, the color red will be FF 00 00.
When viewed on a display screen, it will usually have a hashtag before
the value, e.g., #FF 00 00. A maximum of around 16.8 million different
colors may be input. (16 to the power of 6 or 2 to the power of 24.).
Please see the EXCELLENT chart below to understand better how hexadecimal is
used to express colors. The image below shows the equivalent data of colors in text
and numbers4:
95
Let’s have an exercise…
Try this with your computer: Identify the different Unicode equivalent of each
96
Lesson 3.4 How Computers Process Data
Control Unit
All the computer‘s resources are managed from the control unit. Think of the
control unit as a traffic signal directing the flow of data through the CPU, as well as to
and from other devices. The CPU‘s instructions for carrying out commands are built
into the control unit. The instructions, or instruction sets, list all the operations that
the CPU can perform.
97
Logical operations include comparisons, such as determining whether one
number is equal to, greater than, or less than another number.
5
3.4.1- Types of Data Processing On Basis of Process/Steps Performed
98
1. Batch Processing
Batch processing is one of the widely used types of data processing, which is
also known as serial/sequential, tacked/queued of offline processing. The
fundamental of this type of processing is that different jobs of different users are
processed in the order received. Once the stacking of jobs is complete, they are
provided/sent for processing while maintaining the same order. This processing of a
large volume of data helps in reducing the processing cost, thus making it data
processing economical.
Batch Processing is a method where the information to be organized is sorted
into groups to allow for efficient and sequential processing. Online Processing is a
method that utilizes Internet connections and equipment directly attached to a
computer. It is used mainly for information recording and research. Real-Time
Processing is a technique that can respond almost immediately to various signals to
acquire and process information. Distributed Processing is commonly utilized by
remote workstations connected to one big central workstation or server. ATMs are
good examples of this data processing method. Examples include Examination,
payroll, and billing system.
2. Online Processing
99
3. Real-Time Processing
As the name suggests, this method is used for carrying out real-time
processing. This is required where the results are displayed immediately or at the
lowest time possible. The data fed to the software is used almost instantaneously for
processing purposes. The nature of the processing of this type of data processing
requires the use of an internet connection, and data is stored/used online. No lag is
expected/acceptable in this type, and receiving and processing of the transaction is
carried out simultaneously. This method is costly than batch processing, as the
hardware and software capabilities are better. An example includes the banking
system, ticket booking for flights, trains, movie tickets, rental agencies, etc.
This technique can respond almost immediately to various signals to acquire
and process information. These involve high maintenance and upfront cost attributed
to exceptionally advanced technology and computing power. Time saved is
maximum in this case as the output is seen in real-time. An example is banking
transactions.
4. Distributed Processing
5. Multi-Processing
Multi-processing perhaps is the most widely used type of data processing. It is
used almost everywhere and forms the basis of all computing devices relying on
processors. Multi-processing makes use of many parallel CPUs, which have two or
more CPUs. The task or sets of operations are divided between CPUs available
simultaneously, thus increasing efficiency and throughput. The breakdown of jobs
that need to be performed is sent to different CPUs working parallel within the
100
mainframe. The result and benefit of this type of processing are reducing the time
required and increasing the output.
6. Time-sharing
The time-based use of CPU is the core of this data processing type. Multiple
users use a single CPU. All users share the same CPU, but the time allocated to all
users might differ. The processing takes place at different intervals for different users
as per allotted time. Since multiple users can use this type, it is also referred to as a
multi-access system. This is done by providing a terminal for their link to the main
CPU, and the time available is calculated by dividing the CPU time between all the
public users as scheduled.
101
Lesson 3.5 - Machine Cycles
Machines Cycles6
Each time the CPU executes an instruction, it takes a series of steps. The
completed sequence of steps is called the machine cycle. The actions performed
by the computer processor for each machine language instruction received. The
machine cycle is a four process cycle that includes reading and interpreting the
machine language, executing the code, and then storing that code. A machine cycle
itself can be broken down into cycles such as the following:
102
Lesson 3.6 - Computer Memories
103
read. If exposed to ultraviolet light, an EPROM can be reprogrammed if needed, but
otherwise does not accept or save any new
data. Hardware
104
3.6.3.2 - PRIMARY AND SECONDARY MEMORIES
105
3.6.4 - TYPES OF MEMORY
There are several types of memory for computers. They are listed below.
EDO RAM - Short for Extended Data Out, and alternatively referred to as
hyper page mode memory, EDO is a type of memory developed in 1995 by
Micron and was first used with Pentium computers. EDO allows a CPU to
access memory 10 to 15-percent faster the compatible Fast Page memory by
not turning off the data output drivers after the memory has removed the
column address.
106
DDR RAM - Short for double data rate, DDR is a memory that was first
introduced in 1996 and has since been replaced by DDR2. DDR utilizes both
the rising and falling edge of the system clock, potentially doubling the speed
DDR2 RAM - Short for double data rate two, DDR2 is the second generation
of DDR memory that was released in September 2003. DDR2 can operate at
more incredible speeds than DDR, offers a tremendous bandwidth potential,
operates on less power, and generates less heat. Due to architectural
differences, DDR2 memory modules are incompatible with DDR slots.
107
memory chips can only be installed on a motherboard that supports DDR4
memory and is not backward compatible with DDR3 memory slots.
The above types of memory all fall into the general categories of SIMM or DIMM.
SIMM
Short for the single
in-line memory module,
SIMM is a memory module
developed by Wang
Laboratories in 1983. The
SIMM circuit board that
holds six to nine memory
chips per board. The ninth chip usually an error checking chip (parity or non-parity).
The SIMM was used with computers using a 486, early Intel Pentium, and
compatible processors. However, because the Pentium is 64-bit and a SIMM is only
32-bits wide, they must be installed two at a time to work correctly. Above is a
graphic illustration of a 4 MB SIMM and a diagram pointing out the essential features
of a SIMM. DIMMs replaced the SIMM.
DIMM
108
SO-DIMM, which is short for small outline dual in-line memory module, is
available in both a 72-pin and 144-pin configuration. SO-DIMMs are commonly
utilized in laptop computers.
1. DIMMs have separate contacts on each side of the board, which provides
twice as much data as a single SIMM.
2. The command address and control signals are buffered on the DIMMs. With
heavy memory requirements, this buffering reduces the loading effort of the
memory. When referring to memory, a buffer is a temporary storage in the
memory that stores information while processing other information.
Note: Online buffering happens while streaming music and videos before they
play. Buffering allows you to watch or listen to media almost instantly by
downloading a small portion and then playing the file while the remainder downloads.
RAMs are important factor in the buffering of data inside a computer system.
109
If your Internet connection is fast enough, you should only buffer for a few
seconds when you first start playing the media and never buffer again. If your
computer or device frequently buffers, your connection is not fast enough, or there's
a problem with your connection or the streaming provider. One of the solutions to
increase buffering is to increase the size of the system memory or the Random
Access Memory (RAM).
Let us reflect…
Data transformation, to some is a phenomenon, especially when it comes to
the aspect of electrical, electronic and data conversion and communication. To some
scientist, it can be a body of knowledge of science wherein it can be harness for the
benefit of mankind. To the programmer and ICT individual, it can be a vast area of
material that can be a source of many useful tools and everyday helper for humanity.
How about you, as a student, how do you see the vastness of data and
information transformation as a powerful tool in the computer world? Can you see
the unlimited potential of the art of data transformation that can change many lives?
Reflect on these things…it will be an avatar of your technology skills in the coming
years.
110
How much have you learned?
POST-TEST FOR LESSON 3
Name:__________________________________________ Score:_________
Course/Year/Section:______________________________ Date:__________
Professor/Instructor:_______________________________
6. The CPU‘s instructions for carrying out commands are built into the
__________.
7. More ___________ makes the computer faster.
111
Lesson 1 Final Requirement:
Direction: Using the Internet, research on the following and write in your own words
(minimum of 500 words) a synthesis of the topics below.
a. Determine the different CPU Architectures of modern computers.
b. What are the factors affecting the processing speed?
c. What is the significance of Data Science to data and information processing?
Suggested Readings:
Books/Journals:
o ―Computer Data and Information‖. https://media.lanecc.edu/ users/
loftl/CS275/ ch01.pdf
o ―Computer - Data and Information‖. https://www.tutorialspoint.com
/computer_fundamentals/computer_data.htm
o Data Science for Dummies by Lillian Pierson, 2 nd Edition
o Introduction to Algorithms, 3rd Edition by By Thomas H. Cormen,
Charles E. Leiserson, Ronald L. Rivest, Clifford Stein
o Big Data – Special Issue on Visualization on Data Science by Maryann
Liebert, Volume 6, 2014, ISSN 2147-4441
o International Journal of Business Intelligence and Data Mining
o Lecture 1:The Information Processing Approach to Intelligence.
https://link.springer.com/chapter/10.1007/978-94-009-4406-0_6
o Data and Information Research Works and Articles, Academia.edu
Websites
o ―Information Processing‖. https://sites.google.com/a/campioncollege
.com/it_eveningschoool/inform
o ―Information processing‖. https://www.britannica.com/technology/
information-processing
o ―Examples of Data Processing‖. https://simplicable.com/new/data-
processing
112
o ―DATA PROCESSING‖. https://peda.net/kenya/css/subjects/computer-
studies/form-three/driac2/data-processing
o ―Information Processing by Science Direct Journals and Books‖.
https://www.sciencedirect.com/ topics/computer-science/information-
processing
o ―Data and Information Processing‖. https://planningtank.com/computer-
applications/information-processing-cycle/searchAI
o ―Data and Information Research Works and Articles, Academia.edu‖.
https://www.academia.edu/search?utf8=%E2%9C%93&q=data+and+in
formation+processing
113
References:
114
Lesson 4: Storing Data
Duration: 3 Hours per week (Week 4)
INTRODUCTION
115
OBJECTIVES/COMPETENCIES:
Understand more the details and the principles of data storage and its
different technology.
Explain how computers store data and transform it securely to different file
formats.
Understand the advantages and disadvantages of various data storage
devices.
Understand the different terms and technology in reference to data and
information retrieving and storing.
Analyze the different ways a computer store an input data to different
devices.
Understand how cloud storage and data science is beneficial to large data
and information.
Analyze the different processes and techniques in disk optimization.
Computer systems need to store data in digital format. One of the most widely
used types of digital data storage is magnetic storage. Magnetic storage devices
refer to any data storage using a magnetized medium. Digital data consists of binary
information, which is data in the form of zeros and ones. Magnetic storage is a form
of non-volatile storage. There are two types of magnetic polarities, each one used to
represent either zero or one.
Several types of magnetized media are used in computer systems, including
magnetic tape, floppy disks, and hard disk drives. The basic approach to
magnetic data storage, however, is very similar to the different types of media. A
read-write head moves very close to the magnetic surface - the distance is often no
more than tens of nanometers. The head can detect and modify the magnetization of
the material. The magnetic surface is divided into tiny regions, each of which has a
mostly uniform magnetization. As the head moves relative to the body, the changes
in magnetization from area to region are detected and recorded as zeros and ones.
Different technologies vary in how the head moves relative to the surface of the
media and how the areas on the media are organized, but the basic principle is the
same.
Magnetic storage is widely used because it is relatively cheap in comparison
with other storage technologies. Magnetic storage is read-write, which makes it
possible to reuse the storage capacity over and over again by deleting older data.
The storage capacity is also huge, making it attractive for storing vast amounts of
data. The major limitation of magnetic storage is that accessing the data can be
relatively slow. As a result, most computer systems use magnetic storage media for
non-volatile storage of large amounts of data, typically in the form of a hard-disk
drive. But a different type of storage for system memory, such as read-only memory
(RAM), which is much smaller but can be accessed much faster.
118
4.2.1.1 Types of Magnetized Media that are Used in Computer Systems
Magnetic tape
Floppy disks
Hard disk drives
Magnetic Tape 9
Magnetic tape is one of the older
types of magnetic storage media. The
magnetic tape recorder was invented in
1928 and was primarily used for analog
audio recordings. Before music CDs
were introduced in the 1980s, portable
music devices used magnetic tape in
the form of music cassettes. Early
computers adapted this technology to
store digital information. One of the
major weaknesses is that information
on tape can only be accessed in a very
sequential fashion. This is fine if you
A magnetic tape device, courtesy of IBM
want to listen to a whole music album Corporation
in sequence, but computer systems
typically need to access data in a non-sequential manner. For magnetic tape, this
means you may need to fast forward through a lot of tapes to get to a specific piece
of data. While magnetic tape is a very cheap way to store data, the very slow access
to the data meant that it was primarily used for creating backups of data in case
older forms of storage failed. Tape backup systems are still in use today, but their
importance has dramatically declined with the advance of cheap, large capacity
hard-disk drives.
119
10
Floppy Disks
Also known as a diskette, floppy, or FD, the
floppy disk is another type of storage medium that
uses magnetic storage technology to store
information. Floppy disks were once a standard
storage device for computers and lasted from the
mid-1970s to the start of the 21st century. The
earliest floppies were 8-inch (203 mm) in size, but
these were replaced by 5-1⁄4-inch (133 mm) disk drives, and finally a 3 1⁄2 inch (90
mm) version. Almost every PC used to have a floppy disc drive. These are obsolete
now, having been replaced by higher capacity technology such as CD-ROMs, DVDs,
and USB memory sticks.
CD, DVD, and Blu-ray drives are optical storage devices. Binary data is stored
as changes to the texture of the disc‘s surface, sometimes thought of as
microscopic pits and bumps. These ‗bumps‘ are located on a continuous spiral
track, starting at the center of the disc. While the disc is rotating at a constant
speed, a laser is pointed at the spiral path of ‗bumps‘. The laser will
reflect/bounce off the disc surface in different directions depending upon whether
a 1 or 0 has been read.
Disc Capacities
In the pursuit of larger optical storage capacities, DVDs were created,
followed by Blu-Ray.
121
CD DVD Blu-Ray
CD/DVD
Despite being the same physical size, a
DVD can hold more data than a CD. To achieve this, a more tightly packed spiral
track is used to store the data on the disc. To accurately access the smaller
‗bumps‘, a more delicate red laser is used in a DVD drive than that found in a
standard CD drive. To increase capacity further, DVDs are also capable of dual
layering.
What is DVD-RAM?
DVD-RAM is an optical media storage device. It differs from a traditional DVD
in that data is stored in concentric tracks (like an HDD), which allows read and
write operations to be carried out at the same time. This means, for example, that
when used in a personal video recorder, you can record one television program
while watching a recording of another. This allows handy features such as ‗time
slip‘ to be possible. When used within a CCTV system, you could review footage
while still recording your cameras. The capacity of DVD-RAM is 4.7 GB or 9.4 GB
for double-sided discs.
122
Benefits of DVD-RAM
Read and write at the same time
Can be rewritten to many more times than a traditional DVD-RW
Has write-protect tabs to prevent accidental deletion when used in an
optional cartridge
Data is retained for an estimated 30 years. This long life is excellent for
archiving data
Reliable writing of discs because the verification is done by the hardware,
not by software
Drawbacks of DVD-RAM
Disc speeds higher than 5x are less
common
Less compatibility than DVD-RW
Blu-Ray
Blu-Ray technology squashes even more data into the same size disc as a
CD or DVD. The spiral data tracks on a Blu-Ray disc are so small a special blue
(violet) laser has to be used to read the ‗bumps.‘ As a DVD, Blu-Ray discs are
capable of storing data on multiple layers.
123
4.2.3 - Flash memory devices12
Alternatively referred to as flash
storage, flash memory is non-volatile
computer memory. It was first invented
by Fujio Masuoka in the early 1980s
while at Toshiba and introduced it to the
market in 1984. It was also later
developed by Intel. Flash memory is an
integrated circuit that does not need
continuous power to retain data but is a bit more expensive than magnetic storage.
Today, flash memory is prevalent, and solid-state drives are a practical replacement
for large hard drives if you have the extra money.
Flash memory is widely used with car radios, cell phones, digital cameras,
PDAs, solid-state drives, tablets, and printers. The picture above is an example of a
MicroSD flash memory card.
NAND flash is a type of flash memory based on the NAND logic gate.
NOR flash is a type of flash memory based on the NOR logic gate.
3D NAND Flash and 3D NOR Flash are flash memory technologies that layer
memory cells on top of each other in a stacked planar configuration. They
offer persistent, modular storage at speeds comparable to RAM.
124
and reliable than optical media, being smaller, faster, and possessing much greater
storage capacity and being more durable due to a lack of moving parts.
Flash is a non-volatile solid-state storage device that uses NAND flash memories
to store data (millions of transistors). USB refers to the USB connection that allows
users to plug the device into the USB port of a computer. Other types of flash
storage include the memory cards used in digital cameras. Flash memory comes in a
variety of capacities to suit most budgets and requirements.
Typical Applications for Flash Memory
USB memory sticks – saving and transferring documents, etc.
Memory cards in digital cameras
125
3. Solid State Drive (SSD)
significantly more expensive. This expense means that typical capacities are usually
measured in Gigabytes (GB). They can be installed inside a computer or purchased
in a portable (external) format. Until we reach a point where large capacities SSDs
are affordable, a compromise is to run two disk drives inside a computer. An SSD as
the primary drive for your important programs and operating system and a traditional
HDD to store music, documents, and pictures, which don‘t need faster access times.
The lack of moving parts in an SSD makes it very robust and reliable, ideal for a
portable device.
127
To view time-critical data and images immediately while away from the
main office or location.
To store offsite backups of data
128
2. Relatively Secure for the Average User
You‘ll notice I‘m phrasing this section carefully. Everybody knows that nothing
online is 100% secure. Still, for the typical average user who is backing up vacation
photos and what-not, someone who isn‘t a specific target of hackers, then cloud
storage can be considered safe and secure as long as you‘re following general best-
practices to keep your computer and passwords safe.
Relative to setting up your webserver to store things yourself, or keeping the files
on any network-connected drive in your home, it stands to reason that billion-dollar
internet infrastructure companies will have better data-protection than you or me. Of
course, they‘re higher profile and more prone to being attacked, too, but they also
have geniuses working around the clock to keep your data safe and have software
monitoring capabilities.
3. Ease of Use
Compared to running your own off-site data backup scheme, the cloud is
super easy to use. Drag over the files you want to backup, and that‘s it. Most
providers will automatically sync any changes that you make instantly, but you can
also turn this off if you‘d like to take a slightly more manual approach. In any case, in
terms of pure ease of use, the cloud is by far the winner, no matter how you slice it.
The simplicity of dragging a file into a folder and instantly having an off-site
backup that you can access from any of your devices is unparalleled.
129
Cloud storage is either billed on a pay-per-use basis or divided into tiers, so
you can get started for next to nothing until your storage needs grow, and then the
price will increase accordingly. It makes it very easy to predict your backup
expenses, compared to managing all of this yourself, buying drives, replacing them
as they fail, etc.
Most cloud storage companies offer some type of a free plan, too, so you can
take them for a test-drive first. Even if you settle on one that doesn‘t, the monthly
fees are likely low enough that you can try out multiple options before deciding on
something.
6. Ease to Scale
When you run out of storage space, you don‘t need to rush out and order new
drives or anything of the sort. Simply upgrade your plan, and you‘ll have more space
available to you instantly.
Cons of Cloud Storage
It‘s not all sunshine and rainbows. There are some downsides to cloud
storage that are worth keeping in mind. In most cases, these won‘t matter, so that‘s a
plus, but if any of these are deal-breakers for you, you‘ll be glad you found out about
them now instead of later.
130
You‘re relying on someone else to run the data center, and you‘re trusting that
they‘re doing that correctly. We‘re usually talking about huge-scale operations here,
so it‘s not typically a concern. Still, it‘s not a plus (except for the fact that they handle
all aspects of maintaining a data center, securing it, having backup generators in
case the electricity cuts out, and all of the things you might not think about).
4. Vendor Lock-in
It‘s not always easy to move from one provider to another if your cloud needs
change down the road, and this is especially true when you have a ton of space.
Let‘s say that you have 10 Tb of files stored in your cloud account, and you want to
move to a new cloud storage company. Rather than just transfer it from one to the
other, you‘ll need to download these files yourself, first. If you only have a 500 Gb or
1Tb hard drive, this will have to be done a little bit at a time. Many do have cloud
storage migration tools for other providers, especially the most popular options.
131
perforated holes that have been created by hand or machine. The cards were
entered into the computer to enable the storage and accessing of information. This
form of data storage media pretty much disappeared as new and better technologies
was developed.
There are six of the most common methods below. Generally speaking, the best
way to protect data and prevent the loss of it is to back it up in different places.
2. Power Failure
Many electronic devices depend on electricity to function correctly and
maintain data. A loss of power can therefore be disruptive or destructive,
especially in cases where the power loss is sudden. As well as power losses,
power surges can also cause problems.
132
Many modern forms of digital data storage are exposed to the internet.
This means that the data risks being corrupted by malware, either directly or
via broader damage caused to say, the operating system.
4.3.2 – Fourteen (14) Things You Need to Know About Data Storage
Management14
Before you decide where or how you will store your structured and
unstructured data, companies first need to understand the amount and type of data
they have and the motivation behind storing the information. Having this background
will help determine what route to take, whether building on-premise solutions or
moving to the cloud, or some combination of the two. So how do you formulate that
sound data storage management strategy? The below top 14 suggestions, according
to research, regarding what steps you need to take to choose the right data storage
solution(s) for your organization -- and how you can better ensure your data is
protected correctly and retrievable.
5. Look for a solution that fits your data, not the other way around .
Many think the only choice to make is whether they need DAS (Direct-
Attached Storage), a SAN(Storage Area Network), or a NAS (Network-Attached
Storage, these are important choices, but they are insufficient. While a Fibre
134
Channel SAN may be great for doing a lot of low latency read/write operations on a
reasonably structured database, it's not typically designed to do well on spikey
unstructured video workloads. So instead of selecting a one-size-fits-all strategy,
smarter buyers are now considering the workload characteristics and picking the
right storage strategy for the job. Similarly, look for a solution that provides the
flexibility to choose where data is stored: on-premise or in the cloud. The answer
should allow you to leverage existing investments in data platforms such as network
shares and SharePoint.
And if, like many businesses these days, you have a mobile workforce, the
data management and storage solution you choose should be optimized for mobile
and virtual platforms, in addition to desktops and laptops -- and provide a consistent
experience across any platform, including mobile editing capabilities and intuitive
experience across mobile devices, virtual desktops or desktops.
135
archival or backup data. Make sure your systems can utilize different storage tiers,
so as the performance needs of an application change, you don't need to re-architect
it.
136
capacity being more reasonably priced, the tendency is to store everything. The
problem is identifying what is valid and what is dated as well as database
performance. So before storing data, analyze it, and pick your most reliable source,
deleting copies.
13. Make sure you can find the data you need once it's been stored.
Being able to easily search your electronically stored data and provide
accurate results instantly is critical to getting the most out of your data daily and in
urgent situations, such as when your data is needed for litigation. After all, if you
can't find the right information when you need it, what's the point of archiving your
data?
137
It's all about recovery. All the backups in the world cannot save you if you
can't recover [your data]. So whichever method or methods of backup you use, be
sure to test them -- and not just once a year or once a month. Make spontaneous
recoveries each week. Do disaster recovery testing and audit your data pools
periodically, so you can be sure you can recover your data. Maintain at least three
copies of anything you care about in at least two different formats, with at least one
being offsite.
138
The disk transfer rate (sometimes called media rate) is the speed at which
data is transferred to and from the disk media (actual disk platter) and is a function of
the recording frequency. It is generally described in megabytes per second (MBps).
Modern hard disks have an increasing range of disk transfer rates from the inner
diameter to the outer diameter of the disk. This is called a zoned recording
technique. The key media recording parameters relating to density per platter are
Tracks Per Inch (TPI) and Bits Per Inch (BPI). A track is a circular ring around
the disk. TPI is the number of these tracks that can fit in a given area (inch). BPI
defines how many bits can be written onto one inch of a track on a disk surface.
The host transfer rate is the speed at which the host computer can transfer
data across the IDE/EIDE or SCSI to the CPU. It is generally referred to as the data
transfer rate, or DTR, and can be the source of some confusion. Some vendors list
the internal transfer rate, the rate at which the disk moves data from the head to its
internal buffers. Others cite the burst data transfer rate, the maximum transfer rate
the disk can attain under ideal circumstances, and for a short duration. More
important for the real world is the external data transfer rate, or how fast the hard
disk transfers data to a PC‘s main memory.
139
Scanning and defragmentation of hard disks (increases access speeds by
rearranging the files stored on the hard disk. This reduces the time it takes to
read files from and write files to the disk.);
Removal of old backups (deleting old restore points or Windows update files to
free up disk space);
Compression of large files to further free up disk space.
140
A sample window of Disk Defragmenter, courtesy of
Microsoft Corporation
Let us reflect…
Data storage technology is one of promising technology of the future. There it
lays the great foundation of Data Science and Artificial Intelligence. These new
revolution of computing will come to naught without the advancement in data storage
technology.
As a student, your physical brain and memories needs to be enhanced every
day to advance your intelligence. Likewise, data storage undergoes the same
enhancement thru new discoveries of materials that enhanced more the
advancement of data storing and retrieving. As you see the future of data science
and analytics, what do you think is the best area of specialization in ICT that needs
to be focused on? You can research the advancement of data science in relation to
data storage and put your reflection in a minimum of 500 words that explain the
future of utilization of data science and analytics thru data storage technology.
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
141
How much have you learned?
POST-TEST FOR LESSON 1
3. Disk optimization
142
4. Disk fragmentation
C. Give at least 10 ways to protect and manage your data and information.
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
143
Suggested Readings:
Books/Journals:
o Security and Data Storage Aspect in Cloud Computing (Studies in Big
Data) 1st ed. 2019 Edition by Prachi S. Deshpande, Subhash C.
Sharma , and Sateesh K. Peddoju
o Developments in Data Storage: Materials Perspective 1st Edition,
Kindle Edition by S. N. Piramanayagam and Tow C. Chong
o Handbook of Research on Big Data Storage and Visualization
Techniques (Advances in Data Mining and Database Management) 1st
Edition by Richard S. Segall and Jeffrey S. Cook
o Data Storage Networking: Real World Skills for the CompTIA Storage+
Certification and Beyond 1st Edition by Nigel Poulton
o Electronically Stored Information: The Complete Guide to
Management, Understanding, Acquisition, Storage, Search, and
Retrieval, Second Edition 2nd Edition by David R. Matthews
Websites
o ―Software Defining your Storage‖. https://blog.architecting.it/
o ―Enterprise Storage Technology‖ https://www.enterprisestorageforum.
com/
o ―Storage‖. https://www.networkworld.com/category/storage/
o ―Search Storage Technologies‖. https://searchstorage.techtarget.com/
o ―Storage News and Reviews‖. https://www.eweek.com/storage
o ―Data Center Technologies‖. https://www.theregister.com/data_centre/
o ―Data storage: Everything you need to know about emerging
technologies‖. https://www.zdnet.com/article/innovations-in-data-
storage-an-executive-guide-to-emerging-technologies-and-trends/
144
REFERENCES
145
UNIT 02
Operating Systems, Networks and
the Internet
146
Lesson 5: Operating Systems
Duration: 3 Hours per week (Week 5)
INTRODUCTION
The most important program running on a computer is the operating system
(OS). Any general-purpose computer must have an operating system to run other
software and programs. Computer operating systems performs simple task such as
identifying keyboard inputs, sending data to the display screen, monitoring files and
directives on hard drives, and controlling peripherals.
An operating system is a program that performs all critical task such as file
management, memory management, process management, input and output
handling, and controlling peripheral devices such as disk drives and printers.
There are operating systems from the very first generation of computers and
they tend to develop over time. These are the most widely used important types of
operating systems.
147
OBJECTIVES/COMPETENCIES:
148
Lesson 5.1 – WHAT IS AN OPERATING SYSTEM?
149
There is an operating system from the very first generation of computers, and
they tend to develop over time. These are the most widely used essential types of
operating systems.
1. Bach operating system
2. Multitasking/Time-sharing operating system
3. Multiprocessing Operating System
4. Distributed operating system
5. Network Operating system
6. Real-Time Operating System
7. Mobile Operating System
Below are the weaknesses or the problem encountered with the batch operating
system.
Lack of user contact with the task and need to master most of the tasks of the
operating system.
CPU is often idle, as mechanical I/O devices are slower than the CPU
Hard to give desired priority to other programs
It is hard to debug programs in batch operating systems.
It is sometime costly.
150
5.1.2 – What is Multitasking/Time-sharing in Operating Systems?
Distributed systems are those machines that use multiple central processors
to support numerous programs and various users in real-time. Information
processing jobs are accordingly distributed among the processors. The processors
communicate with each other through different lines of communication (such as high-
speed buses or telephone lines). Those are called as loosely coupled systems or
distributed systems. The size and role of the processors within a distributed system
can vary. Such processors are referred to as web pages, servers, machines, etc.
With resource sharing system, the user at one location can be able to use the
available resources at another.
Speed up the exchange of data through electronic mail.
When one location fails in a distributed network, the remaining sites can
theoretically continue to function.
Enhanced services to the client
Load reduction on a host computer.
Elimination of the data processing delays.
A network operating system operates on a server and gives the server the
ability to handle data, users, groups, protection, applications, and other networking
functions. The network operating system‘s primary function is to allow shared file and
printer access between multiple computers in a network, usually a local area network
(LAN), a private network, or other networks.
152
Network Operating System:
Advantages Disadvantages
Very Reliable Centralized Servers. Massive procurement and server
The server handles privacy operation costs.
Innovative technologies and For most activities-reliance on
Hardware enhancements can be the central location
easily incorporated into the Needs daily maintenance and
program. upgrades
Various locations and types of
system is possible to access to
servers
The table above shows the advantages and disadvantages of network OS.
153
2. Soft real-time systems
Soft real-time systems are less restrictive. A vital activity in real-time takes
precedence over other tasks and holds the priority until it is complete. Soft real-time
systems have limited usefulness compared to rigid real-time systems. Examples are
multimedia, virtual reality and Innovative Research Ventures such as underwater
discovery, planetary rovers, etc.
5.1.7 - Mobile OS
Mobile operating systems are those
operating systems that are mainly designed
to power devices such as smartphones,
tablets, and wearable. Android and iOS are
some of the most common mobile operating
systems, but others include BlackBerry, Web,
and watchOS.
154
5.2.1 - Memory Management
Memory management refers to the management of Primary Memory or
Central Memory management. Main memory is a broad array of words or bytes with
every word or byte having their address. Main memory provides fast storage, which
can be directly accessed by the CPU. To execute a program, it must be in the main
memory. An operating system performs the following memory management tasks:
155
De-allocates devices.
Keeps track of data, location, uses, status, etc. The combined services are
sometimes referred to as file systems.
Decides who gets the resources.
Allocates the resources.
De-allocates the resources.
Job accounting - Keep track of the time and resources used by numerous
jobs and users.
157
A logical address space is called the set of all logical addresses created by a
program. The set of all physical addresses that correspond to these logical
addresses is called physical address space.
When loading, the absolute program (and data) is loaded into memory with
static loading so that execution can begin.
If you use dynamic loading, the dynamic library routines are stored in a re-
locatable form on a disk and are loaded into memory only when the program
requires them.
5.3.3 - Swapping
Swapping is a method in which a process may be temporarily switched to a
secondary storage (disk) from the main memory (or moved) and made available to
other processes. The machine swaps the operation back from the secondary storage
to the main memory at some later stage.
Although performance is typically affected by the process of swapping, it
helps to run several and large processes in parallel, and that is why swapping is
Memory compaction
technique or swapping
method of an operating
system
158
often known as a memory compaction technique.
The cumulative time taken by the process of switching includes the time it
takes to transfer the whole process to a secondary disk and then to copy the process
back to memory, as well as the time it takes to regain the main memory.
The operating system uses the following methods for allocating the memory:
a. Single-partition allocation
Relocation-register scheme is used in this form of allocation to secure user
processes from each other, and from changing operating system code and data.
Relocation register contains the lowest physical address value, while limit register
contains a number of logical addresses. Each of logical address must be less
than the limit register.
b. Split-partition allocation
In this form of allocation, the main memory is split into a number of partitions
of fixed size, where each partition should contain only one process. A process is
selected from the input queue when a partition is free, and loaded into the free
partition. The partition becomes available for another process once the process
terminates.
5.3.6 - Fragmentation
The free memory space is divided into little bits as processes are loaded and
removed from memory. It occurs after processes can't be assigned to memory
159
blocks often despite their limited size, and memory blocks stay unused. This problem
is called fragmentation. There are two forms of fragmentation- internal and external
fragmentation.
External fragmentation
Total memory space is adequate to fulfil a request or exist in a process,
but is not continuous, so it cannot be used.
Internal fragmentation
Memory block assigned to process is bigger. Any portion of memory is
left unused, as other method cannot access it.
The diagram below illustrates how fragmentation can cause memory waste
and how a compaction technique can be used to generate more free memory from
fragmented memory.
External fragmentation can be reduced to put all free memory in one wide
block by compacting or shuffling memory contents together. Relocation should be
dynamic to make compaction possible.
160
The internal fragmentation can be reduced by successfully assigning the
smallest partition but large enough for the process.
5.3.7 - Paging
A computer can address more memory than the physically installed amount
on the system. Actually, this extra memory is called virtual memory and it is a part of
a hard drive set up to replicate the RAM of the device. Paging technique plays an
important part in virtual memory implementation.
161
Page Address Translation
Page address is called logical address and represented by page number and
the offset.
A data structure called a page map table is used to keep track of the relation in
physical memory between a page of a process and a frame.
162
When a frame is allocated to any page by the system, it converts this logical
address into a physical address and generates an entry in the page table to be used
during program execution.
When executing a process its corresponding pages will be loaded into any
available memory frames. Suppose you have an 8Kb program, but at a given point in
time your memory can handle only 5Kb, then the paging principle will come into the
picture. The operating system (OS) can transfer unused or unnecessary memory
pages to secondary memory when a machine runs out of RAM, to free up RAM for
other processes and carry them back when the program needs them.
5.3.8 - Segmentation
A segment of the program includes the key function of the program, utility
functions, data structures etc. The operating system maintains a segment map
table for each process, along with segment numbers, their size and corresponding
memory locations in the main memory, and a list of free memory blocks. The table
stores segment starting address and segment length for each segment. A memory
location reference includes a value which identifies both a segment and an offset.
Segmentation using a map table between the processor and main memory
164
Lesson 5.4 - Common Operating System
In the late 1950s, operating systems were first built to handle tape storage.
The General Motors Research Lab introduced the first OS for their IBM 701 in
the early 1950s.
In the mid-1960s, operating systems began using the disks.
The first version of the Unix OS had been created in the late 1960s.
Microsoft's first built OS was DOS. It was founded in 1981 when a Seattle
company purchased the 86-DOS program.
First came into existence in 1985, when a GUI was developed and combined
with MS-DOS, the current standard Windows OS.
Microsoft Windows, macOS, and Linux are the three most popular operating
systems for personal computers. Current operating systems are using a graphical
user interface, called GUI (gooey pronounced). A GUI allows you to use your mouse
to select icons, buttons, and menus, and with a mixture of graphics and text, it will be
clearly shown on the screen.
Windows
165
Linux OS
Linux is an operating system that is similar to Windows, iOS, and Mac OS. In
reality, the Linux operating system drives one of the planet's most popular platforms,
Android. An operating system is a software that controls all of your desktop or
laptop's hardware resources. The OS handles the communication between your
software and your hardware to put it clearly. The program does not work without the
Operating System (OS).
macOS
Apple’s iOS
Apple's iOS is another mobile operating system that is primarily used for
iPhones and iPads, some of the market's most common mobile devices. iOS began
version 1 and went up numerically for every update (1.1, 1.2, 2.0, etc.).
Let us reflect…
166
Operating System is the ―middleman‖ between man and computer. Man can
only utilize and optimize the power of the hardware if the OS of that hardware gives
a better performance as platform to run other computer programs.
As a student, how can you develop your knowledge base and skills about the
operating system? Do you think in five or ten years‘ time, you can design and create
your own operating system to suit whatever interaction requires between your
computer system and particular user intention. Can you establish a desire and vision
of that future of yours as an IT professional? Reflect and focus on that mind-set.
Direction: Identify and write your correct answer on the blank before the number.
____________ 1. users aren‘t directly interacting with the computer
____________ 2. are those operating systems that are particularly designed to
power devices such as smartphones, tablets, and wearable.
____________ 3. The most important program running on a computer.
____________ 4. operates on a server and gives the server the ability to handle
data, users, groups, protection, applications, and other networking functions.
____________ 5. Keeps tracking of primary memory, that is, which part of it is used
by whom, which part is not in use.
____________ 6. manages the communication with devices through their respective
drivers.
____________ 7. is a strategy that allows several users to use a single computer
device located at various terminals simultaneously.
____________ 8. also refers to the ability of a system to run more than one
processor in a single computer system.
____________ 9. is defined as a data processing system where the time interval
required for processing and responding to inputs is so small that the environment is
controlled.
167
____________ 10. use multiple central processors to support multiple programs and
multiple users in real time.
____________ 11. is a method in which a process may be temporarily switched to a
secondary storage (disk) from the main memory (or moved) and made available to
other processes.
____________ 12. is a memory management method in which process address
space is divided into blocks of the same size
____________ 13. The operating system maintains a _______for each process,
along with segment numbers, their size and corresponding memory locations in the
main memory, and a list of free memory blocks.
____________ 14. is a technique of memory management where each job is split
into many segments of different sizes, one for each module that includes parts
performing similar functions.
____________ 15. Memory management is the operating system feature that
handles or controls primary memory and transfers processes back and forth during
execution between main memory and disk.
Write a research article (not less than 500 words) on the following topics that
will be submitted in a week time.
Suggested Readings:
Books/Journals:
o Create Your Own Operating System 1st Edition by Mr Lucus S Darnell
o Modern Operating Systems 4th Edition by Andrew Tanenbaum
o Operating Systems Design and Implementation 3rd Edition by Andrew
Tanenbaum and Albert Woodhull
o Operating System Concepts 9th Edition by Abraham Silberschatz
168
o Operating Systems: Principles and Practice 2nd Edition by Thomas
Anderson and Michael Dahlin
o ―EOS: Enterprise Operating Systems‖. Rahme, J., Gregory, Y., Chen,
D., 2017. University of Bordeaux, Bordeaux, France, International
Journal of Production Research
o Operating Systems, Steven Hand, Michaelmas Term 2015
Websites:
o ―The 10 Operating System Concepts Software Developers Need to
Remember‖, https://medium.com/cracking-the-data-science-
interview/the-10-operating-system-concepts-software-developers-
need-to-remember-480d0734d710Wired.com
o ―Trends and Issues of Windows Operating System‖. Blogs.window.com
o ―Operating Systems Tutorials and Courses‖. https://hackr.io/tutorials/
learn-operating-systems
o ―Introduction to Operating Systems‖. www.udacity.com
o ―Hack The Kernel‖. www.ops-class.org
o ―Operating Systems Introduction‖. www.w3schools.in
o ―Operating Systems Tutorial‖. www.geeksforgeeks.org
o ―Fundamentals of Algorithms‖. www.geeksforgeeks.org
169
REFERENCES
170
Lesson 6: Networking Basics
Duration: 3 Hours per week (Week 6)
INTRODUCTION
A network is essentially a set of devices and end systems that are
interconnected and able to communicate with one another. It is possibly computers,
servers, tablets, routers etc. that were interfaced and interconnected to each other.
This computer interconnection facilitates the exchange of information between them.
A network might be as big as the internet, or as small as your two home file sharing
computers and a printer.
A collection of computerized peripherals such as printers and interconnected
computers is called a computer network. This interconnection between computers
allows the exchange of data between computers. Computers can be linked by either
wired or wireless media.
OBJECTIVES/COMPETENCIES:
171
A pre-test of your computer networks knowledge…
172
Lesson 6.1 – Computer Network
Computer networks have been essential for both individuals and organizations.
Some of its primary use includes:
173
E-commerce: Computer network is also essential for enterprises. Most
businesses today are being done over the internet. Amazon.com, Shopee,
Lazada, for example, does its business over the internet, i.e., they do their
business over the internet. Due to the pandemic it struck the world, and people
are now pushed to do their business over the internet.
We all use applications daily but we can classify them into three separate groups
if we look at them from a network-minded view:
Batch Applications
o File transfers like FTP, TFTP, perhaps an HTTP download. It could be
a backup at night.
o No direct human interaction.
o High bandwidth is necessary but not critical.
Interactive Applications
o Human-to-Human interaction
o Someone is waiting for a response, so response time (delay) is
essential.
Real-Time Applications
o Also Human-to-Human interaction
o VoIP (Voice over IP) or live video conferencing.
o End-to-end delay is critical.
174
In general, the classification of networks is based on their geographical range. A
network that spans the entire geographical globe can be as small as the distance
between your cell phone and its Bluetooth headset, and as big as the internet itself.
175
The LAN offers a convenient way for
end-users to share the network. Computers
can conveniently share resources such as
printers, file servers, scanners, and the
internet.
The LANs are made up of cheap
networking and routing equipment. They that
contain local servers that serve file storage
and other applications were shared locally. It operates mainly on private IP
addresses and does not require heavy routing. LAN works within its local jurisdiction
and is centrally regulated.
Either Ethernet or Token-ring technology is used in LAN. Ethernet is LAN
technology most commonly used and uses Star topology, although Token-ring is
seldom used. LAN can be wired at once, wirelessly, or in both ways. A complete
wireless LAN is called Wireless LAN or WLAN.
176
hardware and software, thereby reducing infrastructure costs. MAN can be created
by connecting multiple LANs.
MAN's backbone is high-capacity and high-speed optics for fiber and interacts
with the Local Area Network and Wide Area Network. MAN provides the uplink to
WANs or the internet for LANs.
177
Lesson 6.3 - Network Topologies
178
6.3.2 - Ring Topology
All computers and network
devices are linked to each other through
a cable, and the last two devices are
connected to form a "loop." If your
network breaks down, your line is down.
There's also a "dual-ring" redundancy
system, which is just another cable to
make sure you don't go down if one
cable splits the network.
When a terminal is required to
send data, it transmits it to the neighbouring node that transmits it to the next. Data
can be amplified before further transmission. Data ravers the network in this way and
enters the destination node, which eliminates it from the system. If the data arrive at
the sender, it will delete the data and then resend it. Below is a table that shows the
advantages and disadvantages of ring topology.
Advantages Disadvantages
Small segments of cables are Single node failure takes down the
required to connect two nodes whole network
Ideal for optical fibers, since data Troubleshooting is difficult, since
moves in one direction only many nodes may need to be
checked before finding a defective
one
Possible very high transmission Deleting one or more nodes is
rates intricate while maintaining the rest
of the network intact
179
6.3.3 - Star Topology
All our computers (end devices)
are connected to a central device that
creates a star model. Nowadays, we use
this on local area networks (LAN) with a
switch in the middle. The typical physical
connections we use are UTP
(Unshielded Twisted Pair) cable. Of
course, your network is down when your
system goes down as well.
Through star topology, the server
is independently connected to each of the nodes. Even the central node is called the
server. Any data exchange between two nodes shall take place via the server. It is
the most common topology for information and voice networks as the central node,
before sending it to the destination node, can process data obtained from the source
node. Advantages and disadvantages of star topology is shown in the table below:
Advantages Disadvantages
One node failure doesn't affect You need long cables to link
the network every node to the server
Troubleshooting is simple Central node failure brings down
because defective nodes can the entire network
be automatically identified from
the central node
The central node is always
simple to access protocols
that are needed as one of the
communicating nodes
180
6.3.4 - Tree Topology
Tree topology has a group of star networks linked to a Backbone linear bus
cable. It combines features of topologies both for stars and buses. Often called
hierarchical topology is a topology of trees.
1. Full Mesh
All hosts are connected point-to-point to every single host on the network. So
n(n-1)/2 connections are needed for each new host. It provides the most stable
181
network structure of all topologies of networks. Multiple links between the sites
are required, and each router needs additional interfaces.
2. Partially Mesh
Not every host has a point-to-point connection to each other. Hosts bind in
some random way. There is this topology where we have to give some hosts
reliability out of all.
Every connection in the topology of the daisy chain represents a single fault
point. Each failed connection divides the network into two parts. Each intermediate
host functions as a relay for its immediate hosts.
1. Guided − In guided media, data travel is transmitted via a fixed path through
the cabling system. Copper wires, fiber optic wires, for example.
2. Unguided − In unguided media, the transmitted data travels in the form of an
electromagnetic signal across free space. For example, radio waves, lasers,
etc.
In terms of bandwidth, speed, delay, cost per bit, ease of installation and
maintenance, etc., each transmission media has its advantages and disadvantages.
183
An image of a twisted pair cable
In a protective covering, up to 25 twisted pairs are fitted together to form
twisted pair cables, which are the backbone of telephone systems and Ethernet
networks. Twisted pair cables are the world's oldest and most popular wiring. That is
because of the many benefits they offer. A table of advantages and disadvantages of
twisted pair cable is shown below:
Advantages Disadvantages
Educated workers easily Without repeaters, the signal cannot
accessible due to the shallow travel long distances
learning curve
Can be used for both digital and The high error rate for distances of
analog transmissions over 100 meters
Cheapest for short distances Very thin, and thus easily breaks
If a part of the network is Not suitable for broadband
damaged, the entire network will connectivity
not go down
184
second wire is wrapped over the sheath, which is also surrounded in turn by the
sheath of the insulator. The cable is covered with plastic coating.
Copper wires in telephone lines, internet networking, and even cable TV links
are increasingly replaced by optical fiber because transmitted data can travel long
distances without weakening. Single node optic fiber cable can have a 2 km
maximum segment length and up to 100 Mbps bandwidth. Multi-node fiber optic
cable can have up to 100 km of full segment length and up to 2 Gbps of bandwidth.
186
Advantages of Optical Fiber Disadvantage of Optical Fiber
Bandwidth is strong Optical fiber cables are expensive
Immune to electromagnetic Sophisticated technology needed for
blockage the manufacture, installation, and
maintenance of fiber optical cables
Suitable for manufacturing and Light waves are unidirectional,
noisy environments meaning that the full-duplex
Signals that carry data can go transmission needs two frequencies
long distances without weakening
187
Infrared wave lies between the spectrum of visible light and the microwaves. It
has wavelengths between 700 nm and 1 mm, and frequency ranges between
300GHz and 430THz.
Infrared wave is used for communication purposes with very short range, like
television and its remote. Infrared travels in a straight line and is thus directional by
nature. Infrared cannot cross wall-like barriers because of its high-frequency
spectrum.
188
Lasers are unable to penetrate barriers, such as walls, rain, and dense fog.
Also, the laser beam is bent by the wind, temperature of the atmosphere, or change
in the path's temperature.
A laser is secure for data transmission because tap 1 mm broad laser without
interrupting the communication channel is tough.
189
Lesson 6.5 - Network Devices
6.5.1 - Modem
A modem is a device that allows a computer to send or receive data over
cable or telephone lines. The data stored on the computer is digital, whereas only
analog data can be transmitted through a telephone line or cable wire.
The modem's primary function is to convert digital signals to analog, and vice
versa. A modem is a blend of two − modulator and demodulator devices. The
modulator transforms digital data into analog data when the computer sends out the
data. When received by the computer, the demodulator converts analog data signals
into digital data.
190
6.5.2 - Types of Modem
The modem can be categorized in many ways, such as the direction in which
it can transmit data, type of transmission line connection, mode of transmission, etc.
The modem may be of these forms, depending on the direction of the data
transmission:
Simplex − A simplex modem can transfer data from the digital device to the
network (modulator) or network to the digital device (demodulator) in just one
direction.
Half-duplex − A semi-duplex modem can transmit data in both directions but
only one at a time.
Full-duplex − A full-duplex modem can transfer data simultaneously in both
directions.
191
outside the system and had to be manually installed. It is an internal hardware
component within modern computer systems. The NIC has an RJ45 socket with
physically plugged in a network cable.
Ethernet Card
The speed of the Ethernet card may vary depending on the protocols which it
supports. Old Ethernet cards had 10 Mbps max speed. Modern cards, however,
support fast Ethernets up to 100 Mbps speed. Some cards even have 1 Gbps of
capacity.
6.5.5 - Router
A router is a hardware device in the
network layer which transmits data from one
LAN to another if both networks support the
same set of protocol. But usually, a router is
connected to at least two LANs and the
internet service provider (ISP). It receives its
data in packet form, which are data frames
with their added destination address. The
router also strengthens signals before they are
transmitted, which is why it's called a repeater,
192
too.
A router is a type of device that acts as a central point between computers
and other devices that are part of the network. It's built with holes called ports.
Computers and other computers are connected to a router using a network cable.
Now-a-day, the router is available in a wireless mode that allows computers to be
linked without any physical line.
Routing Table
A router reads the routing table to determine the best possible path the packet
will take to quickly and reliably reach its destination. Such two forms can include the
routing table:
1. Static − The routes are fed manually inside a static routing table. It is also
only suitable for minimal networks with approximately two to three routers.
2. Dynamic − The router communicates with other routers through protocols in
an active routing table to decide which routes are free. This is suitable for
wider networks where, due to a large number of routers, manual feeding may
not be feasible.
6.5.6 - Switch
A switch is a network
device that connects other devices
through twisted-pair cables to the
Ethernet networks. It uses the
technique of packet switching to
receive, store, and forward data
packets over the network. The
switch keeps a list of network
addresses of all devices that are
connected to it. It checks the destination address on receiving a packet and
transmits the packet to the appropriate port. The packets are tested for collision and
other network errors before they are forwarded. The data is delivered in full-duplex
mode.
193
The speed of data transmission in switches can be double that of other
network equipment, such as hubs used to network. This is because the switch
shares its full speed with all connected devices. This helps preserve network speed
even during heavy traffic conditions. Also, with the use of multiple switches, more
excellent data rates are achieved on networks.
6.5.7 - Gateway
A gateway is a network device used to link two or more networks of a
different system. Networks that use other protocols are dissimilar in networking
parlance. Typically a gateway is a device that has multiple NICs connected to
various networks. You can also fully configure a gateway using the software. As
networks link via gateways to another network, these gateways are typically network
hosts or endpoints.
Gateway uses the technique of packet switching to transfer data from one
network to another. Thus it is similar to a router; the main difference is that router
can only transfer data over networks using the same protocol.
194
6.5.8 - Wi-Fi Card
The acronym for wireless fidelity is Wi-Fi. Wi-Fi technology is used for
connecting wirelessly to any network. Wi-Fi card is a card used for wireless
connection of any user to a local network. Wi-Fi hotspot is called the physical area of
the system which provides internet access through Wi-Fi. Hotspots can be mounted
at home, at the workplace, or in any public place. Hotspots are linked to the network
by cables themselves.
195
networks that are connected. Upon arrival of a data packet, the router checks the
destination address, consults its routing tables to determine the best route and then
moves the packet along that route. (Moumita, 2020)
196
Wireless Router − they have WiFi link devices such as smartphones, laptops
etc. Normal Ethernet routing can also be supported by them. The range is 150
feet for indoor connections, while it is 300 feet for outdoor connections.
Broadband routers − they are used for telephone connectivity to the Internet
and the use of voice over Internet Protocol (VoIP) technology to provide high-
speed Internet access. The Internet Service Provider (ISP) configures and
delivers it.
Core Routers − Data packets can be routed within a given network, but they
cannot route the packets between networks. They help to connect all devices
within a network, thus forming the network's backbone. It is used for
communication interfaces and ISPs.
Edge Routers −They are low-capacity routers positioned at the periphery of
the networks. They link the internal network to external networks, and are
suitable for network-wide transmission of data packets. For connectivity, they
use the Border Gateway Protocol (BGP). There are two types of edge routers,
edge routers for subscribers and routers for labels.
Brouters − Brouters are specialized routers which can also provide bridge
features. Brouters help to transfer data between networks, much like a bridge.
And they route the data within network devices like a router.
197
has its own servers and hard disk, less PCs would therefore need the network
cabling system.
3. Reliability: Routers provide reliability. The router services and other
networks would not be affected if one network goes down when the server
has stopped, or there is a cable defect. The affected network is separated by
the routers, while the unaffected networks remain connected without
interrupting the work and losing any data.
4. Networking Range: A cable is used to connect devices in the networking
phase, but its length cannot exceed 1000 meters. A router can overcome this
limitation by performing a repeater (Regenerate Signals) feature. As long as a
router is installed before the full cable range exceeds, the physical range can
be according to the requirement of a specific installation. (javatpoint, What is
Router - javatpoint n.d.)
Let us reflect…
A world without computer networks is like a mute world. And a world without
networking devices and equipment is like a paralysed world. No one can move and
communicate from one place to another. It is a fact and truth especially in today‘s
tech-savvy world. The advent of internet, social media, e-commerce, world news and
politics, distant family relationship and communication, and many other things are
not possible without the computer networks.
As a student, how does the above affects you? How do your IT vision, if there
is, geared in the area of technology of networks? Can you put in a written document
what‘s on your mind regarding of what you want to pursue in the specialization of
computer networks? Just do it, document your thoughts of what you see in the future
of networks.
198
How much have you learned?
POST-TEST FOR LESSON 6
199
__________ 11. Specialized routers which can also provide bridge features. It help
to transfer data between networks, much like a bridge.
__________ 12. They are used for telephone connectivity to the Internet and the use
of voice over Internet Protocol (VoIP) technology to provide high-
speed Internet access.
__________ 13. They are low-capacity routers positioned at the periphery of the
networks. They link the internal network to external networks, and
are suitable for network-wide transmission of data packets.
True or False.
__________ 14. Network Range. It increases efficiency within the same network. For
example, if a network has 14 workstations, and all produce roughly
the same traffic volume.
__________ 15. The router services and other networks would not be affected if one
network goes down when the server has stopped, or there is a
cable defect.
Write a research article (not less than 500 words) on the following topics that
will be submitted in a week time.
200
Suggested Readings:
Books/Journals:
o Computer Networking: A Top-Down Approach (6th Edition) byJames
Kurose and Keith Ross. (2019)
o Network Warrior (2nd Edition) by Gary A. Donahue
o Networking All-in-One For Dummies Paperback – April 10, 2018 by
Doug Lowe
o Cisco Networking All-in-One For Dummies 1st Edition by Edward Tetz
o CompTIA Network+ Certification All-in-One Exam Guide, Seventh
Edition (Exam N10-007) 7th Edition by Mike Meyers
o Network Programmability and Automation: Skills for the Next-
Generation Network Engineer 1st Edition by Jason Edelman
o ―IEEE Guide to Communications and Computer Networks‖,
http://www.guide2research.com/journals/network-communication
Websites:
o ―Computer Networking Tutorials‖. http://www.coursera.org/
o ―Networks and Computing‖. http://ocw.mit.edu/index.htm
o ―Networking Basics: 3 Steps to Sharpen Your Networking Skills and
Advance Your Career‖, https://www.newhorizons.com/article/
networking-basics-3-steps-to-sharpen-your-networking-skills-and-
advance-your-career
o ―Networking Tutorials‖, www.Lynda.com
o ―Mastering Computer Networks‖, www.udemy.com
o ―Networks‖, www.edx.org
o ―Computer Networks‖, www.futurelearn.com
o ―How to Network‖, https://study.com/search/text/academy.html?
q=network#/topresults/network
o ―Introduction to Networking‖, https://www.free-online-training-
courses.com/networking/
o ―All About the Networks‖, https://networklessons.com/?s=network
201
REFERENCES
3 Networking Basics: What You Need To Know. (2020, March 02). Retrieved
September 08, 2020, from https://www.cisco.com/c/en/us/solutions/small-
business/resource-center/networking/networking-basics.html
202
Lesson 7: Data Communications
Duration: 3 Hours per week (Week 7)
INTRODUCTION
Data communication refers to the transmission of this digital data between two
or more computers, and a computer network or data network is a network of
telecommunications which allows computers to exchange data. Physical
communication is formed between networked computing devices using either cable
media or wireless media. The Internet is the most well-known computer network.
Data communication is the exchange of data between two devices through some
type of transmission medium, like a wire cable. The transmitting devices must be
part of a communication system consisting of a mixture of hardware (physical
equipment) and software (programs) for the data communication to occur.
The device that transmits the data is known as the source and the receiver is
known as the device that collects the transmitted data. Data communication aims at
transferring data and maintaining data throughout the process, but not the actual
generation of the information at the source and receiver. (Thakur, 2020)
OBJECTIVES/COMPETENCIES:
Explain what the goals of communication software are.
Analyze how computers and networks communicate to each other using the
principle and technology of data communication.
Understand the different types of communication processes over the
telephone network.
Understand the different physical and wireless communication devices
Understand what is Satellite Communication and the underlying principles i=n
it.
203
A pre-test of your data communication knowledge…
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
204
Lesson 7.1 - Difference between Computer Network and
Data Communication
Computer Network:
A computer network is a set of computer systems and other hardware
computing devices that are connected via communication channels. A Computer
Network allows network-wide file sharing. It helps to navigate the site details faster
and more conveniently. It will enable remote systems to share the applications and
operating systems. Computer networks are based on the Networking area.
Data Communication:
We share information when we communicate. This sharing may be local or
remote. Local communication usually occurs face to face between individuals, while
remote communication takes place over a distance.
Both analog and digital data can be transferred mainly through these two
processes. Analog data is continuous, while digital information is discreet.
205
Protocol: It is a set of rules regulating inter device communication. Sender
and receiver both obey the same protocols in order to communicate with one
another.
The first modems were "dial-up," which means that we need to dial a phone
number to connect the ISP to the device. Its overall transmission rate of data is
approximately 56 kbps. Modern modems are modems for DSL or cable. Compared
with dial-up modems, they have a high data transfer rate and a broader frequency
range.
206
Advantages of using Modem:
A modem is more useful when connecting LAN to the internet.
Modem speed depends on cost, the more the modem is costly, and the
modem is more efficient and powerful.
A modem is most often used in roadway data communication.
A modem translates the digital signals to analog signals.
An integral
part of computer
communications is
the telephone
network. Data,
instructions, and
information are
transmitted via
dial-up lines or
dedicated lines over the telephone network. The following sections discuss dial-up
lines and the different types of dedicated lines that use the telephone network to
communicate data.
207
Lesson 7.2 - Telephone Network Communication Lines
7.2.1 - Dial-Up
A dial-up line is a temporary connection, using one or more analog
communications telephone lines. There is no permanent dial uplink. It's similar to
using the telephone to make a call using a dial-up line to send data. A modem at the
receiving end dials a modem's telephone number at the receiving end. When the
modem answers the call at the receiving end, a connection is formed, and data can
be passed on. Communications end when either modem hangs up.
Computers provide an Internet or a network connection at any two locations
using modems and the telephone network.
7.2.4 – DSL/ADSL
DSL is a standard alternate digital line for the small business or home
consumer. DSL (Digital Subscriber Line) transmits to existing analog copper
telephone wiring at fast speeds. Some DSL installations include a dial tone which
allows users to communicate both voice and data.
ADSL is one of the most common DSL-types. ADSL (asymmetric digital
subscriber line) is a form of DSL which supports faster transfer rates when data is
received (downstream rate) than when data is sent (upstream rate). ADSL is suitable
for Internet connectivity because most users download more information than they
upload from the Internet.
7.2.5 - FTTP
FTTP, which stands for Fiber to the Premises, uses fiber optic cable to
provide ultra-high-speed Internet connectivity to a permanent physical location for a
client. Two different FTTP forms are FTTH (Fiber to the Home) and FTTB (Building
Fiber). With FTTP service, the signals are received by an optical terminal at your
premises and transmitted to a router connected to your computer. As the cost of fiber
construction decreases, this high-speed Internet connection is gradually being opted
for by more households and businesses.
209
backbone using a T1 backbone. Home and small business users buy fractional T1,
in which they share a link with other users on the T1 line. Fractional T1 is slower
than a dedicated T1 line but less expensive as well.
7.2.7 - ATM
ATM (Asynchronous Transfer Mode) is a service providing too high-speed
voice, data, video, and multimedia. ATM is used by mobile networks, the Internet,
and other high-traffic networks. Some experts predict that ATM will eventually
become the Internet data transmission standard, replacing the T3 lines.
210
Last January 2020, Mt. Taal Volcano in the Philippines erupted and to some
other parts of the world. Typhoon season has come and gone and here we are once
again during the season. Then covid-19 hit the world with the same year.
Every individual with a family cannot deny the fact that we get worry in times
like these. Each phone hasn't stopped ringing for an update everywhere whether it‘s
personal or coming from social media. There the significance of satellite
communication comes in as Telcos needs to upgrade their satellite to several areas
of the country for easy communication with our love ones.
Data services for mobile satellite services that offered by the Telcos for
people are the opportunity to remain connected when disasters hit. In order to
implement their disaster recovery plans, everybody needs to have contact and price
is no longer a problem. The main issues are availability, willingness to produce, non-
jammed customer service lines and awareness of how to use the product.
Quite simply, satellite radio is a non-terrestrial microwave transmission
system which uses a space relay station. In expanding the scope of voice, data, and
video communications across the globe and into the most remote regions of the
world, satellites have proved invaluable. (Thakur, 2020)
211
number of orbital slots available for satellite positioning. Generally speaking, to
eliminate interference from neighbouring satellites using overlapping frequencies,
geostationary satellites are located about 2° apart.
Depending on the height of the earth at which the satellites are located, they
can be listed as:
• Geostationary Satellites (GEO).
• Medium Earth Orbit Satellites (MEO).
• Low Earth Orbit Satellites (LEO).
212
Let us reflect…
Data communication, as they say, is ―married‖ to networks. A network is
useless if it is not optimize to the technology of data communication. The focus of
data communication is to share and achieve errorless information between the users
and computers. The perception of a perfect or almost perfect communication is
currently achievable in today‘s technology. Its advancement brought benefits to the
world.
Being students of ICT, how do you see the reshaping of cultures and
practices, not only in the Philippines but the whole world? In this pandemic era, how
do you perceive the current and future importance of data communication technology
in the lives of humans? You can pen and document your insights regarding the
subject matter at least in minimum 500 words of thought based on the above
reflections.
Direction: Identify and fill in the blanks with the correct answers.
213
__________ 4. It is a temporary connection, using one or more analog
communications telephone lines
___________ 5. It is a service providing extremely high-speed voice, data, video,
and multimedia.
__________ 6. It is a form of always-on connection between two communications
devices (as opposed to a dial-up line where the connection is reestablished every
time it is used).
__________ 7.It is a common alternate digital line for the small business or home
consumer.
__________ 8. It is one of many types of wireless long-distance telephone lines that
carry several signals over a single line of communication
__________ 9. Present-time modems can transmit data at _______ bps (bits per
second) speeds.
__________ 10. What is the first modem that was invented by mankind?
True or False
214
Lesson 7 Final Requirements:
Write a research article (not less than 500 words) on the following topics that
will be submitted in a week time.
How does data communication helps the medical world to fight the COVID-19
pandemic?
How data communications can helps the Philippine industry in the area of supply
chain?
Suggested Readings:
Books/Journals:
o Computer Networking: A Top-Down Approach (6th Edition) byJames
Kurose and Keith Ross. (2019)
o Data Communication and Networks: An Engineering Approach, (2000)
Authors: Harle, D. A., and Irvine, J. I., ISBN:978-0-471-80872-5, Can
be retrieved from: https://dl.acm.org/doi/book/10.5555/557469
o Data and computer communications (2nd ed.)January 1988 by William
Haj Stallings, Macmillan Publishing Co., Inc.Div. of Simon and Schuster
201 W. 103 St. Indianapolis, INUnited States, ISBN:978-0-02-415451-4
o Data Communications and Networking, January 1, 2013 by Forouzan
o Cisco Networking All-in-One For Dummies 1st Edition by Edward Tetz
o ―IEEE Guide to Communications and Computer Networks‖,
http://www.guide2research.com/journals/network-communication
Websites:
o ―Data Communication‖. https://www.studymode.com/essays/Data-
Communication-917250.html
o ―Networking Basics: 3 Steps to Sharpen Your Networking Skills and
Advance Your Career‖, https://www.newhorizons.com/article/
215
networking-basics-3-steps-to-sharpen-your-networking-skills-and-
advance-your-career
o ―Data Communication Tutorials‖, www.Lynda.com
o ―Mastering Computer Networks‖, www.udemy.com
o Data Communication and Networks‖, www.edx.org
o ―Computer Networks‖, www.futurelearn.com
o ―Data Communications and Network Services‖,
https://www.classcentral.com/course/data-communication-network-
services-9160
REFERENCES:
2 Slana, M., & Lehman, H. (1981). Tutorial Series 8 Data Communication Using
the Telecommunication Network. Computer, 14(5), 73-88. DOI:10.1109/c-
m.1981.220455
216
6 ―What is Linux?‖, (n.d.) Retrieved September 08, 2020, from
https://www.linux.com/what-is-linux/
217
Lesson 8: Presenting the Internet
Duration: 3 Hours per week (Week 8)
INTRODUCTION
Getting to the Web through smart gadgets isn't fair a matter of unplugging our
portable workstations, be that as it may – we utilize smartphones and tablets with a
run of highlights and sensors not accessible or required in a conventional computer.
These enable us to require and share recordings; learn exchanges and make strides
in our works; offer assistance with our wellness and individual security; and
contribute to endless other activities. These unused highlights are gotten to through
apps, not browsers, which is advancing how individuals utilize the Web.
This module‘s lessons are valuable not only for the basics of internet and its
technology, but to prepare the learner to engage and dive deep to the wide and vast
knowledge of the web. May your sense of technological especialty be enhanced as
you see the pool of competitive talents in the era of the Internet.
218
OBJECTIVES/COMPETENCIES:
220
Lesson 8.1 - Evolution of the Internet
The Web has its origins in a networking program initiated by the U.S. Agency
for Advanced Research Projects (ARPA), a Pentagon organization. The purpose of
ARPA was to create a network that (1) allowed scientists to exchange data and work
together on military and science projects at various physical locations, and (2) could
operate even if part of the network was disrupted or destroyed by a catastrophe like
a nuclear attack. In September 1969, the network, called ARPANET, became
interactive, linking scientific and academic researchers across the United States. The
original ARPANET consisted of four main computers, one each located at the
University of California at Los Angeles, the University of California at Santa Barbara,
the Stanford Research Institute, and the University of Utah. (Shelly & Vermaat, 2008)
Each of those computers served as a network host. A host, now more widely known
as a server, is any device that offers services and connections to other networked
computers. Hosts often use high-speed communications to transmit messages and
data over a network.
ARPANET experienced phenomenal growth as researchers and others
realized the primary advantage of using ARPANET for data and information
exchange. ARPANET had linked up more than 1,000 computer systems as hosts by
1984. Over 550 million hosts directly access the Internet.
To take advantage of its high-speed communications, some organizations
linked entire networks with ARPANET. In 1986, ARPANET was connected by the
National Science Foundation ( NSF) to its massive network of five supercomputer
centers, called NSFnet.
NSFnet managed the majority of the Internet networking operation, or traffic,
until 1995. NSFnet ended its network over the Internet in 1995 and regained its role
as a research network.
The Internet today is composed of several local, regional, national, and
international networks. Numerous businesses, trading firms, and other organizations
such as IBM have Internet traffic management networks. Public and private
221
organizations both own Internet networks. Such networks, along with
telecommunications companies like Verizon and AT&T, cable and satellite providers,
and the government, all contribute to the internet framework.
Every Internet organization has the sole responsibility for maintaining its
network. No single person, company, organization, or government agency controls
or governs the Internet. However, the World Wide Web Consortium ( W3C) oversees
the work and sets standards and guidelines for other Internet areas. The W3C's
mission is to help make the Web grow. Over 350 organizations from around the
world are W3C members, advice, define standards, and address other issues.
8.1.1 - Internet 2
Many homes and small business users connect via high-speed broadband
internet. Your computer or mobile device typically connects to the Internet with
wireless internet access the entire time it is turned on. Examples of broadband
Internet access include cable, DSL, fiber, radio, and satellite signals.
Cable Internet service offers high-speed Internet access through a cable modem
over the cable television network.
DSL (digital subscriber line) uses standard copper telephone lines to provide
high-speed Internet connections.
222
Fiber to the Premises (FTTP) uses fiber-optic cable to provide home and
business users with high-speed Internet connectivity.
Fixed wireless provides high-speed Internet access to your house or company
using a dish-shaped antenna for communicating with a tower positioning over radio
signals.
A cellular radio network offers high-speed Internet connections to compatible
devices or computers with wireless modems.
A Wi-Fi (wireless fidelity) the network uses radio signals to provide compatible or
properly equipped wireless computers and devices with high-speed Internet
connections
Satellite Internet service provides high-speed satellite Internet connections to a
satellite dish which communicates with a satellite modem.
Staff and students usually link their devices to the internet through a network of
organizations or schools. The business or school network connects to a high-speed
broadband Internet service. Many home users set up a Wi-Fi network, which sends
signals to a communications device that is connected to a high-speed Internet
service such as cable or DSL. However, rather than using the broadband access
service, some computer users link to the Internet by dial-up connectivity, which is a
slower-speed system.
Many hotels and airports provide passengers with wired or wireless Internet
connections. Wireless Internet systems, such as Wi-Fi networks, enable mobile
people to connect to the Internet with laptop computers, smartphones instantly, and
other mobile devices while away from a telephone, cable, or other wired connection.
Thoughts to ponder:
223
Lesson 8.2 - Introduction to TCP/ IP
The Domain Name System ( DNS) is the mechanism used by the Internet to
store domain names and their related IP addresses. A DNS server converts the
domain name to its corresponding IP address when you assign a domain name so
that data and information can be redirected to the appropriate device.
One of the key reasons for purchasing computers for business, home, and
other users is Internet access. The Internet is a widely used research tool that
provides access to global knowledge and instant communications for society. Also,
Internet access can occur anywhere from a device at any time: at home, at work, at
school, in a restaurant, in an airplane, and a park.
The Internet, also known as the Net, is a global networking system that links
millions of companies, government agencies, educational institutions, and
individuals. Each of the internet networks provides resources that add to the
abundance of Internet-accessible goods, services, and information. In 2019, the
number of internet users worldwide was 4.13 billion, and business users worldwide
now access a variety of internet services. (Clement, 2020)
224
The World Wide Web, or simply the Internet, and e-mail are two of the
Internet services most commonly used. Other services are chat rooms, instant
messaging, and VoIP (Internet Protocol voice). To enhance your understanding of
these Internet services, the chapter starts by explaining the Internet context and how
the Internet functions, and then discusses each of these services.
Although many people use the terms World Wide Web and Internet
interchangeably, the World Wide Web is a service of the Internet. While the Internet
was developed in the late 1960s, the World Wide Web emerged in the early 1990s.
Since then, it has grown phenomenally to become one of the more widely used
Internet services. (Shelly, Vermaat, Quasney, Sebok, & Freund, 2010)
The World Wide Web ( WWW), or online, is a series of online documents from
around the world. That Internet-based electronic document is called a Web page,
which may include text, graphics animation, audio, and video. Web pages also
generally have built-in connections to other documents.
Many Web pages are (fixed) static; others are dynamic (changing). Visitors to
a static Web page see the same material for all. In comparison, with an active Web
page, visitors can customize any or all of the viewed content such as preferred stock
prices, a region's environment, or flight ticket availability.
A Website is a list of linked Web pages and related objects, such as
documents and images, that are stored on a Web server. A Web server is a
computer that provides your computer with the requested Web pages. The same
Web Server can manage many websites. Some industry experts use the term Web
2.0 to refer to Web sites that provide users with the means to share personal
information (such as social networking Web sites). It enables users to change the
content of the website and have device features installed on the website for use by
visitors (such as e-mail and word processing programs).
The most commonly used personal computer Web browsers are Internet
Explorer, Firefox, Opera, Safari, and Google Chrome. You start a Web browser with
an Internet connection created. The browser retrieves and displays a Web page that
begins, also called the home page of the user. The initial home page shown is one
225
picked by your Web browser. You can change your browser's homepage at any
given time.
226
which then shows the Web page on the screen. Most users are making bookmarks
for their regularly visited Web pages to save time.
A bookmark, or favorite, is a saved Web address that you can reach by
clicking a list of its name. That is, you can select a previously saved bookmark,
instead of entering a Web address to view a Web page. You submit or pull
information from a Web server when joining a Web address in a browser. Many Web
servers will also send content to your computer at regular intervals or when updates
to the web are made. For example, some web servers can view current sporting
event scores on your computer screen or weather forecasts.
227
folder tab) for each Web page you open. (Shelly & Vermaat, 2011) You click on the
tab in the Web browser to switch from one open Web page to another. Tabbed
browsing enables users to have several home pages that will open automatically
when the tab begins. You can also arrange tabs in a group, called a tab party, and
save the party as your favorite so you can view all tabs at once. As some websites
seek to monitor your browsing habits or collect personal details, some popular web
browsers have a feature that allows you to disable and/or regulate the distribution of
your browsing habits and personal information more closely.
The Web is a worldwide resource of information. The main reason people use
the Web is to look for specific content, like text, images, music, and video. The first
phase in a successful search is to define the essential idea or concept within the
topic you are looking for information about. Search Engines and topic directories are
two variety of research platforms.
Search Engines helps locate information for which you do not know an exact
Web address or are not seeking a particular Web site. Thousands of search engines
are available.
1. Portal
A portal is a Web site that offers a variety of Internet services from a single,
convenient location. Most portals offer free assistance such as search engines,
headlines; sporting events and climate; digital art; reference tools such as yellow
pages, quotations and locations; entertainment; and e-mail, and other
communications. Many portals have online communities.
229
2. Online Community
An online community is a web site that deals with a specific group of people
with common interests or ties. Such groups will provide online photo galleries, chat
3. News
A news website contains headline news content, which includes stories and
articles about current events, life, economy, sports, and the weather. Newspapers
and radio and television stations are some of the media that maintain Web sites for
230
news.
4. Informational
A website that offers information on reality. Most government departments in
the United States have information portals that contain information such as census
results, tax codes, and the budget of the Congress. Many organizations, such as
public transport schedules, provide information, and report research results.
5. Business/Marketing
A business/marketing Web site contains content that promotes or sells
products or services. Nearly every enterprise has a business/marketing Web site.
231
6. Blog
A blog, Weblog, in short, is an informal website consisting of time-stamped
documents or messages, in a diary or journal format, usually in reverse chronological
order. A blog featuring video clips is called a video blog, or vlog.
A microblog allows users to post short messages for others to read, usually
between 100 and 200 characters. Twitter is an incredibly common microblog. The
term blogosphere refers to the collection of blogs around the world, and the
vlogosphere refers to all vlogs around the globe. Blogs represent the author's
interests, views, and personalities, called the blogger or vlogger (for vlog author),
and sometimes visitors to the site. Blogs are an essential way of connecting across
the globe. Businesses create blogs to communicate with workers, clients, and
vendors. Teachers create forums for other teachers and students to collaborate with.
Home users create blogs with family, friends, and others to share facets of their
personal lives.
232
7. Wiki
A wiki is a shared website that allows users to create, add, change, or remove
content from the website via their Web browser. Several wikis are open to general
public modification. Usually, wikis collect recent edits on a Web page to allow
someone to check them for accuracy. The difference between a blog and a wiki is
that users can't change the blogger's first posts.
233
9. A media sharing Website
A website for media sharing is a particular form of online social network that
allows users to share media, including images, songs, and videos. Flickr, Fotki, and
Webshots are famous communities for photo sharing; PixelFish and YouTube are
popular communities for video sharing.
10. Educational
An educational Web site offers exciting, challenging avenues for formal and
informal teaching and learning (Figure 2-15h). You can learn how aircraft travel on
the Internet, or how to prepare a meal. Industries give staff online instruction for a
more organized learning experience, and universities provide online courses and
degrees. Instructors also use the Internet to enhance teaching in the classroom by
posting content, ratings, and other important class information about the course.
234
11. Entertainment
A Web site for entertainment offers an interactive and engaging environment.
Art, videos, sports, games, ongoing web episodes, sweepstakes, chat rooms, and
more are popular entertainment websites.
12. Advocacy
A website for advocacy provides material that explains a cause, viewpoint, or
idea. Typically these websites express views of a specific organization or
association.
235
13. Web Application
A Web application, or Web app, is a website that enables users to access and
communicate with apps on any Internet-connected computer or device via a web
browser. Many Web apps provide free access to their applications. Others give part
of their software free and charge for accessing more advanced functionality or when
requesting a specific action.
236
15. Personal
Typically, a private individual or family not affiliated with any entity may
maintain a personal website or a single website. For many purposes, people publish
personal Web sites. Others are in the work search. Some also want to share their life
experiences with the world.
238
particular subject. As you type into your keyboard, the computer screen displays a
line of characters and symbols. Those linked to the same server in the chat room
always see what you wrote. Some chat rooms allow voice chats and video chats,
where people listen to each other or see each other chatting.
8.6.4 - VoIP
VoIP, also called Internet Telephony (Voice over IP, or Internet Protocol),
allows users to communicate with other users over the Internet. That is, VoIP uses
the Internet to link a calling party to one or more local or long-distance parties
(instead of the public switched telephone network). You need a high-speed Internet
connection (such as a DSL or cable modem) to place an Internet telephone call. An
Internet telephone service, a microphone or telephone line, depending on the
Internet telephone service, and Internet telephone software or a VoIP router, or a
telephone adapter, depending on the Internet telephone services. VoIP services are
also available on some mobile devices which have wireless Internet service. Calls to
other parties with the same Internet telephone service are often free, while calls
connecting to the telephone network usually cost from $15 to $35 a month.
239
When you are speaking in a microphone connected to your computer, or a
telephone connected to the VoIP router, or telephone adapter, the Wireless
telephone program and the sound card of the device or the VoIP router or telephone
adapter, it transforms your spoken words (analog signals) to digital signals. It then
relays the digitized audio over the Wireless to the parties called. Software and
equipment at the receiving end reverse the process so that the receiving parties can
hear what you have said.
8.6.5 - FTP
FTP ( File Transfer Protocol) is an Internet protocol that enables uploading
and sharing of files over the Internet with other computers. Uploading is the opposite
of downloading; in other words, uploading is the process of transferring documents,
graphics, and other objects from your computer to an Internet server.
6.7.1 - E-Commerce
E-commerce, short for e-commerce, is a commercial activity happening over
an electronic network like the Internet. Anyone who has access to a computer or
240
mobile device, an Internet connection, and a means of paying for goods or services
purchased may participate in e-commerce. Many people use the term m-commerce
(mobile trade) to describe e-commerce using mobile devices.
Consumers' common e-commerce uses include shopping, banking, traveling,
entertainment, and health. Users can buy just about any product or service on the
Web, including grocery stores, flowers, books, computers, music, movies, cars,
airline tickets, and tickets to concerts. They can also pay bills, invest in stocks, make
reservations for flights, book a hotel or car, and fill out prescriptions.
A customer visits an online business via an electronic marketplace containing
product details, photos, and a shopping cart. The shopping cart helps consumers to
pick up orders. The customer enters personal data and the payment method when
they can complete the transaction, which will be over a secure internet connection.
E-commerce, short for online shopping, happens when companies use the Internet
to sell goods.
Let us reflect…
―Can you live without the Internet?‖ That is a question true to many especially
to technology inclined people. But almost of the humanity depends entirely on the
241
internet. Nowadays because of the dependence, or shall we say over depence to the
Internet by many people, technology is now embedded to humanity.
As you can see on the lesson, i.e., the 15 types of Internet sites, the Internet
was made part of everyone‘s lives. And as part of our everyday living, we need to
regulate that technology in order not to control our lives by the Internet.
As a learner, how can you do that especially you, as an IT student, make
yourself not controlled by that technology? Can you reflect on the things of how you
can utilize the Internet without controlling our lives and be addicted to the contents it
offer? You can write your thoughts in a 500 words expressing how do you interact
with the internet.
_____ 2. DSL provides high-speed Internet connections through the cable television
network.
_____ 3. In general, the first portion of each IP address identifies the network, and
the last portion identifies the specific computer.
_____ 4. A Web 2.0 Web site can never allow users to modify Web site content.
_____ 5. A Web page has a unique address, called a URL or Web address.
242
_____ 6. Hypertext combines text-based links with graphic, audio, and video links.
_____ 7. The major disadvantage with a subject directory is that users have difficulty
deciding which categories to choose as they work through the menus of links
presented.
_____ 8. Most social networking Web sites include chat rooms, newsgroups, and
other communications services.
_____ 9. Streaming disallows users from accessing and using a file while it is
transmitting.
Jesue, the HR officer of a company, wants to email the payslip of all the
employees to their corresponding email address. What method would you
recommend Jesue to use? Explain your answer.
During crisis time, the barangay captain of Longos, Malolos, wants his fellow
citizen to be updated with what is happening in the town. What would you
recommend the barangay captain to use? Why?
Rochelle wants to publish some of her baking techniques, but she doesn't wish to
anybody editing her online articles. What is suitable for Rochelle to use? Explain
your answers.
Suggested Readings:
Books/Journals:
Wikipedia:Books, https://en.wikipedia.org/wiki/Wikipedia:Books
243
Sams Teach Yourself Internet and Web Basics All in One Paperback –
May 31, 2003 by Ned Snell
Computer Fundamentals & Internet Basics, January 1, 2010 by Rohit
Khurana
The Big Basics Book of the Internet Subsequent Edition by Joseph W.
Habraken
The World of Internet Marketing: The Basics: Online Brand Building, Social
Media, and Website Design, Volume 1-1st Edition, by Jonathan Edward
Goodman
Because Internet: Understanding the New Rules of Language By Gretchen
McCulloch
Level Made Simple: IT Tools & Network Basics (M1-R5) by Prof. Satish
Jain, and M. Geetha Iyer
Websites:
244
REFERENCES:
Clement, J. (2020, January 07). Number of internet users worldwide. Retrieved
August 29, 2020, from https://www.statista.com/statistics/273018/number-of-internet-
users-worldwide/
Shelly, G. B., & Vermaat, M. (2008). Discovering computers 2009: Brief. Australia:
Course Technology.
Shelly, G. B., & Vermaat, M. (2011). Discovering computers 2012: Living in a digital
world: Complete. Mason, OH: Cengage Learning.
Shelly, G. B., Vermaat, M. E., Quasney, J. J., Sebok, S. L., & Freund, S. M. (2010).
Discovering computers 2010: Living in a digital world: Complete. Boston, MA:
Course Technology, Cengage Learning.
245
UNIT 03
Application Software, Programming
and Database Concepts
246
Lesson 9: Working With Application Software
Duration: 3 Hours per week (Week 10)
INTRODUCTION
OBJECTIVES/COMPETENCIES:
247
A pre-test of your application software knowledge…
Direction:
Write TRUE if the statement is correct and FALSE if it is not.
248
Lesson 9.1 – Application Software
250
processing, table, database, presentation, note-taking, personal information
manager, mobile business software, business software packages, project
management, accounting, document management, and business computing
software.
Spreadsheet Software
Spreadsheet software is another commonly used type of software program.
Computer Spreadsheet helps users to create information in rows and columns and
enable rapid calculations. These joint rows and columns are dubbed a worksheet.
Before, people used paper to organize data and perform calculations by hand. You
arrange data in the same way in an electronic worksheet, and the computer does the
computations faster and more accurately. Due to the logical method of data
management through spreadsheet software, many people use this software to
arrange and display non-financial data/financial data. Most spreadsheet software has
basic features, including word processing software, to help users build, modify, and
format worksheets. Spreadsheet software also incorporates many of the features
found in word processing software such as macros, checking to spell, changing fonts
and font sizes, adding colors, tracking changes, inserting audio and video clips,
analysis skills, identification of handwritten text and sketches, and development of
Web pages from existing spreadsheet documents.
Presentation software
Presentation software is application software that allows users to build visual
demonstration aids to convey ideas, updates, and other information to a community.
251
The presentations may be viewed as slides that are shown on a large monitor or a
screen, also called a slide show. Display software usually offers a range of
predefined display formats that describe the context, text, and graphical accents on
the slides as complementary colors. This software also comes with a range of
templates.
253
color-correct images, straighten images, remove or rearrange objects in a picture,
and apply filters. (Shelly, Vermaat, Quasney, Sebok, & Freund, 2010)
Communication software
This software is used to offer remote device access and to share files and
information between different hosts or users in text, audio, and/or video formats.
This includes terminal emulators, data transfer programs, chat and text messaging
applications, as well as MUDs-integrated related features. Often, the term refers to
software running a bulletin board system, but rarely to those running a computer
system or sharing of Stored Program Power.
255
Lesson 9.5 - Internet Software
Outlook Express was a mail and news client included with versions 4.0
through 6.0 of Internet Explorer. Outlook Express is distinct from the Microsoft
Outlook program. The two systems do not share a similar codebase but do share a
used to transfer data files over a TCP-based network from one host to
another, such as the Internet.
256
FTP is designed on a client-server architecture and uses separate client-
server control and data connections. TP users can verify themselves using a clear-
text sign-in protocol, usually in the form of a username and password. Still, they can
securely connect if the server is
configured to allow this. FTP is also
encrypted with SSL / TLS (FTPS) for
secure transmission that controls the
username and password and encrypts
the content. The SSH File Transfer
Protocol (SFTP) is also often but is
distinct from technology.
Facebook Messenger
MSN Messenger
257
9.5.3 - Chat Software
258
Popular Video Conferencing
Skype
Google Meet
Zoom
259
Dribble ware: Software with so many changes and patches.
Let us reflect…
Application software, as we can see in our lesson, is really important because
we cannot use our computers, gadget and machine hardware to do the particular
tasks we use it for today. We can try to imagine what kind of life we are living if no
software that will help us performs our daily tasks.
But actually, the true question is, what can we do if we didn't use computers at
all? Our PC will be practically useless without application software. In reality, any
program we use to complete a particular task needed application software.
260
How much have you learned?
POST-TEST FOR LESSON 9
2) Business Software
3) Word Processing
4) Spreadsheets
5) Presentation
6) Desktop Publishing
Write a research article (not less than 500 words) on the following topics that
will be submitted in a week time.
Suggested Readings:
Books/Journals:
o Application Software Tutorial by Keiko Pitter
o Clean Architecture: A Craftsman's Guide to Software Structure and
Design by Robert C. "Uncle Bob" Martin
o The Art of Computer Programming by Donald Knuth
261
o Introduction to Algorithms by Thomas H. Cormen, Charles E.
Leiserson, Ronald L. Rivest, and Clifford Stein
o Head First Design Patterns: A Brain-Friendly Guide by Eric Freeman,
Elizabeth Robson, Kathy Sierra, and Bert Bales
o Peopleware: Productive Projects and Teams by Tom DeMarco and
Timothy Lister
o Android Programming: The Big Nerd Ranch Guide, 3rd Edition by Bill
Phillips
Websites:
o ―Computers - Software‖.https://www.tutorialspoint.com/computer_
fundamentals/computer_software.htm ―
o ―Application Software‖. https://study.com/academy/topic/application-
software.html
o ―Basics of Computers - Software Concepts‖. https://www.tutorialspoint.
com/basics_of_computers/basics_of_computers_software_concepts.ht
m
o ―Video Tutorial Software Programs to Create Effective Video Guides‖.
https://www.ispringsolutions.com/blog/video-tutorial-software-programs
o ―Computer Software‖. https://www.tutorialandexample.com/software/
262
REFERENCES
Floridi, L. (ed.) (2004), The Blackwell Guide to the Philosophy of Computing and
Information, Oxford: Blackwell.
Shelly, G. B., & Vermaat, M. (2008). Discovering computers 2009: Brief. Australia:
Course Technology.
Shelly, G. B., & Vermaat, M. (2011). Discovering computers 2012: Living in a digital
world: Complete. Mason, OH: Cengage Learning.
Shelly, G. B., Vermaat, M. E., Quasney, J. J., Sebok, S. L., & Freund, S. M. (2010).
Discovering computers 2010: Living in a digital world: Complete. Boston, MA:
Course Technology, Cengage Learning.
263
Lesson 10: Introduction to Programming
Duration: 6 Hours in two weeks (Week 11-12)
INTRODUCTION
One of the major business globally is computer programming. Computers,
video games, the internet, and even mobile phones would not exist without it. In
computer engineering today, positions are not scarce. Almost everything we use has
to do with technology, and in order to make projects happen, computer programmers
are needed to be creative and productive to achieve many goals.
One of the world's most challenging occupations is computer programming. In
computer programming, someone who quits easily when things get complicated, or
when something doesn't work the way they want it to, will not succeed. It takes a lot
of time and effort for an employer to complete a task without talented programmers.
Today, there is no need for most people to know how a machine operates.
Most people will simply turn on a computer or mobile phone and point, click a button
or swipe a finger or two at any tiny graphical object on the monitor, and the computer
does something. An instance would be to get and view weather information from the
net. What the average person wants to know is how to communicate with a computer
program. But you are more than that person.
As ICT students, you are blessed to know the basics of programming. This
lesson will be a foundation stone as you journey in the digital world. It‘s a choice for
you whether you equip yourself with a needle, or choose a shield partnered with a
double edged sword. As you focused on why you have taken the Information
Technology program, you must sharpen also your future programming skills. A
workman is needed not to be ashamed of what should he ought to be.
264
OBJECTIVES/COMPETENCIES:
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
265
Lesson 10.1 - What is a Computer Program?
266
10.2.1 - Compilers and Interpreters
The computer understands a program only if it is coded in its machine
language. Because the computer can understand only machine language
instructions, programs that are written in a high-level language must be translated
into machine language. Once a program has been written in a high-level language,
the programmer will use a compiler or an interpreter to build the program.
There are generally two types of programming languages: compiled
languages and interpreted languages. A compiler is required to convert a compiled
language-written program into a machine-understood code (that is, binary code)
before you can execute the program on your computer. The binary code can be
saved into an application file when the translation is completed. Unless the program
(source code) is modified and you have to recompile it, you can continue running the
application file without the compiler. The binary code or application file is also called
executable code (or an executable file). Often the binary source or program file is
referred to as executable code.
On the other hand, a program written in an interpreted language can be run
immediately after you finish writing it — or for that matter, while you are writing it. But
such a program still requires an emulator at run-time to translate the high-level
instructions into understandable machine instructions (binary code). You can't run
the program on a computer unless there is the correct interpreter.
However, there is nothing inherent to a compiled language to prevent
someone from providing an interpreter for the language; likewise, people can and
often do write compilers for interpreted languages. It is not common to mix the two
flavors of languages, where a programmer compiles source code into a small binary
file, which is then executed by a run-time interpreter. It is the job of the programmer
to create and check the program. There are four steps in this process:
1. Create the program
2. Compile the program
3. Connect the necessary library resources to the program
4. Run the program.
267
10.2.2 - Five Generations of Programming Languages
268
During software, creation Macros save programmer time. Today, assembly
languages are used mainly to improve the performance of critical tasks or to monitor
hardware.
269
An object is an entity that may include data as well as the procedures that interpret
or modify the data. An object consists of the person, location, event, or transaction.
The ability to reuse and change existing objects is a significant advantage of
OOP. For example, if a program generates an object for the Employee, it can be
used for any other current or future software. So, the developers reuse existing items
frequently.
There are many benefits to programs built using an object-oriented approach.
In several systems, the objects can be repeated, are configured for frequent use,
and stable over time. Furthermore, software developers develop software more
quickly because they design programs using existing objects.
Besides being able to work with objects, an event is driven by an OOP
language. An event is an action that the program's response to. Examples of events
include clicking a key on the keyboard, pressing a button, or speaking an instruction.
An event-driven program checks for and responds to events.
Object-oriented programming languages and program development tools
work well in a RAD environment. RAD (rapid application development) is a
method of developing software, in which a programmer writes and implements a
program in segments instead of waiting until the entire program is completed. Users
continue to work with software parts when they end. In RAD, the use of prebuilt
components is an important principle. For instance, programmers don't have to write
code on Windows forms for buttons and text boxes because they already exist in the
programming language or the software tools provided. Most object-oriented program
development tools are IDEs.
An IDE (integrated development environment) contains graphical user
interface creation tools, an editor, a compiler and/or translator, and a debugger.
Some IDEs work with a single programming language; others, such as Eclipse,
support multiple languages. Eclipse is an open-source, advanced development
environment that works with a variety of programs, including Java and C++.
2 - C++
Developed in the 1980s by Bjarne Stroustrup at Bell Laboratories, C++
(pronounced SEE-plus-plus) is an object-oriented programming language that is an
extension of the C programming language. C++ contains all C language elements as
well as additional features to deal with objects, classes, events, and other object-
oriented concepts. Typically programmers use C++ to build Web and Database
applications. A lot of application software is also written in C++; for example, word
processing and spreadsheet programs. To be an excellent C++ programmer, a
programmer doesn't need C programming experience.
3 - C#
C# (pronounced SEE-sharp)It is a C++-based object-oriented programming
language designed mainly by Anders Hejlsberg, Microsoft chief architect, and
respected engineer. C # was adopted as a default for Web applications and Web
Services based on XML. Web services define structured software that allows
programmers to develop software that interacts through the Internet or on an internal
business channel with other client hosts.
271
4 - F#
F# (pronounced EFF-sharp), which is included with the latest version of Visual
Studio is a programming language that combines the benefits of an object-oriented
language with the benefits of a functional language. A functional language is a
programming language whose natural programming structure is useful in
mathematical programs. Benefits of programs written in F# include easy access to
.NET libraries and performance similar to that of C# programs.
5 - Visual Studio
Visual Studio is Microsoft‘s suite of program development tools that assists
programmers in building programs for Windows, Windows Mobile, or operating
systems that support .NET. Visual Studio provides enhanced help for building safety
and integrity in software through its programming languages, RAD tools, IDE, LINQ
(Language Integrated Query), a customized query language, and other services that
minimize development cycles. Visual Studio, for example, contains code snippets
that are precompiled code and templates associated with different programming
tasks.
6 - Visual Basic
Visual Basic Is a language that helps programmers to construct complex
object-oriented programs easily. Visual Basic is based on the programming language
BASIC, established in the early 1990s by Microsoft Corporation. This language is
easy to use and understand. But for starting programmers, Visual Basic is best.
7 - Visual C++
Visual C++ is a programming language based on C++. Not only is Visual C++
a popular object-oriented programming language, but it also helps developers to
quickly and efficiently develop Windows, Windows Mobile, and .NET applications.
Features that make Visual C++ so powerful include reusable templates, direct
access to machine level memory locations, an optimizing compiler, and advanced
error reporting.
272
8 - Visual C#
Visual C# is a programming language that combines programming elements
of C++ with a more manageable, rapid development environment. The purpose of
Visual C# is to take the complexity out of Visual C++ and still provide an object-
oriented programming language. Programmers familiar with the C/C++ programming
language family often migrate to the easier-to-use Visual C#.
9 - Delphi
Borland‘s Delphi is a dynamic tool for software creation, perfect for
developing large-scale business and web application a RAD environment. Software
developers use Delphi to rapidly create programs for platforms running on Windows,
Linux and.NET. Delphi also offers UML-based visual design tools. The UML (Unified
Modeling Language) was introduced as a standard notation for modeling an object.
A visual programming language is a program that uses a graphical or
interface to construct all source code. The graphical interface, known as a visual
programming environment (VPE), enables developers to drag and drop objects for
program development. Examples of languages used for visual programming include
Alice, Mindscript, and Prograph.
273
1- PowerBuilder
PowerBuilder was eveloped by Sybase, is another robust RAD software
development tool that is better adapted for object-oriented applications based on the
Web,.NET, and large-scale enterprise. Programmers often use the PowerBuilder to
create client/server software on a small to medium scale. PowerBuilder includes a
consistent interface, wizards, and many other features that enable programmers to
develop applications. (Shelly & Vermaat, 2010) Quickly.
1.Analyze Requirements
The first step in the development of the software is to examine the
specifications of the issue that the program(s) should fix so that the developer can
begin designing a suitable solution. In most cases, the solution requires more than
one program. The Analyze Requirements step consists of three major tasks:
Review the requirements
Meet with the systems analyst and users
Identify the input, processing, output, and data components.
2. Design Solution
The next step is to design a solution that will meet the users‘ requirements.
Creating a solution involves devising a solution algorithm to satisfy the requirements.
A solution algorithm, also called program logic, is a graphical or written
description of the step-by-step procedures to solve the problem. (santiagoagcaoili0)
Determining the logic for a program often is a programmer‘s most challenging task. It
requires that the programmer understand programming concepts, usually database
concepts, as well as use creativity in problem-solving.
275
Structured Design
The programmer typically starts with a basic design in structured design,
sometimes called the top-down design, and moves towards a more detailed design.
This method splits the initial collection of demands into smaller , more manageable
parts.
First step in top-down design is to define a program's primary purpose, also
called the main routine or main module. Next, the programmer splits down the
principal routine into smaller parts, called subroutines or modules. The programmer
then evaluates each subroutine to decide whether they can be further decomposed.
Programmers use a ladder map, also known as a structure chart, for graphical
representation of program modules. A plan of Hierarchy includes lines and
rectangles. The modules are rectangles. At the top of the map is the main section.
All other modules are placed underneath the main module. Modules are linked by
lines to signify connections.
Programs developed using structured design benefit from their simplicity,
reliability, readability, reusability, and maintainability. (Shelly & Vermaat, 2010)
Structured design, however, does not provide a way to package the data and the
program (or procedure) together. Each program has to define how it will use the
data. This can result in redundant programming code that must change every time
the structure of the data changes. To eliminate this problem, some IT professionals
use the object-oriented approach for program development.
Design Tools
Programmers use the design tools to help record a solution algorithm. Two
structured design tools include flowcharts and pseudocodes for the software. The
UML is a programming instrument for object-oriented design.
A program flowchart, or simply flowchart, graphically shows the logic in a
solution algorithm. In the early 1960s, the American National Standards Institute (
ANSI) published a set of flowcharts standards for the program. Still used today,
these specifications define symbols for different operations within the structure of a
program.
276
Programmers bind most of the symbols to solid lines on a program flowchart.
These lines indicate the programme's course. Dotted lines attach comment symbols
on a flowchart.
A comment symbol in the solution algorithm, also called an annotation
symbol, describes or clarifies the rationale.
Today, programmers create flowcharts using commercial flowcharting
software. This program makes modification and updating of flowcharts simple.
SmartDraw and Visio are two standard flowcharting software.
Pseudocode
Pseudocode conveys software logic using a simplified form of English. Some
programmers tend to use words to describe the logic of a solution algorithm
(pseudocode), rather than a graphical flowcharting technique. Heuristics set of steps
typically solving a problem; the solution may not be optimal. Useful heuristics provide
a remedy that is not optimal but appropriate for challenging issues—used when
complex/non-existent algorithms are optimal.
3. Validate Design
Once the programmers create the solution algorithm, the program design
should be validated for precision or tested. The programmer checks the logic for
accuracy during this step and attempts to uncover errors in the logic. A logic error is
a design flaw that results in inaccuracies.
4. Implement Design
Implementation of the design includes the use of a program development
method that assists the programmer in producing or supplying some or all code or
includes writing the code that converts the layout into a computer program and
creating the user interface, where necessary.
Coding a program means transforming the solution algorithm into a
programming language and typing it into the device.
277
5. Test Solution
When the programmer codes and the software enters, the next step is to
verify it. It is essential to get rigorous testing. Many users depend on the software
and its output after programmers have put the software into production to help their
everyday activities and decisions. The purpose of software testing is to ensure that
the program is running correctly and is error-free. Errors uncovered during this step
usually are one of two types: (1) syntax errors or (2) logic errors. A syntax error
occurs when the code violates the syntax or grammar of the programming language.
Document Solution
In documenting the solution, the programmer performs two activities: (1)
review the program code and (2) review all the documentation. First, programmers
review the program for any dead code and remove it. Dead code is any program
instructions that a program never executes. When programmers write a program,
they often write a section of code at a time(Shelly, Vermaat, Quasney, Sebok, &
Freund, 2012).
The programmers should run the program one final time to verify it still works.
When the program code has been checked, the programmer provides the system
analyst the program and all its information. The documentation contains all the
tables, solution algorithms, test results, and lists of software code containing global
and internal remarks. The programmer should be sure that all the paperwork is
correct and complete. This becomes particularly important if future improvements are
made to the software. Appropriate paperwork significantly reduces a new
programmer's time spent learning about current systems.
3 - JavaScript
JavaScript is a scripting language that runs on the user's computer locally,
enabling web pages to respond to user engagement such as clicking on items and
aiming
4 - Python
Python is a scripting language of high quality, translated, dynamic, and
object-oriented. Python is designed to be extremely legible. It also uses English
keywords where punctuation is used like other languages, and it has less syntactical
designs than other languages.
5 - ASP.NET
ASP.NET is a web development framework that combines a programming
model, an integrated software framework, and different services required to establish
280
full PC and mobile device web applications. ASP.NET is used over the internet to
create interactive, data-driven web applications. It consists of a collection of controls
for assembling, customizing, and controlling code to develop HTML pages, such as
text boxes, buttons, and labels.
Let us reflect…
Introducing you to a vast forest of programming makes you feel overwhelmed.
The lesson above is only a tip of the iceberg. Have you examined or seen the
vastness of programming? Introduction to programming is very different to coding. It
is one of the results of the latter. Your basic skill of coding must be founded on the
right start of what you see. Now, can you see yourself as to what kind of programmer
you will be in the future? Can you perceive the gigantic task ahead that needs to be
carefully assessed and build upon it little by little? Go ahead, dream of becoming a
very fluent computer programmer. The one who can program everything as he
wishes to. You can write your thoughts in a notebook, your experience, your dream,
and make those digital pilgrim‘s road a light to your passion in the programming
world.
1. Name at least three programming tools used in web development. Compare and
contrast each.
___________________________________________________________________
___________________________________________________________________
281
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
1. A(n) _____ reads a code statement, converts it to one or more machine language
instructions, and then executes those machine language instructions.
a. compiler
b. interpreter
c. source program
d. symbolic address
2. An OOP language is _____, which means an OOP language program checks for
and responds to events such as pressing a key or typing a value.
a. event-based
b. interpreted
c. event-driven
d. Compiled
282
3. When programmers compile a(n) _____ program, the resulting object code is
called a machine-independent byte code.
a. C
b. assembly language
c. Java
d. all of the above
4. _____ is a popular fourth-generation query language that allows users to manage,
update, and retrieve data in a relational DBMS.
a. SQL
b. COBOL
c. XML
d. RPG
5._____ is a subset of the Visual Basic language that allows programmers to add
intelligence and interactivity to Web pages.
a. VBScript
b. Flash
c. Ajax
d. SQL
6._____ is a Web page authoring program that is part of the Microsoft Office and
SharePoint families of products.
a. PHP
b. Ajax
c. SharePoint Designer
d. Flash
7. The concept of packaging data and procedures into a single object is called
_____.
a. object code
b. encapsulation
c. an object program
d. a control structure
283
8. _____________________refers to the writing, markup and coding involved in
Web development, which includes Web content, Web client and server scripting and
network security.
a. object code
b. encapsulation
c. an object program
d. a control structure
Write a research article (not less than 500 words) on the following topics that
will be submitted in a week time.
Suggested Readings:
Books/Journals:
o The Complete Software Developer‘s Career Guide by John Sonmez
o Code Complete: A Practical Handbook of Software Construction,
Second Edition, by Steve McConnell
o Don't Make Me Think, Revisited: A Common Sense Approach to Web
Usability by Steve Krug
o Structure and Interpretation of Computer Programs by Harold Abelson,
Gerald Jay Sussman, and Julie Sussman
o Design Patterns: Elements of Reusable Object-Oriented Software by
Erich Gamma, Richard Helm, Ralph Johnson, John Vlissides
o Code: The Hidden Language of Computer Hardware and Software by
Charles Petzold
284
o Code Complete: A Practical Handbook of Software Construction by
Steve McConnell
o The Pragmatic Programmer: Your Journey to Mastery by Andrew Hunt
and David Thomas
Websites:
o ―Best & Free Online Websites to Learn Coding for Beginners‖.
https://www.mockplus.com/blog/post/best-website-to-learn-coding
o ―Basic Programming Concepts‖. https://www.cs.princeton.edu/courses/
archive/fall18/cos126/lectures
o ―Computer Programming Concepts‖. https://www.tutorialspoint.com/
computer_programming/computer_programming_tutorial.pdf
o ―Basic Programming Concepts‖. http://www.aimt.edu.in/wp-
content/uploads/2016/12/Basic-Programming.pdf
o ―Programming Concepts‖, http://ptgmedia.pearsoncmg.com/images
/0130473200/samplechapter/0130473200.pdf
o ―Concepts.Techniques.and.Models.of.Computer.Programming‖.
http://aleteya.cs.buap.mx/~jlavalle/papers/books_on_line/MIT.Press.Co
ncepts.
REFERENCES
Floridi, L. (ed.) (2004), The Blackwell Guide to the Philosophy of Computing and
Information, Oxford: Blackwell.
285
Huff, C. (2004), ―Unintentional Power in the Design of Computing Systems.‖ in T.
Bynum and S. Rogerson (eds.), Computer Ethics and Professional
Responsibility, Oxford: Blackwell.
Shelly, G. B., & Vermaat, M. (2008). Discovering computers 2009: Brief. Australia:
Course Technology.
Shelly, G. B., & Vermaat, M. (2011). Discovering computers 2012: Living in a digital
world: Complete. Mason, OH: Cengage Learning.
286
Lesson 11: Introduction to Databases and
Data-mining
Duration: 3 Hours per week (Week 13)
Introduction
The term ‗database‘ is defined as any collection of electronic records that can
be processed to produce useful information. The data can be accessed, modified,
managed, controlled, and organized to perform various data-processing operations.
The data is typically indexed across rows, columns, and tables that make workload
processing and data querying efficient. Different types of databases include object-
oriented, relational, distributed, hierarchical, network, and others.
In enterprise applications, databases involve mission-critical, security-
sensitive, and compliance-focused record items that have complicated logical
relationships with other datasets and grow exponentially over time as the user based
increases. As a result, these organizations require technology solutions to maintain,
secure, manage and process the data stored in databases. This is where the
Database Management System comes into play.
OBJECTIVES/COMPETENCIES:
287
A pre-test of your Database and Data Science knowledge…
Data Updation - It helps in insertion, modification, and deletion of the actual data
in the database.
Data Retrieval - It helps in retrieval of data from the database, which can be
used by applications for various purposes.
A. Data Integrity - maintains the correctness and consistency of the data. Below
are the types of data integrity:
1. Domain Integrity
290
All categories and values in a database are set, including nulls (e.g., N/A).
The domain integrity of a database refers to the common ways to input and read
this data. For instance, if a database uses monetary values to include dollars and
cents, three decimal places will not be allowed.
Example, a student number is consisting of 10 digits. If the user is trying to
assign a value with a letter, or any non-numeric character or with more than or
less than the given numbers, it should be rejected.
2. Entity Integrity
It depends on the making of primary keys or exclusive values that classify
data items. The purpose is to make sure that data is not recorded multiple times
(i.e., each data item is unique), and the table has no null fields.
Entity integrity is a critical feature of a relational database that stores data in a
tabular format, which can be interconnected and used in a range of ways.
3. Referential Integrity
Referential integrity refers to the accuracy and consistency of data within a
database relationship. Data is linked between two or more tables. This is
achieved by having the reference a primary key value. Because of this, we need
to ensure that data on both sides of the relationship remains intact.
Referential integrity requires that if there is a foreign key value that is being
used, it must reference a valid and existing primary key in the parent table, for
example, is a Student and Course database relationship. If we have course_id as
a foreign key in the Student table, by using referential integrity constraints, we
can avoid creating Student without course or non-existing course.
C. Data Security – the data saved in the database is secured with appropriate
access control.
291
Examples of Database Management System
DATABASE MANUFACTURER
Access Microsoft Corporation
DB2 IBM Corporation
Oracle Oracle Corporation
SQL Server TM
Microsoft Corporation
Sybase Sybase, Inc.
MySQL Oracle Corp.
The concept of a data warehouse was initially developed by IBM and called
‗information warehouse.‘ It is presented as a key for accessing data saved in non-
292
relational systems. The information warehouse was projected to let organizations
use their data archives and help them have a business advantage. But, because of
the steep difficulty and performance glitches connected with the execution of such
solutions, the initial attempts in creating an information warehouse were mostly
rejected. Since then, the idea of data warehousing has been raised many times, but
it is only in current years that the potential of data warehousing is now seen as a
valuable and viable solution. Bill Inmon is the latest advocate for data warehousing
and most successful. Because of his active promotion of the concept, He was called
the ‗father of data warehousing.‘
293
continually absorbs this new data, incrementally integrating it with the
previous data.
Data mining is a logical process that is used to search through large amount
of data in order to find useful data. The goal of this technique is to find patterns that
were previously unknown. Once these patterns are found they can further be used to
make certain decisions for development of their businesses. Three steps involved
are:
294
Exploration
In the first step of data exploration data is cleaned and transformed into
another form, and important variables and then nature of data based on the
problem are determined.
Pattern identification
Once data is explored, refined and defined for the specific variables the
second step is to form pattern identification. Identify and choose the patterns
which make the best prediction.
Deployment
295
systems (DBMS). The efficient database management systems have been very
important assets for management of a large corpus of data and especially for
effective and efficient retrieval of particular information from a large collection
whenever needed. The proliferation of database management systems has also
contributed to recent massive gathering of all sorts of information. Today, we have
far more information than we can handle: from business transactions and scientific
data, to satellite pictures, text reports and military intelligence. Information retrieval is
simply not enough anymore for decision-making. Confronted with huge collections of
data, we have now created new needs to help us make better managerial choices.
These needs are automatic summarization of data, extraction of the ―essence‖ of
information stored, and the discovery of patterns in raw data.
Business Transactions
Every transaction in the business industry is (often) ―memorized‖ for perpetuity.
Such transactions are usually time related and can be inter-business deals such as
purchases, exchanges, banking, stock, etc., or intra-business operations such as
management of in-house wares and assets. Large department stores, for example,
thanks to the widespread use of bar codes, store millions of transactions daily
representing often terabytes of data. Storage space is not the major problem, as the
price of hard disks is continuously dropping, but the effective use of the data in a
reasonable time frame for competitive decisionmaking is definitely the most
important problem to solve for businesses that struggle to survive in a highly
competitive world.
296
Scientific Data
Whether in a Swiss nuclear accelerator laboratory counting particles, in the
Canadian forest studying readings from a grizzly bear radio collar, on a South Pole
iceberg gathering data about oceanic activity, or in an American university
investigating human psychology, our society is amassing colossal amounts of
scientific data that need to be analyzed. Unfortunately, we can capture and store
more new data faster than we can analyze the old data already accumulated.
297
Games
Our society is collecting a tremendous amount of data and statistics about
games, players and athletes. From hockey scores, basketball passes and car-racing
lapses, to swimming times, boxer‘s pushes and chess positions, all the data are
stored. Commentators and journalists are using this information for reporting, but
trainers and athletes would want to exploit this data to improve performance and
better understand opponents.
Digital Media
The proliferation of cheap scanners, desktop video cameras and digital cameras
is one of the causes of the explosion in digital media repositories. In addition, many
radio stations, television channels and film studios are digitizing their audio and
video collections to improve the management of their multimedia assets.
Associations such as the NHL and the NBA have already started converting their
huge game collection into digital forms.
Virtual Worlds
There are many applications making use of three-dimensional virtual spaces.
These spaces and the objects they contain are described with special languages
such as VRML. Ideally, these virtual spaces are described in such a way that they
can share objects and places. There is a remarkable amount of virtual reality object
and space repositories available. Management of these repositories as well as
content-based search and retrieval from these repositories are still research issues,
while the size of the collections continues to grow.
298
Text Reports and Memos (E-Mail Messages)
Most of the communications within and between companies or research
organizations or even private people, are based on reports and memos in textual
forms often exchanged by e-mail. These messages are regularly stored in digital
form for future use and reference creating formidable digital libraries.
Let us reflect…
The topic of Databases and Data Science and Mining is like a vast of ocean. It
needed an artificial intelligence to handle it. They say, ―Data is the new oil‖. It is the
very truth that every IT, Data Engineer, Computer Science, and Data Science guy
must face not only today, but also in the future. Data is the future, and if it is, how do
you handle it? How can you control and manipulate its gigantous attribute to benefit
mandkind? Have you established yourself how to face the future? Reflect on those
things, it is only the beginning of many generation‘s journey.
299
How much have you learned?
POST-TEST FOR LESSON 11
300
Lesson 11 Final Requirements:
Write a research article (not less than 500 words) on the following topics:
o How can Data Science impact positively the post Covid-19 era? Explain
your arguments.
o What are the future trends in Data Science? Name one item that will
impact the health sector of our society and explain it by your own
understanding.
Suggested Readings:
Books/Journals:
o Data Mining Techniques And Applications, Ramageri, B. M., (2010),
Indian Journal of Computer Science and Engineering, Vol. 1 No. 4
o Book Cover of Christian Mancas - Conceptual Data Modeling and
Database Design: A Fully Algorithmic Approach, Volume 1: The
Shortest Advisable Path, by Christian Mancas
o Data Science and Big Data Analytics: Discovering, Analyzing,
Visualizing and Presenting Data 1st Edition by EMC Education
Services
o Principles of Database Management, The Practical Guide to Storing,
Managing and Analyzing Big and Small Data, by Wilfried Lemahieu,
Seppe vanden Broucke, and Bart Baesens
Websites:
o ―Databases for Beginners – Things You Should Know‖.
https://wiredelta.com/databases-for-beginners/
o ―What Is a Web Database?‖. https://www.techwalla.com/articles/what-
is-a-web-database
o ―Database Management System Tutorial‖. https://www.tutorialspoint.
com/ dbms/index.htm
o ―Machine Learning‖. https://machinelearningmastery.com/
o ―Data Science‖. https://elitedatascience.com/
o ―Deep Learning for Beginners‖. https://www.kdnuggets.com/
301
REFERENCES
Brook, Chrison (2019). DATA PROTECTION 101 - What is Data Integrity? Definition,
Best Practices & More. Retrieved August 14, 2020, from
https://digitalguardian.com/blog/what-data-integrity-data-protection-101
Ramageri, B. M., (2010), Data Mining Techniques And Applications, Indian Journal
of Computer Science and Engineering, Vol. 1 No. 4 301-305
302
UNIT 04
Information Communication
Technology, Ethics and Beyond
303
Lesson 12: Information and Communication
Security
Duration: 3 Hours per week (Week 14)
Introduction
In today's worldwide growth of high technology, most companies are more
dependent on their information systems. The public is nervous about using the
system to store their data especially the people who do ecommerce and banking
transactions, in particular, personal information. Furthermore, the possibility of
computer hackers and identity theft has contributed to their anxiety about the use of
the information system, since there are so many hackers from all over the world
today. As a result, many companies would consider their information as their vital
activity that they need to secure their internal control activity. As companies rely
more and more heavily on computers to store confidential corporate and consumer
information, the concerns of stolen or lost data are becoming prominent in all
headline news. Information protection should be concerned because much of the
value of an organization is based on the value of its knowledgeable information.
Information Security is sometimes abbreviated to InfoSec, is a set of
practices intended to keep data secure from unauthorized access or alterations, both
when it's being stored and when it's being transmitted from one machine or physical
location to another. You might sometimes see it referred to as data security. As
knowledge has become one of the 21st century's most important assets, efforts to
keep information secure have correspondingly become increasingly important.
OBJECTIVES/COMPETENCIES:
305
Lesson 12.1 – InfoSec Basic Terminologies
The following terms are frequently linked to information and communication security.
Threat - is the expressed possible manifestation of an ―attack.‖ This term is
often interchanged and misused with the term attack, and vulnerability.
Attack - to harm and take action against a target.
Vulnerability - a flaw that marks targets prone to an attack.
Hacker – recently, this term is usually used in a negative way to define a
person with malicious intent who tries to have unauthorized access to network
resources but historically, this has been used as a common term for a
computer programmer.
Cracker - It is the more accurate word that is used to describe a person with
malicious intent who tries to have unauthorized access to network resources.
Phreaker - A person who is breaking into the phone network to cause it to
perform a purpose that is not allowed usually. For example, to have free
phone calls.
Spammer - is an individual who frequently use viruses to control computers to
send out large numbers of unrequested e-mails.
Phisher - The phisher pretends as a trusted party that would have an exact
need for the confidential information. For example, someone tries to pretend
to others, usually via e-mail or other means of communication, to ask for
sensitive information, such as bank account numbers or pin codes.
White Hat - These are people who use their capabilities to look for
weaknesses in systems then report these weaknesses to the owners of the
system so they can be fixed.
Black hat - these are people who use their capabilities to break into systems
that they are not legally allowed to use.
306
Lesson 12.2- Malware
A brief look at the history of malware shows us that this malicious menace has
been with us since the dawn of computing itself. According to Scientific American,
the idea of a computer virus extends back to 1949, when early computer scientist
John von Neumann wrote the ―Theory and Organization of Complicated Automata,‖
a paper that postulates how a computer program could reproduce itself. In the
1950s, employees at Bell Labs gave life to von Neumann‘s idea when they created a
game called ―Core Wars.‖ In the game, programmers would unleash software
―organisms‖ that competed for control of the computer.
The earliest documented viruses began to appear in the early 1970s.
Historians often credit the ―Creeper Worm,‖ an experimental self-replicating program
written by Bob Thomas at BBN Technologies with being the first virus. Creeper
gained access via the ARPANET and copied itself to remote systems where it
displayed the message: ―I‘m the creeper; catch me if you can!‖
The term ―virus,‖ however, wasn‘t introduced until the mid-eighties. Fred
Cohen often considered the father of what we know today as a computer virus,
coined the term in his 1986 Ph.D. thesis. He defined a ―virus‖ in a single sentence
as: ―A program that can infect other programs by modifying them to include a,
possibly evolved, version of itself.‖
From these benign and straightforward beginnings, a massive and sinister
industry was born. Today, according to The Anti-Phishing Workgroup, malware has
infected one-third of the world‘s computers. The consequences are staggering.
Cyber security Ventures reports that losses due to cybercrime, including malware,
are anticipated to hit $6 trillion annually by 2021.
2010 – Stuxnet Worm: Shortly after its release, security analysts openly
speculated that this malicious code was designed with the express purpose of
attacking Iran‘s nuclear program and included the ability to impact hardware
as well as software. The incredibly sophisticated worm is believed to be the
work of an entire team of developers, making it one of the most resource-
intensive bits of malware created to date.
2011 — Zeus Trojan: Although first detected in 2007, the author of the Zeus
Trojan released the source code to the public in 2011, giving the malware new
life. Sometimes called Zbot, this Trojan has become one of the most
successful pieces of botnet software in the world, impacting millions of
machines. It is often used to steal banking information by man-in-the-browser
keystroke logging and form grabbing.
2016 – Cerber: One of the heavy-hitters in the ransomware sphere. It‘s also
one of the most prolific crypto-malware threats. At one point, Microsoft found
more enterprise PCs infected with Cerber than any other ransomware family.
310
cyberattacks. Although cybersecurity companies are using artificial
intelligence and machine learning algorithms to help combat malware,
these technologies can also be exploited to hack devices and networks
on a massive scale. Cyberattacks can often cost cybercriminals a lot in
terms of time and resources. So, with the expansion of AI and machine
learning technologies, we can only expect hackers to develop highly-
advanced and destructive AI-based malware in 2020 and beyond.
According to a recent study by the Center for Applied Internet Data Analysis
(CAIDA), almost 30,000 spoofing attacks occurred each day from March 2015 to
February 2017. Today, the number of attacks continues to increase across the world
exponentially.
Companies and other organizations that fall victim to spoofing attacks can end
up losing millions in revenue. The good news is many of these attacks are
preventable with the correct system configuration, employee training, and high-
quality cybersecurity tools
311
The use of multiple packet addresses overwhelms and shuts down the
targeted device. These types of attacks can be detected with a network analyzer or
bandwidth monitoring tool.
Monitoring normal traffic usage can assist you in recognizing illegitimate traffic
so you can do a more in-depth investigation. It‘s essential to catch IP spoofing
attacks as soon as possible because, as part of a DDoS attack, they can take your
network completely offline, disrupting normal business activities.
Another malicious IP spoofing method is a Man-in-the-Middle attack that
interrupts communication between two computers, alters the packets, and transmits
them without the original sender or recipient being aware of it.
Eventually, attackers can gather loads of personal information they can sell or
use for other fraudulent purposes.
312
Usually, a spoofed email or website will have the logos, branding, and visual
design of the legitimate business. Visitors are then guided to enter their financial
details or other sensitive information that the attacker intercepts.
In the ad tech industry, domain spoofing allows a low-quality publisher to
perpetrate ad fraud by disguising themselves as a premium publisher on an ad
exchange. Fraudsters substitute a fake URL through ad networks to trick advertisers
into thinking their bidding on a premium site for their ad to be served on, when in
fact, the ad is performed on a different lower-quality website.
Domain spoofing can also be accomplished in more complex ways with bots.
These bots can spoof a site‘s URL so that when an ad reads the URL from the
browser, it reports back the spoofed URL to the advertiser.
Malware can also inject ads inside the pages of premium sites without the
operator noticing while the fraudster collects the revenue.
313
1. Flooding services or crashing services. If the device receives too much
traffic for the server to buffer, flood attacks occur , causing them to slow down
and stop eventually. Popular flood attacks include:
a. Buffer overflow attacks – the most common DoS attack. The idea is
to submit a network address with more traffic than the programmers
have designed the framework to manage. This includes, in addition to
others designed to exploit vulnerabilities unique to some applications or
networks, the attacks mentioned below.
b. ICMP flood - by sending spoofed packets that ping each computer on
the targeted network, instead of just one particular machine, it
leverages misconfigured network devices. To amplify the traffic, the
network is then enabled. This attack is often referred to as the death
smurf attack or ping of death.
c. SYN flood-sends a script, but never completes the handshake, to
connect to a server. It continues until all open ports are overloaded with
requests and no requests are available to connect to legitimate users.
2. Other DoS attacks merely exploit vulnerabilities that cause a crash of the
target system or service as shown in the image above. In these attacks,
input is sent that takes advantage of target bugs that crash or seriously
destabilize the machine subsequently, so that it cannot be reached or used.
314
12.4.2 – DDoS –Distributed Denial of Service
distribution of hosts describing a DDoS offers several advantages for the attacker
and these are:
The higher volume of the computer can be used to launch a severely
destructive attack.
To launch a severely destructive attack, the higher volume of the device can
be used.
Multiple devices are more difficult to shut down than one
The true attacking party is very difficult to identify, as they are disguised
behind many (mostly compromised) systems.
315
Modern security technologies have evolved mechanisms to protect against
most types of DoS attacks, but it is still regarded as an elevated threat because of
the specific characteristics of DDoS and is of greater concern to organizations that
fear being threatened by such an attack.
Social Engineering is the hack that requires no knowledge of code. Despite its
relative simplicity, the risks associated with social engineering are just as serious as
the numerous hacks that have populated recent headlines. For everyday citizens,
awareness of social engineering scams and the methods they use that prey on
weaknesses in human behavior should be at an all-time high. Everyone is a target,
and you should be vigilantly aware of anyone asking for personal or private
information.
1. Phishing
It is the most common but dangerous type of social engineering attack.
Phishing attacks are infamously known for grabbing information from target uses.
Phishers carry out this attack by sending malicious or spoofed emails to targets to
get their data. This attack is mainly deployed to accomplish three things:
Obtain personal information like user‘s credentials, social security numbers, or
financial details.
Redirect users to suspicious websites, which host phishing landing pages.
For the quick response from users by manipulating them with attempts of
incorporating threats or show urgency.
3. Pretexting
Pretexting is equivalent to phishing activity. Here hackers create a false sense
of trust to get information out of their victims. If a hacker targets an end-user, then it
impersonates itself as a user‘s co-worker or a higher dignity from the user‘s
organization. By this, the hacker wins the user‘s trust and quickly gets access to the
user‘s login credentials. These attacks shockingly come out to be effective, and most
of the sophisticated attackers use this method for the vicious intent.
4. Baiting
Just like various similar phishing attacks, baiting is one of the ways to entice
victims. In this social engineering attack, cyber-attackers promise goods or services
to users in return for their login credentials. They use baits like ―offer‖ or ―free‖
downloads, which could be of anything like movies, music, game, video, etc.
Furthermore, it attracts users, and they give away their login credentials easily.
Baiting attacks do not restrict to online schemes. Attackers go way beyond to exploit
human curiosity by using physical media too.
5. Piggybacking
Also known as tailgating, piggybacking is a practice of attackers trying to seek
access to a restricted area. This attack is deployed when an unauthorized person
physically follows the authorized person to a restricted place that lacks proper
authentication. This type of social engineering attack can take place in any form. For
317
instance, a hacker can either ask an employee to borrow his/her laptop for some
work and can quickly install malware software stealthily.
Computer and network security breaches seem to be in the news every day,
and they cost the organizations that fall prey millions of dollars. IBM reports that the
average cost per incident rose yet again in 2019 to $8.1 million for U.S companies,
more than twice as much as the global average. The healthcare industry remains the
most vulnerable and experiences the highest average losses.
The facts surrounding cyber security can be downright scary, and protecting
your system is critical. Yet, it can be a challenge for small- and medium-size
organizations that don‘t have full-time IT staff to oversee system maintenance.
It‘s hard to know how to protect your network. Fortunately, there are several
network security best practices that business owners can implement today to secure
their data and build more impenetrable protection against hackers and viruses.
Below are practices to protect the your network:
319
5. Be Educated
All the tips and instructions in the book won‘t help if you are not following
those computer safety practices. Reminders about the threats and the phases to
lessen the threats will support keeping the network security as a priority. Some
groups make these types of updates as a required consultation to help communicate
the significance of it. In fighting cybercrime, being knowledgeable on how to avoid
significant safety threats is probably the extreme defense you have.
Let us reflect…
Information security and cyber security is a growing concern not only for
governments but for the whole humanity. With the universal push for the universal
access not only for the ICT world but especially with information security, the
growing concern for system and data protection is very fast expanding. As you have
learned in the last lecture, data is the future and it needs protection. The future will
be data and information and one of the areas of it is its protection. The universal
future of digital world is how to manipulate, control and protect that future. InfoSEc
and cyber security will be a part of a very long journey in the digital universe. In this,
what path you will choose in the area of your specialization? What skills you must
hone in order to cope and ride in the future. It‘s your choice in what area of InfoSec
and cyber security will you choose, it is an ocean of opportunities that are lies ahead
for you.
320
How much have you learned?
POST-TEST FOR LESSON 12
11. A/An __________ is a series of rules that control incoming and outgoing
network traffic.
12. On 2013, __________ had a significant impact globally and helped fuel the
ransomware era.
13. Black Hat group is people who use their capabilities to break into systems that
they are not __________ allowed to use.
14. Cracker is the more accurate word that is used to describe a person with
malicious intent who tries to have __________ access to network resources.
15. On 1949, __________ wrote the ―Theory and Organization of Complicated
Automata.
16. Phishing obtain personal __________ like user‘s credentials, social security
numbers, or financial details.
17. In pretexting __________ create a false sense of trust to get information out
of their victims.
18. Also known as tailgating, __________ is a/an practice of attackers trying to
seek access to a restricted area.
19. Threat is the expressed possible manifestation of a/an __________. This term
is often interchanged and misused with the term attack, and vulnerability.
20. A spammer is an individual who frequently use __________ to control
computers to send out large numbers of unrequested e-mails.
321
Lesson 12 Final Requirements:
Write a research article (not less than 500 words) on the following topics that
will be submitted in a week time.
Write a research paper regarding the security challenges of our time with
respect to COVID-19 Pandemic Crisis and explain its Implications on
Cybersecurity of the current and future time.
Suggested Readings:
Books/Journals:
o Cybersecurity for Beginners 2nd Edition by Raef Meeuwisse
o Networking All-in-One For Dummies Paperback, 2018, by Doug Lowe
o Social Engineering: The Science of Human Hacking 2nd Edition, 2019,
by Christopher Hadnagy
o Cybersecurity for Executives: A Practical Guide 1st Edition by Gregory
J. Touhill and C. Joseph Touhill
o Threat Modeling: Designing for Security, 2014, by Adam Shostack
o Journal of Cybersecurity, Oxford University Press,
https://academic.oup.com/cybersecurity
o Computer and Information Security / Cybersecurity,
https://ncu.libguides.com/c.php?g=628732&p=4387732
Websites:
o ―Introduction to Cyber Security Specialization‖.
https://www.coursera.org/ specializations/intro-cyber-security
o ―Learn the Fundamentals of Cybersecurity‖. https://www.cyberaces.org/
courses.html
o ―Cybersecurity: Managing Risk In The Information Age‖.
https://harvardx-onlinecourses.getsmarter.com/presentations/
lp/harvard-cybersecurity-online-short-course/
o ―InfoSec‖. https://resources.infosecinstitute.com/free-online-cyber-
security-training-courses-hands-on-training-practice-exams/
322
o ―The Hacker News, Site for the Current Learning for Cybersecurity‖
https://thehackernews.com/
o ―All About Cybersecurity and InfoSec‖. https://www.darkreading.com/
REFERENCES
Fruhlinger, Josh (2020). What is information security? Definition, principles, and jobs.
Retrieved August 24, 2020, https://www.csoonline.com/article/3513899/what-is-
information-security-definition-principles-and-jobs.html
Love, John (2018). A Brief History of Malware — Its Evolution and Impact - Retrieved
August 24, 2020, from https://www.lastline.com/blog/history-of-malware-its-
evolution-and-impact/
Kuwahara, Rick (2020). Domain Spoofing: How It Works and What You Can Do to
Avoid It. Retrieved August 24, 2020, from
https://www.paubox.com/blog/domain-spoofing-how-it-works-and-what-you-
can-do-to-avoid-it/
Matthews, Kayla (2018). Denial-of-Service Attacks 101: What Are They? Retrieved
August 25, 2020, from https://www.globalsign.com/en/blog/what-is-denial-of-
service-attack
Dutta, Pallavi (2019). 5 Dangerous Social Engineering Attacks. Retrieved August 25,
2020, https://www.kratikal.com/blog/5-dangerous-social-engineering-attacks/)
DuPaul, Neilh (2013). Hacking the Mind: How & Why Social Engineering Works.
Retrieved August 25, 2020, from
https://www.veracode.com/blog/2013/03/hacking-the-mind-how-why-social-
engineering-works
323
Lesson 13: Information, Communication and
Computer Ethics
Duration: 3 Hours per week (Week 15)
INTRODUCTION
Ethics in Information Communication Technology is not a legal law, it is a
moral duty that allows us to direct our actions and conduct. All government must
find out what kind of ethical difficulties an IT professional in any organization can
face. The ethics of ICT practitioners are not different from those of general people;
they are far more accountable because they are open to accessing a lot of resources
and knowledge and their unethical actions can have a significant effect on either the
employee or the whole organization.
New fields of communication and the use of technology are continually being
developed. From an ethical as well as an affective viewpoint, the human relationship
to technology and his psychological behaviour then becomes important to consider.
According to various studies, information technology needs to be improved and a
communicative viewpoint should be specifically included. It is important to recognize
ethical issues related to the implementation and use of ICT ( Information and
Communication Technology) as these issues constitute the conditions for human
attitudes and values that characterize human conduct and acts, and imply conditions
for the usefulness and maintenance of such systems.
324
OBJECTIVES/COMPETENCIES:
325
Lesson 13.1 - What is Ethics and Why Is It Important?
Ethics also deals with the relationship between human beings and
other sentient creatures (lower forms of animals). The main concern here
is about the proper attitude toward the sentient being that is capable of
feeling the pain. How do we see this sentient being around us? Do we
see them as an object or subject? Do we see them in their instrumental
value or intrinsic value? Is it ethical to use other sentient beings who are
also capable of experiencing pains, for the advancement of human
knowledge?
327
13.3 - Importance of Ethics
The First reason is that we may get more light for our daily problems. We
often encounter a moral dilemma in our life. We sometimes reach a point that as if
we are at a crossroads, either going to the right or the left, there is no better choice.
Going to the right is wrong and going to the left is also wrong. Within such a
situation, one has to decide because not deciding would mean avoiding
responsibility, and it would be morally wrong. Thus, the concern is, how are we going
to decide in dealing with those problems? On what ground are we going to choose?
Ethics will guide us in those situations. Thus, ethics play an essential role to guide
our decision in our daily problems.
The second reason is that it makes it more evident to us why one act is better
than another. It is only through ethics; we can compare two acts or persons why one
is good and is bad. The third reason is that Morality is the best way of living. The
fourth reason is that morality helps us to see what are the prevalent sins and moral
dangers of our day and thus arouse us to put the weight of our blame and praise
where they are needed.
The purpose of ethics was evident at the beginning. The goal of a theory of
ethics was to determine what is right, both for the individual and for the society as a
whole. For the Greeks, Ethics was to develop virtuous and moral character. They
believe that such character would make one know the right thing to do and live the
right way of life. Later, philosophers have taken different positions in defining what is
right. They learned how to deal with conflicting priorities of individuals versus the
whole over the universality of ethical principles versus ―situation ethics‖ in which
what is right depends upon the circumstances rather than on some general law and
over whether goodness is determined by the results of the action or the means by
results are achieved.
328
Lesson 13.4 - Computer and Information Ethics
Computer Ethics
Just as criminals stealing cars and money from others, they're criminals who
are stealing by electronic means, and they made such behavior as a career for them
to enjoy and to score points that they can brag about it. Such a small group who we
call them black hackers represent a massive problem for modern societies.
Harvey (n.d.) also argued that putting the computer ethics problems in the
same category as other ethical problems doesn‘t solve them; the right approach to
the ethical issue in the computer world should be established to find the right
solutions for such problems. Two methods can achieve answers to such problems:
1. Technology control
Such an approach can be achieved through tightening the security
implemented within the technology to make it uneasy for hackers to break into the
technology and web sites to gain access to sensitive information, and destroy
businesses, and expose confidential information.
2. Moral training
Teaching young computer enthusiasts to be responsible and be part of the
computer communities without defining them as computer criminals is a vital step
toward the correction of computer ethical problems.
Kuruvill (2005) explained that the policy vacuum is usually facing problems
when dealing with computer ethics. With the impact of computer technology on
329
social behaviors, the creation of rules that can justify the policies for the ethical use
of technology is imperative.
It is also important to point out that computer ethics is a dynamic field of study
where factors such as values, policies, and ever-changing computer technology
have to be considered to establish such ethical rules for computer professionals. In
creating such ethics, a mix of rules of ethics and science has to be combined to
make these rules.
Association for Computer Machinery (ACM) is the right place for computer
professionals to learn about professional conduct and the code of ethics of computer
professionals. ACM.org (2011) explained that the code of ethics is represented
through the association that reflects a set of guidelines that define various issues
that members of the association may deal with through their careers in the computer
world. The code will serve computer professionals as a basis for ethical decision
making. Some of the guidelines or principles for such code are:
330
Honor property rights, including patent and copyrights – Computer
professionals should honor trade secrets, copyrights, and the terms of license
agreements. Give proper credit for intellectual property – Computer
professionals should keep and protect the integrity of the intellectual property.
Respect the privacy of others – Computer professionals should avoid any
violation of the individual's or groups' privacy and maintain the integrity and
confidentiality of the data describing individuals.
Honor confidentiality – Computer professionals have to honor the
confidentiality of the information belongs to individuals. Such a principle is the
extent of the honesty principle where a promise was made to honor the
confidentiality of such information, or such promise was implicitly made when
such private information becomes available.
Netiquette came from the words network and etiquette. It is described as a set
of rules for standard behavior online. Likewise, online ethics is more on the
reasonable practice of internet resources in the virtual community.
Also, netiquette is often combined with the concept of a ―netizen,‖ which came
from the words internet and citizen. It refers to an individual who uses the internet to
contribute to society, and also recognized the accountability of using the internet is
dynamic and publicly responsible ways.
331
Don't forget your signature.
Every email should include a signature that tells the recipient who you are and
how to contact you. Set it up to automatically appear at the end of each email.
Include all of your contact details, so the recipient doesn‘t have to look up your
address, email, or phone number.
Do use a professional salutation.
Using ―Hey,‖ ―Yo,‖ or ―Hiya‖ isn‘t professional, no matter how well you know
the recipient. Use ―Hi‖ or ―Hello‖ instead. To be more formal, use ―Dear (insert
name).‖ Using the person‘s name in the salutation -- ―Hello Robert‖ -- is entirely
appropriate, but remember not to shorten a person's name unless you're permitted to
do so.
Don't assume the recipient knows what you are talking about.
Create your message as a stand-alone note, even if it is in response to a
chain of emails. This means no ―one-liners.‖ Include the subject and any references
to previous emails, research, or conversations. It can be frustrating and time-
consuming to look back at the chain to brush up on the context. Your recipient may
have hundreds of emails coming in each day, and likely won‘t remember the chain of
events leading up to your email.
332
Do reply to all emails.
Give a timely and polite reply to each legitimate email addressed to you. Even
if you do not have an answer at the moment, take a second to write a response
letting the sender know you received their email. Inform the sender if their email was
sent to the wrong recipient, too.
333
science and a profession. ACM also provides the computing field's premier Digital
Library and serves its members and the computing profession with leading-edge
publications, conferences, and career resources.
334
way to avoid unintentional harm is to carefully consider potential impacts on all those
affected by decisions made during design and implementation.
335
13.6.1.4 Be fair and take action not to discriminate.
The values of equality, tolerance, respect for others, and the principles of
equal justice govern this imperative. Discrimination based on race, sex, religion, age,
disability, national origin, or other such factors is an explicit violation of ACM policy
and will not be tolerated.
Inequities between different groups of people may result from the use or
misuse of information and technology. In a fair society, all individuals would have
equal opportunity to participate in, or benefit from, the use of computer resources
regardless of race, sex, religion, age, disability, national origin, or other such similar
factors. However, these ideals do not justify the unauthorized use of computer
resources, nor do they provide an adequate basis for a violation of any other ethical
imperatives of this code.
336
and groups. It is the responsibility of professionals to maintain the confidentiality and
integrity of data describing individuals. This includes taking precautions to ensure the
accuracy of data, as well as protecting it from unauthorized access or accidental
disclosure to inappropriate individuals. Furthermore, procedures must be established
to allow individuals to review their records and correct inaccuracies.
This imperative implies that only the necessary amount of personal
information be collected in a system. Retention and disposal periods for that
information be clearly defined and enforced. That personal information gathered for a
specific purpose not be used for other purposes without the consent of the
individual(s). These principles apply to electronic communications, including
electronic mail, and prohibit procedures that capture or monitor electronic user data,
including messages, without the permission of users or bona fide authorization
related to system operation and maintenance. User data observed during the regular
duties of system operation and maintenance must be treated with the strictest
confidentiality, except in cases where it is evidence for the violation of the law,
organizational regulations, or this Code. In these cases, the nature or contents of
that information must be disclosed only to proper authorities.
13.6.2.1 Strive to achieve the highest quality, effectiveness, and dignity in both
the process and products of professional work.
337
Excellence is perhaps the most important obligation of a professional. The
computing professional must strive to achieve quality and to be mindful of the
serious negative consequences that may result from low quality in a system.
ACM members must obey existing local, state, province, national, and
international laws unless there is a compelling ethical basis not to do so. Policies and
procedures of the organizations in which one participates must also be obeyed. But
compliance must be balanced with the recognition that sometimes existing laws and
rules may be immoral or inappropriate and, therefore, must be challenged. Violation
of a law or regulation may be ethical when that law or rule has an inadequate moral
basis or when it conflicts with another law judged to be more important. If one
decides to violate a law or rule because it is viewed as unethical, or for any other
reason, one must fully accept responsibility for one's actions and the consequences.
338
Computer professionals must strive to be perceptive, thorough, and objective
when evaluating, recommending, and presenting system descriptions and
alternatives. Computer professionals are in a position of special trust, and therefore
have a special responsibility to provide objective, credible evaluations to employers,
clients, users, and the public. When providing evaluations, the professional must
also identify any relevant conflicts of interest, as stated in imperative 13.4.1.3.
339
However, performing assignments "against one's judgment" does not relieve
the professional of responsibility for any negative consequences.
13.6.2.9 Design and implement systems that are robustly and usably secure.
Breaches of computer security cause harm. Robust security should be a
primary consideration when designing and implementing systems. Computing
professionals should perform due diligence to ensure the system functions as
intended, and take appropriate action to secure resources against accidental and
intentional misuse, modification, and denial of service. As threats can arise and
change after a system is deployed, computing professionals should integrate
mitigation techniques and policies, such as monitoring, patching, and vulnerability
reporting. Computing professionals should also take steps to ensure parties affected
340
by data breaches are notified in a timely and clear manner, providing appropriate
guidance and remediation.
To ensure the system achieves its intended purpose, security features should
be designed to be as intuitive and easy to use as possible. Computing professionals
should discourage security precautions that are too confusing, are situationally
inappropriate, or otherwise inhibit legitimate use.
In cases where misuse or harm are predictable or unavoidable, the best
option may be to not implement the system.
341
Because computer systems can become tools to harm as well as to benefit an
organization, leadership has the responsibility to define appropriate and
inappropriate uses of organizational computing resources clearly. While the number
and scope of such rules should be minimal, they should be fully enforced when
established.
13.7.4 Ensure that users and those who will be affected by a system have their
needs clearly articulated during the assessment and design of requirements;
later, the method must be validated to meet requirements.
Current system users, potential users, and other persons whose lives may be
affected by a system must have their needs assessed and incorporated in the
statement of requirements. System validation should ensure compliance with those
requirements.
13.7.5 Articulate and support policies that protect the dignity of users and
others affected by a computing system.
Designing or implementing systems that deliberately or inadvertently demean
individuals or groups is ethically unacceptable. Computer professionals who are in
decision making positions should verify that systems are designed and implemented
to protect personal privacy and enhance personal dignity.
Let us reflect…
With a holistic reading and study of the concepts above by the learner, ICT
students who will be programming professionals in the future, should approach the
problem and analyze their computing situation with thorough consideration of
everyone‘s security. It is of parmount importance in all situations, as the learner‘s
concern, the computing novies as well professional should put in their heart public
good and security first everytime they will operate smart gadgets and computers.
May the lessons above will give you a moral foundation in using any gift of talent in
the digital world. In this, you may write a reflection paper of how you will see yourself
as a disciplined and morally upright ICT practitioner. Who do you like to be in a moral
sense after you have finished your undergraduate studies. Document it again and
compile it for your future‘s reading and make an everyday reminder and light of your
dream.
343
How much have you learned?
POST-TEST FOR LESSON 13
2. Choose three from the dos and don’ts of email etiquette and cite 1
example/scenario each.
A. __________________________________________________________
__________________________________________________________
__________________________________________________________
__________________________________________________________
344
B. __________________________________________________________
__________________________________________________________
__________________________________________________________
__________________________________________________________
C. __________________________________________________________
__________________________________________________________
__________________________________________________________
__________________________________________________________
Cite articles of a global hacking incident of the topics below and write a summary
criticism of the ethical conduct violated from the above lessons. (Minimum of 500
words per incident)
o A top-secret medical virology files that will be used as a bioweapon by an
advance country.
o An invention that should be a great help to humanity.
Suggested Readings:
Books/Journals:
o Computer Ethics In The Undergraduate Curriculum: Case Studies And
The Joint Software Engineer's Code. Retrieved from
http://web.cs.wpi.edu/~jb/CS3043/Readings/06%20-%20Ethics/Ethics
CaseStudies.pdf
o Ethics in Information Technology 5th Edition, 2020, by George W.
Reynolds
o Gift of Fire, A: Social, Legal, and Ethical Issues for Computing
Technology 5th Edition, 2019, by Sara Baase and Timothy Henry
345
o Tavani, H.T. ICT ethics bibliography 2012–2014: A select list of recent
books. Ethics Information Technology, pp. 243–247 (2015).
https://doi.org/10.1007/s10676-013-9327-0
o Cyberethics: Morality and Law in Cyberspace 7th Edition by Richard A.
Spinello
Websites:
o ―ACM Code of Ethics and Professional Conduct‖.
https://www.acm.org/code-of-ethics/case-studies
o ―IT Ethics at Workstation ―. https://www.tutorialspoint.com/it-ethics-at-
workstation
o ―Ethics for Technology Use in the Classroom‖. https://study.com/blog/
ethical-issues-with-using-technology-in-the-classroom.html
o ―Promoting Responsible and Ethical Digital Citizens‖.
https://www.education world.com/a_tech/responsible-student-
technology-use.shtml
o ―Ethical & Security Issues in Information System‖. https://www.guru99.
com/mis-ethical-social-issue.html
o ―Ethical Issues in Information Technology‖.
https://www.geeksforgeeks.org/ethical-issues-in-information-
technology-it/
346
REFERENCES
Association for Computing Machinery. Retrieved on August 29, 2020, from
https://www.acm.org/binaries/content/assets/about/acm-code-of-ethics-
booklet.pdf
Dameano (2013). The Role of Ethics in Our Daily Life. Retrieved on August 28,
2020, from http://dameanusabun.blogspot.com/2013/12/ethics-and-daily-
life.html
Laura, Annabelle (2017). Ethics Defined. Retrieved on August 28, 2020, from
https://medium.com/the-ethical-world/ethics-defined-33a1a6cc3064
Soliman, Bryan (2011). Computer Ethics and Ethical Decision. Retrieved on August
28, 2020, from https://bryansoliman.wordpress.com/2011/10/02/computer-
ethics-and-ethical-decision/
Whitmore, Jacqueline (2016). The Dos and Don'ts of Email Etiquette. Retrieved
August 28, 2020, from https://www.entrepreneur.com/article/272780
347
Lesson 14: Future Trends in Information and
Communication Technology
Duration: 3 Hours per week (Week 16)
Introduction
348
OBJECTIVES/COMPETENCIES:
3. Give at least three applications of Artificial Intelligence in our current life and
briefly describe your answer.
D. ____________________________________________________________
____________________________________________________________
______________________________________________________
E. ____________________________________________________________
____________________________________________________________
______________________________________________________
349
F. ____________________________________________________________
____________________________________________________________
______________________________________________________
4. Can you give at least three real-life applications of cloud computing in the
various industries of our current times?
D. ____________________________________________________________
____________________________________________________________
______________________________________________________
E. ____________________________________________________________
____________________________________________________________
______________________________________________________
F. ____________________________________________________________
____________________________________________________________
______________________________________________________
350
Lesson 14.1 – Artificial Intelligence
Artificial intelligence (AI) is an area of computer science that emphasizes the
creation of intelligent machines that work and react like humans. Some of the
activities computers with artificial intelligence are designed for include:
● Speech recognition
● Learning
● Planning
● Problem-solving
351
Classification determines the category an object belongs to, and regression
deals with obtaining a set of numerical input or output examples, thereby discovering
functions enabling the generation of suitable outputs from respective inputs.
Mathematical analysis of machine learning algorithms and their performance is a
well-defined branch of theoretical computer science, often referred to as
computational learning theory.
Machine perception deals with the capability to use sensory inputs to deduce the
different aspects of the world. At the same time, computer vision is the power to
analyze visual inputs with few sub-problems such as facial, object, and speech
recognition.
Robotics is also a major field related to AI. Robots require intelligence to handle
tasks such as object manipulation and navigation, along with sub-problems of
localization, motion planning, and mapping.
352
14.2.1.2 - Vision systems
The need to interpret, fully understand, and make sense of visual input on the
computer, i.e., Artificial Intelligence is used to try and analyze and understand an
image - industrial, military use, satellite photo interpretation.
Spy plane takes a photograph, and experts would then analyze it to try and
figure it out - see if it was an enemy area.
Police using the computer to come up with a photofit drawing of a criminal.
Doctors using the system to make a diagnosis of the patient.
353
Image recognition allows you to scan in a page containing text, and the OCR
software will convert this into editable text. It does this by recognizing the shapes of
the letters and converting them into ASCII text.
There is a great need to train the computer system to recognize different
human handwriting since humans all write individual letters in different ways.
Advantages
● Work 24/7, 365 days/year, unlike human workers; do not need holidays
● Cheaper – do not need to be paid - company make more money in the long
run
● More accurate
● Safer than sending a human into dangerous places, e.g., nuclear power
stations
354
Lesson 14.3 - Pervasive Computing (Ubiquitous
Computing)
358
14.3.3.3 - What Are RFID Standards?
RFID standards are guidelines or specifications for all RFID products.
Standards provide guidelines about how RFID systems work, what frequencies they
operate at, how data is transferred, and how communication works between the
reader and the tag.
359
14.3.3.6 Future RFID Chip Microprocessor Design
360
● Packet-based transfer
● Separation of control functions among bearer capabilities, call/session,
and application/service
● Decoupling of service provision from transport, and provision of open
interfaces
● Support for a wide range of services, applications, and mechanisms
based on service building blocks (including real-time/streaming/non-real-
time services and multimedia)
● Broadband capabilities with end-to-end QoS and transparency
● Interworking with legacy networks via open interfaces
● Generalized mobility
● Unfettered access by users to different service providers
● A variety of identification schemes which can be resolved to IP
addresses to route in IP networks
● Unified service characteristics for the same service as perceived by the
user
● Converged services between Fixed and Mobile networks
● Independence of service-related functions from underlying transport
technologies
● Support for multiple last-mile technologies
● Compliant with all Regulatory requirements, for example, concerning
emergency communications and security/privacy, etc.
361
2. A converged IP network is a single platform on which interoperable devices
can execute in innovative ways. Since IP is an open standard, it is vendor-
independent, and this helps in fostering interoperability and improving network
efficiency in terms of time and cost. The ambit of IP convergence
encompasses networks, devices, and different technologies and systems that
can be operated on a unified infrastructure.
3. A converged IP network is easier to manage because of the uniform setup in
which the system resources operate. Training users are comfortable.
4. An enterprise can achieve flexibility in terms of molding its communication
patterns to its management practices. This is a dynamic process that can
continually improve the collaboration from network partners. What this results
in is the right information to the right person at the right time leading to
improved decision making.
5. IP networks have proven to be remarkably scalable. It has been one of the
prime reasons that even large enterprises have gone ahead with
implementing IP Applications that run on IP networks are available all over the
world; most new business applications include inbuilt IP support.
6. An IP convergent network is capable of making use of the developments in a
class of service differentiation and QoS-based routing. The process leads to
better utilization of resources and also allows for capacity redundancy to take
care of an increase in the number of users.
7. A uniform environment requires fewer components in the network. Smoother
maintenance and management result from this and, in turn, lead to improved
processes. Affordable deployment results from the elimination of multiple
systems operating in parallel, and manageability improves. In a converged
environment, fewer platforms need to test, and gateways between networks
are eliminated.
8. Business applications have different tolerance levels for transit delays,
dropped packets, and error rates. IP architecture is capable of handling these
so that the QoS reflects the requirements of the different applications.
362
9. Device integration has the potential to simplify end-to-end security
management and, at the same time, make it more robust. Continuous
development is taking place in the field of security for IP data communication.
10. A converged IP network offers a business tremendous cost savings in terms
of hardware and space utilization. It opens up more markets that can be
reached, more products that can be introduced increases employee
productivity and mobility, and enables even smaller companies to compete
with larger ones because of faster information relay.
Cloud computing is a general term for anything that involves delivering hosted
services over the Internet. These services are broadly divided into three categories:
Infrastructure-as-a-Service (IaaS),
Platform-as-a-Service (PaaS)
Software-as-a-Service (SaaS).
The name cloud was inspired by the symbol that's often used to represent the
Internet in flowcharts and diagrams.
Cloud computing enables companies to compute resources as a utility -- just
like electricity -- rather than having to build and maintain computing infrastructures
in-house.
Cloud computing promises several attractive benefits for businesses and end-
users. Three of the main advantages of cloud computing include:
Self-service provisioning: End users can spin up computing resources for
almost any type of workload on-demand.
Elasticity: Companies can scale up as computing needs increase and then
scale down again as demands decrease.
Pay per use: Computing resources are measured at a granular level, allowing
users to pay only for the help and workloads they use.
363
14.5.1 - Cloud Computing Services Can Be Private, Public, Or Hybrid.
Private cloud services are delivered from a business's data center to internal
users. This model offers versatility and convenience while preserving management,
control, and security. Internal customers may or may not be billed for services
through IT chargeback.
In the public cloud model, a third-party provider delivers the cloud service over
the Internet. Public cloud services are sold on-demand, typically by the minute or the
hour. Customers only pay for the CPU cycles, storage, or bandwidth they consume.
Leading public cloud providers include Amazon Web Services (AWS), Microsoft
Azure, I.B.M./SoftLayer, and Google Compute Engine.
Hybrid cloud is a combination of public cloud services and on-premises
private cloud – with orchestration and automation between the two. Companies can
run mission-critical workloads or sensitive applications on the private cloud while
using the public cloud for bursty workloads that must scale on-demand. The goal of a
hybrid cloud is to create a unified, automated, scalable environment that takes
advantage of all that a public cloud infrastructure can provide, while still maintaining
control over mission-critical data.
Although cloud computing has changed over time, it has always been divided
into three broad service categories: infrastructure as a service (IaaS), platform as a
service (PaaS), and software as service (SaaS).
IaaS providers such as AWS supply a virtual server instance and storage, as
well as application program interfaces (APIs) that let users migrate workloads to a
virtual machine (VM). Users have allocated storage capacity and start, stop, access,
and configure the VM and storage as desired. IaaS providers offer small, medium,
large, extra-large, and memory- or compute-optimized instances, in addition to
customized instances, for various workload needs.
In the PaaS model, providers host development tools on their infrastructures.
Users access those tools over the Internet using APIs, Web portals, or gateway
software. PaaS is used for general software development, and many PaaS providers
will host the software after it's developed. Common PaaS providers include
Salesforce.com's Force.com, Amazon Elastic Beanstalk, and Google App Engine.
364
SaaS is a distribution model that delivers software applications over the
Internet; these are often called Web services. Microsoft Office 365 is a SaaS offering
for productivity software and e-mail services. Users can access SaaS applications
and services from any location using a computer or mobile device that has Internet
access.
367
Transparency and traceability - Consumers are demanding greater control
over their personal data. Transparency and traceability are fundamental in this
sense to meet regulatory requirements, maintain ethics in the use of
technology and halt the increase in mistrust of companies.
Edge computing - This branch of IT will have a big impact on the Internet of
Things (IoT) by making it possible for data generated by devices to be
processed locally, without it needing to be uploaded to the cloud or sent to an
external data center.
Blockchain - Blockchain stands out for its ability to undertake secure Internet
transactions without intermediaries, such as smart contracts that can be used
in urban management.
368
o Wi-Fi 6: this new standard for wireless connections is already at the test
stage and will provide greater coverage, security, speed and traffic
density.
o Data analysis and decision making: augmented analysis will be a
determining factor for business intelligence, data platforms and machine
learning.
o IoT for industry, transport and town planning: the standardization of
IoT will transform industry towards as a service models, improve
autonomous driving and vehicle connectivity, and contribute to the
development of smart cities.
o Voice search: more and more people are choosing to ask their devices
rather than writing their questions in the search box.
o Chatbot: these applications, thanks to the rise of AI, improve performance
when it comes to holding personalized conversations in real time with
users.
o Video streaming: streamed audiovisual content will continue to dominate
over other formats throughout 2020.
369
ICT Trend 2020, courtesy of Iberdrola .com
Let us reflect…
The Internet will become the platform for all information and computing, and if
the Internet will be the universal platform, then the universal user interface
application is the Internet browser. As a matter of fact, the browser is the only user
interface platform that runs anywhere- whether it is in Windows, IOS, Linux, Android,
370
and even in your wristwatch. If that is the case, you must master the ins and out of
the browser. As a student, do you see this truth and the coming trend that will have a
great impact, not only to your life, but to all humanity? If yes, how does this affect
your foundation of ICT? How does the coming technological innovation and
advancement form your foundation? Reflect on these things, do more, study more,
research more of the things discussed above, and with determination, faith,
diligence, and passion in ICT, success is not hard to find in your life. Above all,
commit all what you have in the hands of your Creator.
Name:__________________________________________ Score:_________
Course/Year/Section:__________________________ Date:__________
Professor/Instructor:__________________________________________
371
2. Give examples of gadgets that can be used in a personal area network (PAN).
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
372
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
Suggested Readings:
Books/Journals:
o Shaping the Future of ICT: Trends in Information Technology,
Communications Engineering, and Management/ Reaction Automata
Direct Graph (RADG) Design on Elliptic Curve Cryptography (chapter
24 ). Retrieved from https://www.researchgate.net/publication/
320624628_Shaping_the_Future_of_ICT_Trends_in_Information_Tech
nology_Communications_Engineering_and_Management_Reaction_A
utomata_Direct_Graph_RADG_Design_on_Elliptic_Curve_Cryptograp
hy_chapter_24
o Blockchain 2035: The Digital DNA of Internet 3.0 by Jared Tate and
Andrew Knapp
o The Future Is Faster Than You Think: How Converging Technologies
Are Transforming Business, Industries, and Our Lives (Exponential
373
Technology Series) Hardcover – January 28, 2020 by Peter H.
Diamandis and Steven Kotler
Websites:
REFERENCES
374