1.4 DATA REPRESETATION: BIT, BYTE AND CHARACTER.
BIT.
A bit (short for binary digit) is the smallest unit of data computer can process. The binary system is a number system that has just two unique digits, 0 and 1 called bits. A bit is represented by the number 1 and 0. These numbers represent the binary system. They correspond to the states of on and off, true and false, or yes and no.
BYTE
Byte is a unit of information built from bits. When 8 bits are grouped together as a unit, they form byte. Bits and bytes are the basis for representing all meaningful information and programs on computers.
CHARACTER
One byte is equal to 8 bits. One byte represents a single character such as the number, letter, or symbol. For example, the capital letter F is represented by binary code 01000110 that can be understood by the computer system.
Computer does not understand letters or numbers or pictures or symbols. Computer uses a binary system to count as it only recognizas two states that are 0 an 1. Number 9 is represented by binary code 00111001. Eight bits grouped together as a unit are called byte. A byte represents a single character in the computer.
1 byte = 8 bits = 1 character
There are three character codes or coding schemes to represent characters which are ASCII, EBCDIC and Unicode. Each byte contains eight bits. A byte provides enough different combination of 0s and 1s to represent 256 characters.
ASCII is the most widely used binary code for microcomputers (Personal Computer).
EBCDIC was developed by IBM and is used primary for large computer - mainframe and high end server.
The combinations of 0s and 1s are defined by patterns. These patterns are called coding system. The 256- character capability of ASCII and EBCDIC is too small to as Arabic, japanese and Chinese.
The Unicode coding schme is designed to solve this problem. It uses two bytes(16 bits) to represent one character. This gives it the capability for representing 65,536 different characters. This can cover all the world's languages. Unicode is downward-compatible with ASCII, meaning that Unicode can recognizes ASCII characters.
Unicode
2 bytes = 16 bits = 1character
Rabu, 17 Ogos 2011
Jumaat, 22 Julai 2011
1.3 INFORMATION PROCESSING CYCLE
input is any data or instructions that we enter into the computer system for processing. There are some common ways of feeding input data into the system, which are: typing on a keyboard and pointing with a mouse.
The processing unit controls all activities within the system. For every instructions, the control unit repeats a set of four basic operations called the machine cycle(fetch, decode, execute and store
Function of CPU
input is any data or instructions that we enter into the computer system for processing. There are some common ways of feeding input data into the system, which are: typing on a keyboard and pointing with a mouse.
The processing unit controls all activities within the system. For every instructions, the control unit repeats a set of four basic operations called the machine cycle(fetch, decode, execute and store
Function of CPU
- Fetch a program instructions or data item from memory
- Decode the program instructions into signals that computer can execute.
- Execute the instructions.
- Store (return) the result of instructions to the memory
- Interprets and carries out basic instructions that operate a computer
- Control unit direct and coordinates operations in computer
- Arithmetic logic unit(ALU) performs arithmetic, comparison, and logical operations
Arithmetic-logic unit performs two types of operations: arithmetic and logical. Arithmetic operations are fundamental math operations: addition, subtraction, multiplication, division. Logical operations consist of comparison.
The storage is a location in which data, instructions, and information are saved for future used. Every computer uses storage to hold system software and application software. There are two types of storage, which are primary storage and secondary storage.
Output is data that has been processed into a useful form, called information. There are four types of output, which are texts , graphics, audio and video.
Jumaat, 29 April 2011
CHAPTER 2 - COMPUTER SYSTEMS
1.0 System concept
1.1 Define Computer Systems.
Computer is an electronic device, operating under the control of instructions stored its own memory,
1.1 Define Computer Systems.
- that can accept data (input),
- process the data according to specified rules (process),
- produce results (output),
- and store the results for future use (storage).
- Input - input is any data and instructions entered into the memory of a computer. There are four types of input which are: text, graphics, audio, and video.
- Input device - Input device is any hardware component that allows users to enter data and intructions into a computer. Eg: keyboard, mouse, scanner, barcode reader. Also pointing device: mouse, joystick, trackball, touch screen, pointing stick and graphic tablets.'
- CPU/central processing unit - CPU is an electronic component on a computer's motherboard that interprets and carries out the basic instructions that operate the computer. Eg: intel pentium IV, AMD Athlon, G4.
- Output - output is data that has been processed into a useful form, called information.
- Output device - Eg: speaker, monitor, LCD projector, p\printer, plotter.
- Storage - storage is a location in which data, instructions, and information are saved for future use. Eg: CD ROM, diskette, hard disk.
Ahad, 3 April 2011
2.9 FRAUD, COPYRIGHT INFRINGEMENT, THEFT, and ATTACKS.
a) Computer fraud is the crime of obtaining money by deceiving (to trick) people through the use of computers. There are many forms of computer frauds which include
c)Computer theft is the defined as the unauthorized used of another person's property. Example of computer thefts are
Computers attack can be in the forms of
a) Computer fraud is the crime of obtaining money by deceiving (to trick) people through the use of computers. There are many forms of computer frauds which include
- e-mail hoaxes (hoax- an attempt to make people believe something that is not true)
- program fraud
- investment schemes
- sales promotion
- claim of expertise on certain fields
c)Computer theft is the defined as the unauthorized used of another person's property. Example of computer thefts are
- transfer of payment to the wrong accounts
- get online materials with no cost
- tap (memasuki) into the data transmission lines
Computers attack can be in the forms of
- Physical attack that disrupt the computer facilities or transmission lines.
- An electronic attack that
Sabtu, 2 April 2011
COMPUTER CRIMES
2.8 Need for cyber law
Examples of cyber abuse on the users
In today's highly digitalized world, almost everyone is affected by cyber law. Let us take a few examples:
- Almost all companies extensively depend upon their computer networks and keep their valuable data in electronic form.
- Government forms including income tax returns, company law forms etc are now filled in electronic forms.
- most people are using email, cell phones and SMS message for communication.
- sending a computer virus via e-mail.
- harassment through e-mail.
- hacking into school's database to charge your examination results.
Why we need cyberlaw
- Criminal activities can be brought to justice. If any criminal happen to customers, they can bring who.
- Cyber Laws are made to force people to be good, because individuals are more controlled by their passion and alone can't make them good, so laws were created to scare people in being 'good'.
- Customer is made to feel secure because bank protects their money.
- To give protection against the misuse of computers and computer criminal activities such as unauthorised use of programmes, illegal tranmission of data or messages over computers, hacking and cracking of computer systems and networks.
2.7 PROCESS OF FILTERING to control access to controversial contents.
The method of choice to limit access on the Internet is to filter either by
The method of choice to limit access on the Internet is to filter either by
- keyword blocking.This method uses a list of banned word objects terms such as xxx, sex and nude. As the page is downloading, the filter searches for any these words. If found, it will blocked the page completely, stop downloading the page, block the banned words and even shut down the browser.
- Site blocking. This method use software to list the web sites that will be blocked by using software. The software also prevents user from being access the web sites on list.
- Web rating system. Web sites are rating in terms of nudity, sex violence and language. The web sites rates can be done by setting the browser to only accept pages with certain level of ratings.
Sabtu, 19 Mac 2011
CONTROVERSIAL CONTENTS AND CONTROL
2.6 Effect of controversial contents (PORNOGRAPHY and SLANDER) on society :
Pornography
Pornography is any form of media or material (like books, video or photos) that show erotic behaviour and intended to cause sexual excitement. The effects of pornography on society are :
Slander
Slander is a false spoken statements about someone, intended to damage his or her reputation. The effects of slander on society are :
Pornography
Pornography is any form of media or material (like books, video or photos) that show erotic behaviour and intended to cause sexual excitement. The effects of pornography on society are :
- Can lead to criminal acts such as exploitation of women.
- Can lead to sexual addiction.
- Can develop lower moral values towards other people.
- Can erode good religious, cultural, behaviours and beliefs.
Slander
Slander is a false spoken statements about someone, intended to damage his or her reputation. The effects of slander on society are :
- Can develop society that disregards on honesty and truth
- Can lead to bad habits of spreading rumors and untruth
- Can cause people to have negative attitudes towards another person.
Selasa, 15 Mac 2011
2.5 AUTHENTICATION technologies.
Authentication is a process where user verifies their identity. Authentication deals with the problem of determining whether a user should be allowed access to a particular system. Four commonly authentication methods:
a. User identification (something you know - have to remember). User identification is a unique combination of
character (letter, number or symbol) that identify specific user. Examples of user identification are pin number and password.
b. Possessed object (something you have - an object). A possessed object is any item that you must carry to gain access to computer or computer facility. Examples of possessed objects are ATM card, credit card, key,security token and smart card. The card you use in an automated teller machine (ATM) is a possessed object that allows access to your bank account.
c. Biometric device (something you are - part of user's body) is a devices that translates personal characteristic into digital code that is compared with the digital code stored in the database. E.g. of biometric devices are fingerprint reader, hand geometry reader, iris scanner, signature verification system.
d. Callback system is a checking system that authenticates the user. The callback system is commonly used in the bank operation and business transaction. For example, when you called a McDonald Delivery Services, the operator will ask you to hang up since he wants to link you with the other worker.
a. User identification (something you know - have to remember). User identification is a unique combination of
character (letter, number or symbol) that identify specific user. Examples of user identification are pin number and password.
b. Possessed object (something you have - an object). A possessed object is any item that you must carry to gain access to computer or computer facility. Examples of possessed objects are ATM card, credit card, key,security token and smart card. The card you use in an automated teller machine (ATM) is a possessed object that allows access to your bank account.
c. Biometric device (something you are - part of user's body) is a devices that translates personal characteristic into digital code that is compared with the digital code stored in the database. E.g. of biometric devices are fingerprint reader, hand geometry reader, iris scanner, signature verification system.
hand geometry reader |
d. Callback system is a checking system that authenticates the user. The callback system is commonly used in the bank operation and business transaction. For example, when you called a McDonald Delivery Services, the operator will ask you to hang up since he wants to link you with the other worker.
Privacy
2.4 Ways for making personal data more private
1. Purchase goods with cash, rather than credit card.
2. Install personal firewall.
3. Clear your history file when you are finished browsing.
4. Have unlisted telephone number.
5. Fill in only necessary information on warranty and registration form.
1. Purchase goods with cash, rather than credit card.
2. Install personal firewall.
3. Clear your history file when you are finished browsing.
4. Have unlisted telephone number.
5. Fill in only necessary information on warranty and registration form.
2.3 INTELLECTUAL PROPERTY LAWS
Intellectual Property laws cover ideas, inventions, literary creactions, unique names, business modals, industrials processes, computer program codes and many more.
Four types Intellectual property
a. Patents for inventions
b. Trademark for brand identity
c. Copyright for materials
Four types Intellectual property
a. Patents for inventions
b. Trademark for brand identity
c. Copyright for materials
Jumaat, 4 Mac 2011
Rabu, 2 Mac 2011
1.3 USAGE of ICT IN EVERYDAY LIFE
EDUCATION
Today, most schools and higher educational institutions have computers in the classroom for teacher and students. In education, teachers, students, researchers and school administrators benefits from the usage of ICT.
1. Teachers use computers to research for teaching materials, participate in online forums and online conferences as well as to aid their teaching.
2. Students use the computers as a reference tool. They use computers to browse the Internet to look for information.
3. School administrators use computers for administrative purposes to make sure that the entire operation runs smoothly.
BANKING
The computer is the nerve centre of the banking system around the world. It functions to control the entire banking system that also includes 'Electronic Banking Services'. Electronic banking provides 24 hour services. The services include :
• Automated Teller Machine (ATM)
• Cheque Deposit
• Electronic Fund Tranfer
• Direct Deposit
• Pay by phone system
• Personal computer banking/ internet banking
In the banking sector, customers, businessman and bank administrator benefits from the usage of ICT.
1. Customers can make any transactions at the 24 hour service centres or via online.These services allow them to do transaction at anytime they want.
2. Businessmen can save their time by using the online services offered by banks. They can access company accounts for loan applications, business transactions and update on their cash flow at any time.
3. Bank administrators can oversee the entire banking activities such as reconciliations, inter-branch transactions (IBT), telegraphic
transfer and others by referring to the banking system.
INDUSTRY
Computers are used to facilitate production planning and control systems, to support chain management and to help in product design in the industrial sector In the industrial sector ,workers, researchers and administrator benefits from the usage of ICT.
1. Workers use machines that are connected to computers to operate. In some productions, robots are used to take over jobs that are dangerous to the workers.
2. Researchers use computers to analyze and collect research data for future reference.
3. Administrators use computers to oversee the entire operations in the plant or factory to detect specific errors or defects that occurred in the process.
E-COMMERCE
E-commerce helps in boosting the economy. It makes buying and selling activities easier, more efficient and faster. For this application, computers, Internet and shared software are needed.
In the e-commerce sector ,customers r, suppliers and employees benefits from the usage of ICT.
1. Customers use computers to be connected online with suppliers to purchase products. This method can save time and cost as they do not have to go to any outlets.
2. Suppliers use computers to keep track of their transactions. All products are bar coded and can be read by the computer scanner to help in determining prices and managing inventory.
4. Employees use computers and telephones to communicate with their customers for any enquiries. The system helps employees to get the latest updates on inventory to be informed to the customers.
OTHER SECTOR
- Architectute
- Arts
- Career
- Healthcare
- Home
Sabtu, 26 Februari 2011
Differentiate between ethics and law
Ethics
- As a guideline to computer users
- Computers users are free to follow or ignore the code of ethics.
- Universal, can be applied anywhere, all over the world.
- To produced ethical computer users.
- Not following ethics are called immoral.
Law
- As a rule to control computer users.
- Computers users must follow the regulations and law.
- Depend on country and state where the crime is committed.
- To prevent misuse of computers.
- Not obeying laws are called crime
1.5 IMPACT OF ON SOCIETY
Positive Impact
- Faster communication speed. With the internet, news or messages are sent via e-mail to anyone efficiently. With the capability of broadband and speed of connection on the Internet, any information can be travel faster.
- Lower communication cost. With the Internet, we do not have to pay any basic services provided by in the internet. Furthermore, the cost of the connection to the internet is relatively cheap.
- People can be share opinions and information through discussion groups and forums through internet.
- Information can be stored and retrieved through the digital medium instead of paper.(paperless environment)
- Information and communication can be borderless through internet. By using internet, people all around the world can be connected through each other.
Negative impact
- Borderless information at time can be negative because it courage people to access pornography and violence web sites. It can cause low moral values. It also can created problems such as gambling, information theft fraud.
- Computers can harm users if they use for long hours frequently.
1.4 Difference between computerized and non-computerised
1.4.1 Banking
Computerized
1.4.2 Industry
Non-computerized
Computerized
- All banking activities are done by using computer system
- Transaction can be done anywhere and anytime
- It takes shorten time for any banking process
- more productive
- All banking activities were done manually
- Transaction can only be made during working hours
- It takes long time for any banking process
- less productive
1.4.2 Industry
Non-computerized
- Production was fast: can be increased through an all day operation
- Production was slow because done manually and depended on human labour
1.4.2 Education
Computerized
- Teachers use computers to research for teaching materials, participate in online forums and online conferences
- Teachers use Chalk and talk for teaching, and conferences
teaching use computer |
teacher use chalk |
Langgan:
Catatan (Atom)