Rabu, 17 Ogos 2011

1.4 DATA REPRESETATION: BIT, BYTE AND CHARACTER. 


BIT.
A bit (short for binary digit) is the smallest unit of data computer can process. The binary system is a number system that has just two unique digits, 0 and 1 called bits. A bit is represented by the number 1 and 0. These numbers represent the binary system. They correspond to the states of on and off, true and false, or yes and no.

BYTE
Byte is a unit of information built from bits. When 8 bits are grouped together as a unit, they form byte. Bits and bytes are the basis for representing all meaningful information and programs on computers.

CHARACTER
One byte is equal to 8 bits. One byte represents a single character such as the number, letter, or symbol. For example, the capital letter F is represented by binary code 01000110 that can be understood  by the computer system.
Computer does not understand letters or numbers or pictures or symbols. Computer uses a binary system to count as it only recognizas two states that are 0 an 1. Number  9 is represented by binary code 00111001. Eight bits grouped together as a unit are called byte. A byte represents a single character in the computer.
                                         1 byte = 8 bits = 1 character
There are three character codes or coding schemes to represent characters which are ASCII, EBCDIC and Unicode. Each byte contains eight bits. A byte provides enough different combination of 0s and 1s to represent 256 characters.
ASCII is the most widely used binary code for microcomputers (Personal Computer).
EBCDIC was developed by IBM and is used primary for large computer - mainframe and high end server.
The combinations of 0s and 1s are defined by patterns. These patterns are called coding system. The 256- character capability of ASCII and EBCDIC is too small to as Arabic, japanese and Chinese.
The Unicode coding schme is designed to solve this problem. It uses two bytes(16 bits) to represent one character. This gives it the capability for representing 65,536 different characters. This can cover all the world's languages. Unicode is downward-compatible with ASCII, meaning that Unicode can recognizes ASCII characters.
                                                        Unicode
                                      2 bytes = 16 bits = 1character

Jumaat, 22 Julai 2011

1.3 INFORMATION PROCESSING CYCLE

input is any data or instructions that we enter into the computer system for processing. There are some common ways of feeding input data into the system, which are: typing on a keyboard and pointing with a mouse.

The processing unit controls all activities within the system. For every instructions, the control unit repeats a set  of four basic operations called the machine cycle(fetch, decode, execute and store


Function of CPU

  1. Fetch a program instructions or data item from memory
  2. Decode the program instructions into signals that computer can execute.
  3. Execute the instructions.
  4. Store (return) the result of instructions to the memory
  5. Interprets and carries out basic instructions that operate a computer
  6. Control unit direct and coordinates operations in computer
  7. Arithmetic logic unit(ALU) performs arithmetic, comparison, and logical operations
The central processing unit consist of two part: the control unit (CU) and the arithmetic logic unit (ALU). Each part has specified functions. The control unit tells us rest of the computer system how to carry out a program's instructions. It directs the movement of electronic signals between memory, which temporarily holds data, instructions and processed information, and the arithmetic-logic unit. It also directs these controls signals between the CPU and input and output devices.

Arithmetic-logic unit performs two types of operations: arithmetic and logical. Arithmetic operations are fundamental math operations: addition, subtraction, multiplication, division. Logical operations consist of comparison.

The storage is a location in which data, instructions, and information are saved for future used. Every computer uses storage to hold system software and application software. There are two types of storage, which are primary storage and secondary storage.

Output is data that has been processed into a useful form, called information. There are four types of output, which are texts , graphics, audio and video.   


    Jumaat, 29 April 2011

    CHAPTER 2 - COMPUTER SYSTEMS

    1.0  System concept

    1.1  Define Computer Systems.


    Computer is an electronic device, operating under the control of instructions stored its own memory,
    • that can accept data (input),
    • process the data according to specified rules (process),
    • produce results (output),
    • and store the results for future use (storage).
    Meaning of input, process, output and storage.
    1. Input - input is any data and instructions entered into the memory of a computer. There are four types of input which are: text, graphics, audio, and video.
    2. Input device - Input device is any hardware component that allows users to enter data and intructions into a computer. Eg: keyboard, mouse, scanner, barcode reader. Also pointing device: mouse, joystick, trackball, touch screen, pointing stick and graphic tablets.'
    3. CPU/central processing unit - CPU is an electronic component on a computer's motherboard that interprets and carries out the basic instructions that operate the computer. Eg: intel pentium IV, AMD Athlon, G4.
    4. Output - output is data that has been processed into a useful form, called information.
    5. Output device - Eg: speaker, monitor, LCD projector, p\printer, plotter.
    6. Storage - storage is a location in which data, instructions, and information are saved for future use. Eg: CD ROM, diskette, hard disk.

    Ahad, 3 April 2011

    2.9 FRAUD, COPYRIGHT INFRINGEMENT, THEFT, and ATTACKS.


    a) Computer fraud is the crime of obtaining money by deceiving (to trick) people through the use of                computers. There are many forms of computer frauds which include

    • e-mail hoaxes (hoax- an attempt to make people believe something that is not true)
    • program fraud
    • investment schemes
    • sales promotion
    • claim of expertise on certain fields
    b) Copyright infringement is defined as a violation (an action to break the law) of the rights secured by a copyright. Copyright is the legal right to be the only producer seller of a book, song and film. Infringement of copyright occurs when you break the copyright laws such as copying movies, software or CD's illegally - selling pirate software. Piracy is the crime of illegally copying and selling books, tapes, videos, computer programs.

    c)Computer theft is the defined as the unauthorized used of another person's property. Example of computer thefts are

    • transfer of payment to the wrong accounts
    • get online materials with no cost
    • tap (memasuki) into the data transmission lines
    d)Computer attack is defined as any activities taken to disrupt (causing problems so that something cannot continue normally) the equipment of computers systems, change processing  controls and corrupt stored data. Corrupt - when data on a computer becomes corrupt, it is spoilt and cannot be properly used because it has become changed in wrong ways.

    Computers attack can be in the forms of

    • Physical attack that disrupt the computer facilities or transmission lines.
    • An electronic attack that

    Sabtu, 2 April 2011

    COMPUTER CRIMES

    2.8 Need for cyber law

    In today's highly digitalized world, almost everyone is affected by cyber law. Let us take a few examples: 
    • Almost all companies extensively depend upon their computer networks and keep their valuable data in electronic form.
    • Government forms including income tax returns, company law forms etc are now filled in electronic forms.
    • most people are using email, cell phones and SMS message for communication.

    Examples of cyber abuse on the users
    • sending a computer virus via e-mail.
    • harassment through e-mail.
    • hacking into school's database to charge your examination results.
    Why we need cyberlaw
    1. Criminal activities can be brought to justice. If any criminal happen to customers, they can bring who.
    2. Cyber Laws are made to force people to be good, because individuals are more controlled by their passion and alone can't make them good, so laws were created to scare people in being 'good'.
    3. Customer is made to feel secure because bank protects their money.
    4. To give protection against the misuse of computers and computer criminal activities such as unauthorised use of programmes, illegal tranmission of data or messages over computers, hacking and cracking of computer systems and networks.
    2.7  PROCESS OF FILTERING to control access to controversial contents.

    The method of choice to limit access on the Internet is to filter either by

    • keyword blocking.This method uses a list of banned word objects terms such as xxx, sex and nude. As the page is downloading, the filter searches for any these words. If found, it will blocked the page completely, stop downloading the page, block the banned words and even shut down the browser.
    • Site blocking. This method use software to list the web sites that will be blocked by using software. The software also prevents user from being access the web sites on list.
    • Web rating system. Web sites are rating in terms of nudity, sex violence and language. The web sites rates can be done by setting the browser to only accept pages with certain level of ratings.

    Sabtu, 19 Mac 2011

    CONTROVERSIAL CONTENTS AND CONTROL

    2.6  Effect of controversial contents (PORNOGRAPHY and SLANDER) on society :
          Pornography
    Pornography is any form of media or material (like books, video or photos) that show erotic behaviour and intended to cause sexual excitement. The effects of pornography on society are :

    • Can lead to criminal acts such as exploitation of women.
    • Can lead to sexual addiction.
    • Can develop lower moral values towards other people.
    • Can erode good religious, cultural, behaviours and beliefs.


            Slander
    Slander is a false spoken statements about someone, intended to damage his or her reputation. The effects of slander on society are :

    • Can develop society that disregards on honesty and truth
    • Can lead to bad habits of spreading rumors and untruth
    • Can cause people to have negative attitudes towards another person.

    Selasa, 15 Mac 2011

    2.5 AUTHENTICATION technologies.

    Authentication is a process where user verifies their identity. Authentication deals with the problem of determining whether a user should be allowed access to a particular system. Four commonly authentication methods:

    a. User identification (something you know - have to remember). User identification is a unique combination of
    character (letter, number or symbol) that identify specific user. Examples of user identification are pin number and password.


    b. Possessed object (something you have - an object). A possessed object is any item that you must carry to gain access to computer or computer facility. Examples of possessed objects are ATM card, credit card, key,security token and smart card. The card you use in an automated teller machine (ATM) is a possessed object that allows access to your bank account. 
                                  




    c. Biometric device (something you are - part of user's body) is a devices that translates personal characteristic into digital code that is compared with the digital code stored in the database. E.g. of biometric devices are fingerprint reader, hand geometry reader, iris scanner, signature verification system. 


    hand geometry reader








    d. Callback system is a checking system that authenticates the user. The callback system is commonly used in the bank operation and business transaction. For example, when you called a McDonald Delivery Services, the operator will ask you to hang up since he wants to link you with the other worker.

    Privacy

    2.4 Ways for making personal data more private
      
    1. Purchase goods with cash, rather than credit card.
    2. Install personal firewall.
    3. Clear your history file when you are finished browsing.
    4. Have unlisted telephone number.
    5. Fill in only necessary information on warranty and registration form.

    2.3 INTELLECTUAL PROPERTY LAWS

    Intellectual Property laws cover ideas, inventions, literary creactions, unique names, business modals, industrials processes, computer program codes and many more.

    Four types Intellectual property
    a. Patents for inventions
    b. Trademark for brand identity
    c. Copyright for materials

    Jumaat, 4 Mac 2011

    Rabu, 2 Mac 2011

    1.3 USAGE of ICT IN EVERYDAY LIFE

    EDUCATION
    Today, most schools and higher educational institutions have computers in the classroom for teacher and students. In education, teachers, students, researchers and school administrators benefits from the usage of ICT.
    1. Teachers use computers to research for teaching materials, participate in online forums and online conferences as well as to aid their teaching.
    2. Students use the computers as a reference tool. They use computers to browse the Internet to look for information.
    3. School administrators use computers for administrative purposes to make sure that the entire operation runs smoothly.

    BANKING
    The computer is the nerve centre of the banking system around the world. It functions to control the entire banking system that also includes 'Electronic Banking Services'. Electronic banking provides 24 hour services. The services include :
    • Automated Teller Machine (ATM)
    • Cheque Deposit
    • Electronic Fund Tranfer
    • Direct Deposit
    • Pay by phone system
    • Personal computer banking/ internet banking
    In the banking sector, customers, businessman and bank administrator benefits from the usage of ICT.
    1. Customers can make any transactions at the 24 hour service centres or via online.These services allow them to do transaction at anytime they want.
    2. Businessmen can save their time by using the online services offered by banks. They can access company accounts for loan applications, business transactions and update on their cash flow at any time.
    3. Bank administrators can oversee the entire banking activities such as reconciliations, inter-branch transactions (IBT), telegraphic
    transfer and others by referring to the banking system.

    INDUSTRY
    Computers are used to facilitate production planning and control systems, to support chain management and to help in product design in the industrial sector In the industrial sector ,workers, researchers and administrator benefits from the usage of ICT.
    1. Workers use machines that are connected to computers to operate. In some productions, robots are used to take over jobs that are dangerous to the workers.
    2. Researchers use computers to analyze and collect research data for future reference.
    3. Administrators use computers to oversee the entire operations in the plant or factory to detect specific errors or defects that occurred in the process.

    E-COMMERCE
    E-commerce helps in boosting the economy. It makes buying and selling activities easier, more efficient and faster. For this application, computers, Internet and shared software are needed.
    In the e-commerce sector ,customers r, suppliers and employees benefits from the usage of ICT.
    1. Customers use computers to be connected online with suppliers to purchase products. This method can save time and cost as they do not have to go to any outlets.
    2. Suppliers use computers to keep track of their transactions. All products are bar coded and can be read by the computer scanner to help in determining prices and managing inventory.
    4. Employees use computers and telephones to communicate with their customers for any enquiries. The system helps employees to get the latest updates on inventory to be informed to the customers.
    OTHER SECTOR
    1. Architectute
    2. Arts
    3. Career
    4. Healthcare
    5. Home

    Sabtu, 26 Februari 2011

    Differentiate between ethics and law

    Ethics

    • As a guideline to computer users 
    • Computers users are free to follow or ignore the code of ethics.
    • Universal, can be applied anywhere, all over the world.
    • To produced ethical computer users.
    • Not following ethics are called immoral.
    Law

    • As a rule to control computer users.
    • Computers users must follow the regulations and law.
    • Depend on country and state where the crime is committed.
    • To prevent misuse of computers.
    • Not obeying laws are called crime

    1.5 IMPACT OF ON SOCIETY

    Positive Impact

    1. Faster communication speed. With the internet, news or messages are sent via e-mail to anyone efficiently. With the capability of broadband and speed of connection on the Internet, any information can be travel faster.
    2. Lower communication cost. With the Internet, we do not have to pay any basic services provided by in the internet. Furthermore, the cost of the connection to the internet is relatively cheap.
    3. People can be share opinions and information through discussion groups and forums through internet.
    4. Information can be stored and retrieved through the digital medium instead of paper.(paperless environment)
    5. Information and communication can be borderless through internet. By using internet, people all around the world can be connected through each other.
    Negative impact
    1. Borderless information at time can be negative because it courage people to access pornography and violence web sites. It can cause low moral values. It also can created problems such as gambling, information theft fraud.
    2. Computers can harm users if they use for long hours frequently.

      1.4 Difference between computerized and non-computerised

      1.4.1 Banking
      Computerized
      • All banking activities are done by using computer system
      • Transaction can be done anywhere and anytime
      • It takes shorten time for any banking process
      • more productive
      Non-computerized
      • All banking activities were done manually
      • Transaction can only be made during working hours
      • It takes long time for any banking process
      • less productive


      1.4.2 Industry
      Non-computerized
      • Production was fast: can be increased through an all day operation
      Computerized
      • Production was slow because done manually and depended on human labour


      1.4.2 Education
      Computerized
      • Teachers use computers to research for teaching materials, participate in online forums and online conferences
      Non-computerized
      • Teachers use Chalk and talk for teaching, and conferences
      teaching use computer
      teacher use chalk