You are on page 1of 11

CONTROVERSIAL CONTENTS AND CONTROL 2.

6 List effects of controversial contents (PORNOGRAPHY and SLANDER) on society: Pornography is any form of media or material (like books, video or ~, > a o+ a ii. Can lead to sexual addiction. iii. Can develop lower moral values towards other people. iv. Can erode good religious, cultural, behaviours and beliefs. Slander is a false spoken statement about someone, intended to damage his or her reputation. The effects of slander on society are: rii. Can lead to bad habits of spreading rumors and untruth iii. Can cause people to have negative attitudes towards another 2.7 Describe the PROCESS OF FILTERING to control access to controversial contents. The method of choice to limit access on the Internet is to filter either by a. Keyword blocking. The method uses a list of banned word or objects terms such as xxx, sex and nude. As the page is downloading, the filter searches for any these words. If found, it will blocked the page completely, stop downloading the page, block the banned words and even shut down the browser. b. Site blocking. This method use software to list the web sites that will be blocked by using software. The software also prevents users from being access the web sites on list. c. Web rating system. Web sites are rating in terms of nudity, sex, violence and Internet Filtering w A MR up

OR

AA

04

MR

Site Name X_________________________

.ru I CK CRIMES

2.8 Explain the NEED FOR CYBER LAW In today's highly digitalized world, almost everyone is affected by cyber law. Let us take a few examples: . Almost all companies extensively depend upon their computer networks and keep their valuable data in electronic form. . Government forms including income tax returns, company law forms etc are now filled in electronic form. . Most people are using email, cell phones and SMS messages for communication. Examples of Cyber abuse on the users : sending a computer virus via e-mail . harassment through e-mail. : hacking into your school's database to change your examination results. Why we need cyberlaw

in

r
1 N N i" h li

Criminal activities can be brought to justice. If any criminal happen to customers, they can bring who 2. Customer is made to feel secure because bank protects their money. 3. Cyber Laws are made to force people to be good, because individuals are more controlled by their passion and education alone can't make them good, so laws were created to scare people in being 'good'. 4. To give protection against the misuse of computers and computer criminal activities such as unauthorised use of programmes, illegal transmission of data or messages over computers, hacking and cracking of computer systems and networks 2.9 Explain briefly the computer crimes: FRAUD COPYRIGHT INFRINGEMENT, THEFT and ATTACKS. a) Computer fraud is the crime of obtaining money by deceiving (to trick) people through the use of computers. There are many forms of computer frauds which include i) e-mail hoaxes (hoax - an attempt to make people believe something that is not true), ii) program fraud iii) investment schemes iv) sales promotions v) claim of expertise on certain fields. b) Copyright infringement is defined as a violation (an action to break the law) of the rights secured by a copyright. Copyright is the legal right to be the only producer or seller of a book, song and film. Infringement of copyright occurs when you break the copyright laws such as copying movie, software or CD's illegally - selling pirate software. Piracy is the crime of illegally copying and selling books, tapes, videos, computer programs.

1.

A computer infected by a virus, worm, or Trojan horse often has one or more of the following symptoms: i) ii) iii) iv) v) ii) Screen displays unusual message or image. Music or unusual sound plays randomly. Available memory is less than expected. Existing programs and files disappear. Files become corrupted.

Hacking Hacking refer to unauthorized access to the co mputer system by a hacker. A hacker is a perso n who accesses a co mputer or netwo rk illegally. A hacker has advanced computer and network skills.

iii) Nature Threats (Act of god)

Computers are also threatened by natural or environmental disaster. Examples of natural and environmental disasters are flood, fire, earthquakes, storms, tornados, excessive heat and inadequate power. iv) Theft Two types of theft a. Computer is used to steal money, goods, information and resources. b.. Stealing of computers especially notebook and PDA. Three approaches to prevent theft: a. Prevent access by using locks, smart card or password. b. Prevent portability by restricting the hardware from being moved. c. Detect and guard all exits and record any hardware. W

3.3 State the FUNCTIONS OF OS. a. Starting a computer. The process of starting or restarting a computer is called booting. b. Provide a user interface. We interact with software through its user interface. That is, user interface controls how you enter data and instructions and how information is displayed on the screen. Three types of user interface are i) Command Line Interface (CLI) ~ ii) Menu Driven Interface iii Graphical User Interface (GUI) Command Driven Interface Menu Driven Interface Icon Driven Interface

c. Managing Programs. Some operating systems support a single user and only one running program at a time. Others support thousands of users running multiple programs. d. Managing Memory. The computera operating system is responsible for managing memory such as : a) Allocating data and instruction to an area of memory while being processed. b) Monitoring the contents of memory e. Configuring Devices. A driver, short for device driver, is a small program that tells the operating system how to communicate with specific device. Each device on a computer, such as a mouse, keyboard, monitor, printer, digital camera, card reader and scanner, has its own specialized set of commands and thus requires its own specific driver.

INTERFACES OF OPERATING SYSTEM. A user interface can be defined as the combination of hardware and software that helps people and computers communicate with each other. Your computer's user interface a display device, mouse a. Command line interface (e.g DOS - Disk Operating System) The command-line user interface requires a user to type commands or press special keys on the keyboard to enter data and instructions that instruct the operating system what to do. It has to be typed one line at a time. For example, if we want to rename a filename from ABC.txt to DEF.txt we use the following command. C:>rename abc.txt def.txt

i"

b.

Menu driven interface Menu driven user interface enables the user to avoid memorizing keywords such as copy, paste and syntax. On screen, menu-drive interface provide menus as means of entering commands. It shows all the options available at a given point in a form of text-based menu.

c.

Graphical user interface (e.g Windows XP) Graphical user interface makes use of the computer's graphics capabilities to make the operating system and programs easier to use, which is also called 'userfriendly' Graphical user interface interact with visual images such as buttons, icons and other graphical objects to issue commands. On the desktop, we can initiate many actions by clicking icons that represent computer resources such as files, programs and network connections.

3.4 State the different INTERFACES OF OS.,

Command Line Interface (DOS) User have to memorise all the syntax to issue command Difficult to use Not user friendly Take a long time to learn. APPLICATION SOFTWARE 3.5 State the types of APPLICATION SOFTWARE

Graphical User Interface (Windows/Linux) User have not to memorise all the syntax to issue command Easy to use User friendly Take a short time to learn.

Examples Type of software Proprietary Microsoft Word Corel Word Perfect EasyWord Microsoft Excel Corel Quattro Pro EasySpreadsheet Microsoft PowerPoint Corel Presentations EasyPresentation Adobe Photoshop Adobe Illustrator Corel Draw )asc Paint Shop Pro Ulead Photoimpact Open Source KWord OpenOffice Write AbiWord Kspread OpenOffice Calc GNumeric Kpresenter OpenOffice Impress Agnubis GIMP Inkscape PhotoScape Paint.Net CinePaint

1. Word processing

2. Spreadsheet

3. Presentation

4. Graphic Editor

O o n O M W

CHAPTER 3 COMPUTER NETWORKS AND COMMUNICATIONS

IN No IN

1.0 1.1

BASIC CONCEPTS OF COMPUTER NETWORKS (a) Define COMPUTER NETWORKS. A computer network is a collection of computers and devices connected together via communications devices and transmission media. For examples it may connect computers, printers and scanners. (b) Define COMMUNICATION Transmission media Physical Infrared Radiowav e

Devices - printer, Communication devices NIC Hub Router

r
1.2

Communication describes a process in which two or more computer or devices transfer data, instructions and information. State the IMPORTANCE/ADVANTAGES OF COMPUTER NETWORKS i) ii) iii) Sharing of devices such as printer and scanner. Sharing of program/software. Sharing of files. Sharing of data. Sharing of information. Sharing of single high-speed internet connection.

iv)
iv) v)

vi) Can access server centered database. vii) Better communication using internet services such as e-mail, mailing list and Internet Relat Chat (IRC). Notes :

TYPES OF NETWORK
LAN, MAN, WAN

: NETWORK TOPOLOGIES I Star, Bus, Ring

NETWORK ARCHITECTURE
Client/Server, Peer to Peer

NETWORK COMMUNICATIONS TECHNOLOGY


Intranet, Extranet, Internet

No

1.3 Define TYPES OF NETWORKS Type of networks are the physical arrangement of computers or devices in a network by AREA . There are three type of networks. is a network that connects computers and devices in a limited qeoqraphical area such as a home, school computer laboratory, office building. is a network that connects computers and devices in a metronolitan area such as city or town. A MAN typically includes one or more LAN but covers a smaller geographic area than a WAN. is a network that connects computers and devices in a larqe qeoqraahical area such as country or the world. A WAN can be one large network or can consist of two or more LANs connected together. The internet is the worlds larqest WAN.

Local Area Network (LAN)

O N
on on on on no in on in in

Metropolitan Area Network (MAN)

Wide Area Network (WAN) ,

DIFFERENTIATE between the two types of computer networks. WAN connects computers and devices in a larqe qeoqraphical area In case of WAN the cost of data transmission is very high because the transmission mediums used are hired either telephone lines or satellite links. The speed of data transmission is lower than LAN. Different LAN connects computers and devices in a limited qeoqraphical area

Geographical Area

Cost

Cost of data transmission in LAN is less because the transmission medium is owned by a single organization. The speed of data transmission is much higher in LAN than in WAN.

Speed

Wide Area Network(WAN) is

a network that connects computers and

devices in a large geographical area WHILE Local Area Network (LAN) connects computers and devices in a limited geographical area

O
on

1.5 State three types of NETWORK TOPOLOGIES: Network topology is the devices in a network by i) Ring Topology On a ring network, a cable forms a closed loop (ring) with all computers and devices arranged along the ring. Data transmitted on the ring network travels from device to device around the entire ring, in one direction. When a computer or device send data, the data travels to each computer on the ring until it reaches its destination. CONCEPT. sical arrangement of computers or

o n

If computer or device on a ring network fails, all devices before the failed device are unaffected, but those after the failed device cannot function. A ring network can span a larger distance than a bus network, but it is more difficult to install. The ring topology primarily is used for LANs, but also is used in WANs. Advantages : Require less cable. . No data collision exist between node. ii) Bus Topology A bus network consists of a single central cable, to which all computers and other devices connect. The bus is physical cable that connects the computers and others devices. The bus in a bus network transmits data, instructions, and information and information in both directions. When sending device transmits data, the address of the receiving device is included with the. transmission so the data is routed to the appropriate receiving device. Bus networks are popular on LANs because they are inexpensive and easy to install. One advantage of the bus network is that computers and other devices can be attached and detached at any point on the bus without disturbing the rest of the computer. The transmission simply by passes the failed device. Disadvantages . If any node fails, the entire network stop working. : There will be a limit on the distance between nodes.

Advantages . Network can easily be extended, by adding new node to the backbone. Failure of a node, doesn't affect the entire network. . No distruptions to the network when connecting and removing nodes. . Require less cable

Disadvantages : If the backbone cable fails, the entire network stop working. : Terminators are required at both ends of the backbone cable. . Network speed decrease when the number of nodes increase.

r r
in

On a star network, all of the computers and devices (node) on the network connect to central device, thus forming a star. The central device that provides a common connection point for nodes on the network is called the hub. Data transmitted on the star network travels from device to device passes through the hub, in both direction. Similar to a bus network, star networks are fairly easy to install and maintain. Nodes can be added to and removed from the network. On star network, if one node fails, one that node effected. The other nodes continue to operate normally. If the hub fails, however, the entire network inoperable until the hub is repaired. Most star networks, therefore, keep backup hubs available in case primary hub fails. A star network generally requires more cable.

Advantages : Easy to expand the network. You only add node to the hub. : Failure of a node, doesn't affect the entire network. . No distruptions to the network when connecting and removing nodes. Easy to install and wire.

Disadvantages : If the hub fails, the entire network stop working. : Require more cable. : Network speed decrease when the number of nodes increase.

'

01 10
tw go on
IN

1.6 Differentiate between the THREE TYPES OF NETWORK TOPOLOGY. Topology Configuration Bus Ring Star

Central Device Data transmitted Installation and Maintenance If one node fails

Not available Both Direction Easy Does not effect the rest of nodes

Not available One Direction Difficult The entire network stop working

Hub or Switch Both Direction Easy Does not effect the rest of nodes

Propose a suitable wired network topology for the computer laboratory and justify(explain) your proposal. Topology : _____________ )ustification :

r
to r

1.8 Describe the types of NETWORK COMMUNICATIONS TECHNOLOGY: ~ Technology Explanation An internet is a public network. It is worldwide collection of networks that links millions of businesses, government agencies, educational institutions and individuals. An intranet is a private network within an organization that resembles the internet. Organizations use intranets to provide information to their employees. Typical applications include electronic telephone directories, email addresses, employee information, internal job openings, and much more. Employees find surfing their organizational intranets to be as easy and as intuitive as surfing the Internet. Like the public internet, intranet use browsers, web sites, and web pages. Intranet typically provides e-mail, mailing lists, newsgroup, and FTP services accessible only to those within the organization. An extranet is a private network that connects more than one organizations. Many organizations use the Internet technologies to allow suppliers, customers and business partner limited access to their networks. The purpose is to increase efficiency and reduce costs. For examples, Generals Motors has thousands of suppliers for parts that go into making an automobile, By having access to the production schedules, suppliers can schedule and deliver parts as they are needed at the General Motors assembly plants. In this way, General Motors can be assured of having adequate parts without maintaining large inventories Business Partner

Internet

Intranet

Extranet

7
I ,_

: 00
,

Extranet
connects more than one organizations (business partner, customer and supplier) ~ Customer

r 0 ! \

Employees

'Intranet

provide information to their employees.

Supplier

State the differences between internet, intranet and extranet. Differences Used for Types of users Internet Public Provide information for public. Access all kinds of information Intranet Private Provide information for organization employees. Telephone directories, Internal job openings, Employee information Extranet Private Provide information to suppliers, customers and business partner. i Access data, Check status Place orders, Send email Use virtual private network (VPN) . technology to communication over the internet more secure. ,

Usages

Security

Loose

High

2.0 HARDWARE REQUIREMENTS FOR NETWORKING ( COMMUNICATION DEVICES 2.1 i. ii.

r r r
0

State the FUNCTIONS of the following communications devices: A network interface card (NIC) is a communication device that enables a computer or device to access a wired network (via cable). A wireless network interface card is a communication device that enables a computer or device to access a wireless network (via radiowave) A modem is a communication device that converts digital signals from your computer into analog signals to send over the phone lines and . converts the phone's analog signals into digital for the computer. A hub/switch is a communication device that connects wired computers or devices on a Local Area Network (LAN). A hub provides a common connection point for nodes on a star network.

iii.

iv.

V.,

A wireless access point is a communication device that connects wireless computers or devices on a Local Area Network (LAN) A router is a communication device that connects multiple computers and transmits data to its correct destination on the network. A router allows multiple computers to share a single high-speed internet connection. ,

vi.

g m m r
0

You might also like