Wednesday, 24 May 2017

Week 12: Ethical, Social and Legal Issues

Intellectual Property Rights:
Refers to creations of the mind, original creative works from the creators-software, applications, systems, websites, etc.

Image result for trademark and copyright

Copyrights

  • exclusive right given to the owner of copyright for a specific period
  • permission must be obtained to use copyrighted material (and pay any required fee)  


Trademarks
  • a trade marks is a sign which distinguishes the goods and services of one trader from those of another. 
  •  a mark includes words, logos, pictures, names, letters, numbers, or a combination of these. 
  • a trade mark is used as marketing tool to enable customers in recognising the product of a particular trader. 


Patents



  • exclusive right granted for an invention, which is a product or a process that provides a new  way of doing something
  • offers a new technical solution to a problem


Cyberlaws in Malaysia

Since 1997, some of the cyber laws that have been passed by our Parliament include:
1. the Digital Signature Act 1997,
2. the Computer Crimes Act 1997,
3.  the Copyright (Amendment) Act 1997, (also read Copyright Act 1987)
4. the Telemedicine Act 1997,
5. the Communications and Multimedia Act 1998,
6. the Communications and Multimedia Commission Act 1998, and
7. the Electronic Commerce Act 2006.



Week 11: Networking and Computer Security

Network and Computer Security
Consist of the provisions and policies adopted by a network administrator to prevent and monitor unauthorised access, misuse, modification or denial of a computer network and network accessible resources.

Network Security: Certificates

Client Security Issues

Phishing
  •  Attacks are performed with the intention to acquire personal information like credit card numbers, bank account, etc.
  • The recipients are encouraged to enter personal identification data.
Web Spoofing
  • Mocking the web presences of trusted corporations with the intention to trick customers.
  •  Use convincing websites, email designs and URLs

Desktop Security Issues

Adware
Image result for example of adware
  • Programs used to deliver advertising contents.
  • Visible to the user, experienced to be annoying.
Spyware
Image result for example of spyware
  • Intends to remain unrecognised.
  • Used to gather personal info like login details, etc
  • Spyware monitors the user's activities and scan the system.
Viruses
  • Attached to executable files or documents 
  • Spread through sharing of infected files or sending emails with viruses contained in the attachment
  • Some can cause further damage to the systems
Worm
  • Programs that can replicate or copy themselves.
Trojan Horses
Image result for example of trojan horses
  • Do not replicate themselves but typically cause damage or compromise of security of infected computers
  • Appears to be useful software and often offer the pretended useful functionality
  • Damage caused varies – include data theft and destruction or illegitimate access 





Week 10: Basic Web Development

HTML: An acronym for HyperText Markup Language, HTML is the language used to tag various parts of a Web document so browsing software will know how to display that document's link, text, graphics and attached media.

HTML Files

Extension .html or .htm


HTML: Head, Title, Body
Image result for HTML: HEAD, TITLE, BODY


Heading
Related image

Week 9: Internet Application (For Teaching and Learning)

Asynchronous Application

  • asyn- "not with"
  • chrono- "time"
  • Communication that is not occurring at the same time.
  • Relay of the information with a time lag.
  • e.g discussion forums and email.
Synchronous Application


  • syn- "with"
  • chronos- "time"
  • Communication that is occurring at the same time.
  • e.g chat rooms and online conferences


Image result for pros and cons of asynchronous learning



Other Applications

  • Podcast
  • Social networking
  • MOOC, SPOC, NOOC
  • Blogging, Microblogging
  • Live Virtual Classrooms.







Week 8: Email

Email:

  • a mail, but is sent electronically across the Internet
  • quickly delivered in seconds or minutes


Image result for advantages disadvantages of email

Email Address

  •  What you need is – The E-mail address of the recipient.
  •                                  – user@host
  •                                 – zzz@utm.my 
  •                                 – zzz@tm.net.my
  •  “utm.my" is the domain name of the mail server which handles the recipient's mail.
  •  “zzz" is the user name of the recipient.
  •  User name and hostname are separated by "@".

Email Client and Server

  • Email Client- software/program that can transfer email from a local host to a local email server
  • Email Server- software/program that can send and receive email from or to other email servers
  • Mailbox- a disk file which holds email messages

CC and BCC

  • CC (carbon copy section) - send a message to more than 1 person                                                                                              - all the recipients will see the list of email addresses
  • BCC (blind carbon copy section) - email is sent to a large group of people who do not know each                                                          other                                                                                                                                                - addresses won't be seen by the recipients
How Does Email Work?

Internet Message Access Protocol (IMAP)

  • designed for the situation where you want to work with your email from multiple computers, such as your workstation at work, your desktop computer at home, or a laptop computer while traveling. 
  • messages are displayed on your local computer but are kept and stored on the mail server - you can work with all your mail, old and new, from any computer connected to the Internet, as long as the mail servers are running. 
Web-Based Email-HTTP (Hypertext Transfer  Protocol)
  • allowing the mail to be delivered in a web page format.
Bounced Back Email
  •  Bad user account name
  •  Bad domain name
  •  Domain name server is down for several days
  •  Some other malfunction (email is too big)
Spam Mail
  •  Email spam, also known as junk email sending messages to numerous recipients by email.
  •  The messages may contain disguised links that appear to be for familiar websites but in fact lead to phishing web sites or sites that are hosting malware.
  •  Spam email may also include malware as scripts or other executable file attachments



Week 7: Web Searching

Web Searching: An act of looking for information in computer databases or network.

Web Searching Categories:

(i) Directories
-web guide (hierarchical representation of hyperlinks)
-enormous collection links to sites, arranged in different categories
-top level = wide range of very general topics
-each topic contains hyperlinks of more specialized subtopic

(ii) Search Engines
-computer program that allows users to submit query that consists of word or phrase and searches databases

(iii) Meta-search Engines
-use of more than one other search engine to complete the search
-the results are ranked according to how well they match with the query
-Advantage : a single query can access lot of search engines
-Disadvantage : a lot of matches will not be suitable for you

(iv) Yellow Pages
-allows users to lookup information about individuals
-to track down telephone numbers, email addresses
-contain certain information about businesses

Web Browser: software application used to locate and display web
Related image

Searching Techniques:

(i) Pattern Matching Queries (Fuzzy Query)
- can enter ''ungrammatical sentence'', ''incomplete sentence fragments''. ''nonsence words''
- search engines gets collection of keywords
- required keyword "+"
- prohibited keyword "-"

(ii) Boolean Queries
- query that consists keywords but with logical operators (AND, OR, NOT)
-X AND Y - will returns URLs that  contain both X and Y
-X OR Y - will returns URLs that contain either X or Y
-X AND NOT Y - will returns URLs that contain X and do not contains Y

Searching Strategy

  • User Interface- Allows you to type a query and displays the results.
  • Searcher-  The engine searches the database for matching your query.
  • Evaluator- The engine assigns scores to the retrieved information.
  • Gatherer- The component that travels the WEB, and collects information.
  • Indexer- The engine that categorizes the data collected by the gatherer.


Web Resources Evaluation









Week 6: Internet Infrastructure

Internet: A global connection of network or interconnected computer work by transmitting data through a special type of packet switching which is known as Internet Protocol (IP)

Internet Vs. WWW
Image result for internet vs world wide web

Hierarchy of Network
Image result for hierarchy of networks

single computer ⇨ LAN⇨ ISP⇨ WWW


Internet Protocol
  • language of computer that computers use to communicate over the internet
  • protocol is the pre-defined way that someone who wants to use a service talks with that service
  • normally expressed in decimal format as a dotted decimal number

Hyper Text Transfer Protocol (HTTP)
  • defines how messages are formatted and transmitted and what actions web servers and browsers should take in response to various command
  • for example, when you enter a URL in a browser, this actually send HTTP command to the web server directing it to fetch and transmit the requested page 

Type of Internet Connection and Access
  • Dial Connection - used with home computers
  • Cable - used a direct connection (e.g: office)
  • Satellite Internet Access - required transceiver satellite to receive and transmit data
  • Fixed Wireless - used in radio transmission tower (same as satellite internet)
  • Broadband - transmits data digitally, modem or similar device required to translate data packages
  • Mobile Wireless - virtually anywhere cellular phone service available