Wednesday, 24 May 2017

Week 12: Ethical, Social and Legal Issues

Intellectual Property Rights:
Refers to creations of the mind, original creative works from the creators-software, applications, systems, websites, etc.

Image result for trademark and copyright

Copyrights

  • exclusive right given to the owner of copyright for a specific period
  • permission must be obtained to use copyrighted material (and pay any required fee)  


Trademarks
  • a trade marks is a sign which distinguishes the goods and services of one trader from those of another. 
  •  a mark includes words, logos, pictures, names, letters, numbers, or a combination of these. 
  • a trade mark is used as marketing tool to enable customers in recognising the product of a particular trader. 


Patents



  • exclusive right granted for an invention, which is a product or a process that provides a new  way of doing something
  • offers a new technical solution to a problem


Cyberlaws in Malaysia

Since 1997, some of the cyber laws that have been passed by our Parliament include:
1. the Digital Signature Act 1997,
2. the Computer Crimes Act 1997,
3.  the Copyright (Amendment) Act 1997, (also read Copyright Act 1987)
4. the Telemedicine Act 1997,
5. the Communications and Multimedia Act 1998,
6. the Communications and Multimedia Commission Act 1998, and
7. the Electronic Commerce Act 2006.



Week 11: Networking and Computer Security

Network and Computer Security
Consist of the provisions and policies adopted by a network administrator to prevent and monitor unauthorised access, misuse, modification or denial of a computer network and network accessible resources.

Network Security: Certificates

Client Security Issues

Phishing
  •  Attacks are performed with the intention to acquire personal information like credit card numbers, bank account, etc.
  • The recipients are encouraged to enter personal identification data.
Web Spoofing
  • Mocking the web presences of trusted corporations with the intention to trick customers.
  •  Use convincing websites, email designs and URLs

Desktop Security Issues

Adware
Image result for example of adware
  • Programs used to deliver advertising contents.
  • Visible to the user, experienced to be annoying.
Spyware
Image result for example of spyware
  • Intends to remain unrecognised.
  • Used to gather personal info like login details, etc
  • Spyware monitors the user's activities and scan the system.
Viruses
  • Attached to executable files or documents 
  • Spread through sharing of infected files or sending emails with viruses contained in the attachment
  • Some can cause further damage to the systems
Worm
  • Programs that can replicate or copy themselves.
Trojan Horses
Image result for example of trojan horses
  • Do not replicate themselves but typically cause damage or compromise of security of infected computers
  • Appears to be useful software and often offer the pretended useful functionality
  • Damage caused varies – include data theft and destruction or illegitimate access 





Week 10: Basic Web Development

HTML: An acronym for HyperText Markup Language, HTML is the language used to tag various parts of a Web document so browsing software will know how to display that document's link, text, graphics and attached media.

HTML Files

Extension .html or .htm


HTML: Head, Title, Body
Image result for HTML: HEAD, TITLE, BODY


Heading
Related image

Week 9: Internet Application (For Teaching and Learning)

Asynchronous Application

  • asyn- "not with"
  • chrono- "time"
  • Communication that is not occurring at the same time.
  • Relay of the information with a time lag.
  • e.g discussion forums and email.
Synchronous Application


  • syn- "with"
  • chronos- "time"
  • Communication that is occurring at the same time.
  • e.g chat rooms and online conferences


Image result for pros and cons of asynchronous learning



Other Applications

  • Podcast
  • Social networking
  • MOOC, SPOC, NOOC
  • Blogging, Microblogging
  • Live Virtual Classrooms.







Week 8: Email

Email:

  • a mail, but is sent electronically across the Internet
  • quickly delivered in seconds or minutes


Image result for advantages disadvantages of email

Email Address

  •  What you need is – The E-mail address of the recipient.
  •                                  – user@host
  •                                 – zzz@utm.my 
  •                                 – zzz@tm.net.my
  •  “utm.my" is the domain name of the mail server which handles the recipient's mail.
  •  “zzz" is the user name of the recipient.
  •  User name and hostname are separated by "@".

Email Client and Server

  • Email Client- software/program that can transfer email from a local host to a local email server
  • Email Server- software/program that can send and receive email from or to other email servers
  • Mailbox- a disk file which holds email messages

CC and BCC

  • CC (carbon copy section) - send a message to more than 1 person                                                                                              - all the recipients will see the list of email addresses
  • BCC (blind carbon copy section) - email is sent to a large group of people who do not know each                                                          other                                                                                                                                                - addresses won't be seen by the recipients
How Does Email Work?

Internet Message Access Protocol (IMAP)

  • designed for the situation where you want to work with your email from multiple computers, such as your workstation at work, your desktop computer at home, or a laptop computer while traveling. 
  • messages are displayed on your local computer but are kept and stored on the mail server - you can work with all your mail, old and new, from any computer connected to the Internet, as long as the mail servers are running. 
Web-Based Email-HTTP (Hypertext Transfer  Protocol)
  • allowing the mail to be delivered in a web page format.
Bounced Back Email
  •  Bad user account name
  •  Bad domain name
  •  Domain name server is down for several days
  •  Some other malfunction (email is too big)
Spam Mail
  •  Email spam, also known as junk email sending messages to numerous recipients by email.
  •  The messages may contain disguised links that appear to be for familiar websites but in fact lead to phishing web sites or sites that are hosting malware.
  •  Spam email may also include malware as scripts or other executable file attachments



Week 7: Web Searching

Web Searching: An act of looking for information in computer databases or network.

Web Searching Categories:

(i) Directories
-web guide (hierarchical representation of hyperlinks)
-enormous collection links to sites, arranged in different categories
-top level = wide range of very general topics
-each topic contains hyperlinks of more specialized subtopic

(ii) Search Engines
-computer program that allows users to submit query that consists of word or phrase and searches databases

(iii) Meta-search Engines
-use of more than one other search engine to complete the search
-the results are ranked according to how well they match with the query
-Advantage : a single query can access lot of search engines
-Disadvantage : a lot of matches will not be suitable for you

(iv) Yellow Pages
-allows users to lookup information about individuals
-to track down telephone numbers, email addresses
-contain certain information about businesses

Web Browser: software application used to locate and display web
Related image

Searching Techniques:

(i) Pattern Matching Queries (Fuzzy Query)
- can enter ''ungrammatical sentence'', ''incomplete sentence fragments''. ''nonsence words''
- search engines gets collection of keywords
- required keyword "+"
- prohibited keyword "-"

(ii) Boolean Queries
- query that consists keywords but with logical operators (AND, OR, NOT)
-X AND Y - will returns URLs that  contain both X and Y
-X OR Y - will returns URLs that contain either X or Y
-X AND NOT Y - will returns URLs that contain X and do not contains Y

Searching Strategy

  • User Interface- Allows you to type a query and displays the results.
  • Searcher-  The engine searches the database for matching your query.
  • Evaluator- The engine assigns scores to the retrieved information.
  • Gatherer- The component that travels the WEB, and collects information.
  • Indexer- The engine that categorizes the data collected by the gatherer.


Web Resources Evaluation









Week 6: Internet Infrastructure

Internet: A global connection of network or interconnected computer work by transmitting data through a special type of packet switching which is known as Internet Protocol (IP)

Internet Vs. WWW
Image result for internet vs world wide web

Hierarchy of Network
Image result for hierarchy of networks

single computer ⇨ LAN⇨ ISP⇨ WWW


Internet Protocol
  • language of computer that computers use to communicate over the internet
  • protocol is the pre-defined way that someone who wants to use a service talks with that service
  • normally expressed in decimal format as a dotted decimal number

Hyper Text Transfer Protocol (HTTP)
  • defines how messages are formatted and transmitted and what actions web servers and browsers should take in response to various command
  • for example, when you enter a URL in a browser, this actually send HTTP command to the web server directing it to fetch and transmit the requested page 

Type of Internet Connection and Access
  • Dial Connection - used with home computers
  • Cable - used a direct connection (e.g: office)
  • Satellite Internet Access - required transceiver satellite to receive and transmit data
  • Fixed Wireless - used in radio transmission tower (same as satellite internet)
  • Broadband - transmits data digitally, modem or similar device required to translate data packages
  • Mobile Wireless - virtually anywhere cellular phone service available







Monday, 22 May 2017

Week 5: Connecting a Network (Wire and Wireless)

Wireless

  • send data through airwaves between devices, instead of physical cable
  • e.g : cellular telephone, tabs, wireless networking, satellite television, GPS units
Uses:

  • Mobile users can use their cellular phone to access e-mail anywhere and anytime.
  • Travelers with portable computers can connect to the internet through base stations installed in airports, railway station, and other public locations.
  • At home, users can connect devices on their desktop to synchronize data and transfer files.


Type of Wireless:

  1. Wireless Wide Area Network (WWANs)
  2. Wireless Metropolitan Area Network (WMANs)
  3. Wireless Local Area Network (WLANs)
  4. Wireless Personal Area Network (WPANs)

Wireless Technology:

1.  INFRA RED

  • do not use signal in radio frequency
  • send data in short distance
  • still used in remote control

2. BLUETOOTH
  • an industrial specification for wireless personal area networks (PANs)
  • designed for very short range < 10m
  • data speed up to 3Mbps
  • connect and exchange  information between devices (mobile phone, laptops, PCs, printers)

3. WIRELESS LOCAL AREA NETWORKS (WLANs) WiFi
  • WLAN configuration vary from simple, independent, peer-to-peer connections between sets of PCs, to more complex, intra building infrastructure networks
  • a point-to-point solution is used to bridge between two LANs and provide alternative to cable between two geographically distant location
  • point-to-multi-point solutions connect several, separate locations to one single location or building

4. WiMax
  • extend the range of wireless network
  • speed up to 70Mbps
  • provide access to internet access to fixed location with larger coverage

5. BROADBAND
  • providing high-speed wireless access over a wide area from devices such as personal computers to data networks
  • planned to be used in the next few years and is estimated to have a range of 50km


Wired Networks Vs Wireless Network

Week 4: Cabling and Hardware

Cabling: is the medium through which information usually moves from one network device to one another.


Type of Cabling

i. Coaxial Cable
Image result for coaxial cable
   -carry large number of high speed video transmission
   -shield braided wire to block electromagnetic signals enter cable
   -carry more data quickly
   -more expensive

ii. Fiber Optic Cable
Image result for fiber optic cable
   -fastest delivery-transmit signal over much longer distance
   -carry data for several television stations or thousands of voice
   -send data in one direction
   -ideal for environment with large amount of electrical interference

iii. Twisted Pair Cable
 
(a)Unshielded Twisted Pair (UTP)
Image result for utp cable
   -has 4 pairs of wires inside the jacket.
   -each pair is twisted with different number of twists per inch to help eliminate interference from adjacent          pairs and other electrical devices.
   -a disadvantage: may be susceptible to radio and electrical frequency interference.
 
   (b) Shielded Twisted Pair (STP)

Image result for stp cable
   -two individual wires wrap in a foil shielding.
   -shielding to help provide a more reliable data communication.
   -suitable for environment with electrical interference.
   - a disadvantage: Extra shielding cause bulky.

Type of Cable Connector

(i) Coaxial Cable Connector
   -the most common type of connector used with coaxial cables is the Bayonet-Neil-Concelman (BNC)           Connector.
   -different types of adapters are available for BNC connectors, including a T-connector, barrel connector,        and terminator.

(ii) Fiber Optic Cable Connector
   -the most common type of connector used with fiber optic cable is the ST & SC connector.

(iii) UTP Cable Connector
   -the standard connector for unshielded twisted pair cabling is an RJ-45 Connector. (RJ=Registered Jack)
   -look like a large telephone-style connector.
   -a slow allows RJ-45 to be inserted only one way.

Topology and Cable

Image result for type of topology
(i) Linear/Bus → Coaxial, Twisted Pair, Fiber
(ii) Star (concentrator at the middle) → Twisted Pair, Fiber
(iii) Star-Wired Ring → Twisted Pair

(iv) Tree → Coaxial, Twisted Pair, Fiber

Network Hardware/Equipment
Networking hardware includes all computers, peripherals, interface cards, and other equipment needed to perform data-processing and communication within network.

 (i) File Server

  • very fast computer
  • large amount of RAM and storage space
  • network operating system software resides on this

(ii) Switch

  • same as hubs- contain ports to connect device via networking  cable and  facilitate communications
  • identifies device on network- data intended and sends to that node only
  • can connect types of packet switched network segments to form internet work

(iii) Repeater

  • electrically amplifies signals it receive and rebroadcasts it
  • used when total length of network cable exceeds the standards set for type of cable used
  • boost signal with device

(iv)  Concentrators / Hubs

  • central connection point
  • transmit all data received to all node connected to hub
  • lots of extra  network traffic, network less efficient

(v) Workstation

  • user computer that connected to a network
  • not necessarily storage capability- files saved on file server
  • configured with network interface card, networking software and appropriate cables

(vi) Routers

  • direct signal traffic efficiently 
  • connectors- link different networks
  • superintelligent bridge- translate info
  • select best path to route message based on destination address and origin

(vii) Bridges

  • connect multiple network segments
  • connect different types of cabling
  • keeps info flowing
  • monitor info traffic on both sides of network

Saturday, 11 March 2017

Week 3: Computer Networking

Computer Networking: is a collection of computers and other hardware devices so that network users can share hardware, software, data and they can communicate with each other electronically.

Computer Network:
  • Wired vs wireless
  • Topology
  • Architecture
  • Size or coverage area
Types of Network:
  • LAN: Local Area Network
  • MAN: Metropolitan Area Network
  • WAN: Wide Area Network

Network Component:

(i) Host/ End Nodes
  • Data sources and data destination
  • Personal computers, terminals, workstations, automatic teller machine
(ii) Transmission Media
  • Sending electric or signal through specific media
  • 2 types of transmission media:-

(iii) Network Electronic Devices
  • Control data from sources to destination
  • Provide interface between different media transmitter or for different protocol
  • Connect multiple network together or connect computer or network to the internet
  • Bridges, routers, multiplexers, switches, hubs, gateways, front and processors
(iv) Software/ Application
  • The applications at the end nodes normally involves technique and protocols
  • Protocols determines the rules and procedure to send data, terminate data, interpret data, present data and control mistakes
  • Software-ensure data is delivered at respective destination
(v) Network Architecture Standards & Protocols
  • NAS- The blueprint of standards that define how device in a network typically connect and communicate
  • Ensure interoperability between various devices and equipment made by different vendors



Friday, 10 March 2017

Week 2: Data Communication

On week 2, we learnt about data communication.

Data Communication:
  • takes place between two devices that are directly connected by some form of point-to-point transmission medium.
  • transmitted via mediums such as wires, coaxial cables, fibre optic, or radiated electromagnetic waves such as broadcast radio, infrared light, microwaves, and satellites.

Data Transmission

A. Type of Signals

   1. Analog signal
  •  represent data with continuous wave
   2. Digital signal
  • data represented by only two discrete states: 0 and 1 

B. Transmission Type

  1. Parallel transmission: message sent one byte at a time- each bit in the byte taking separate path
  2. Serial transmission: data sent one bit at a time- one after another along a single path
   Reconstruction of data after transmitted in serial
   -Synchronous and asynchronous transmission
   -Isochronous transmission
     -data sent at the same time- support some real time applications
     -initial communication between both devices to determine factors needed for data transmission

C. Direction of Transmission


  1. Simplex transmission
  • one direction only
  • role of transmitter and receiver fixed
  • e.g: radio signal
  2. Half-duplex transmission
  • 2 direction but not at the same time
  • one transmits data to other without interruption
  • e.g: walkie-talkie
  3. Full duplex transmission
  • transmits data in both direction at the same time
  • e.g: telephone
D. Data Compression

Wednesday, 8 March 2017

Week 1: Introduction to Telecommunications

Communication:
The imparting, conveying or exchange of thought, messages, ideas, knowledge or information by sign and sounds like speech, signals or behavior.

Telecommunication:
-Communication over a long distance
-Transfer of data from transmitter to receiver across distance

Elements of computer and communication technology

1. People :- Professional (programmer, computer engineer)
                 - End user (clerk, teacher)
2. Procedure : Specification of the series of actions, acts or operations which have to be executed
3. Data : Implies a binary, machine-readable representation of information
              - Unit for data : bit, byte, kilobyte, megabyte, gigabyte, terabyte

4. Hardware :- input device
                     - process device
                     - output device
                     - storage device
                     - communication device
5. Software :- Application software
                    - System software
6. Communication : Transmission of data
                               - Conversion of data (analog to digital, digital to analog)