CDCT2203 Information Technology and Environment
CDCT2203 Information Technology and Environment
CDCT2203 Information Technology and Environment
INFORMATION
TECHNOLOGY AND
ENVIRONMENT
Marini Abu Bakar
Dr Sufian Idris
Nor Ieyza Jailani
Roziah Latih
Majumin Hanum Abdul Samad
Summary 39
Key Terms 39
5.5.3 Multi-Processing 91
5.5.4 Batch Processing 92
5.5.5 Virtual Memory 92
5.6 Types of OS 93
5.6.1 Personal and Server OS 94
5.6.2 Mobile and Embedded OS 96
5.7 Application Software 97
5.8 Word Processing Software 100
5.9 Spreadsheet Software 104
5.10 Database Software 107
5.10.1 Types of Databases 110
5.10.2 Database Management System Organisation 110
5.10.3 Client-Server 116
5.11 Document Processing Software 120
5.12 Graphics Software 120
5.13 Software Suite 124
5.14 Groupware Software 124
5.15 Desktop Publishing Software 124
5.16 Multimedia Software 125
Summary 126
Key Terms 126
INTRODUCTION
CDCT2203 Information Technology and Environment is one of the courses
offered by the Faculty of Science and Technology at Open University Malaysia
(OUM). This course is worth 3 credit hours and should be covered over 8 to 15
weeks.
COURSE AUDIENCE
This course is offered to students taking the Diploma in Information Technology
programme.
As an open and distance learner, you should be able to learn independently and
optimise the learning modes and environment available to you. Before you begin
this course, please confirm the course material, the course requirements and how
the course is conducted.
STUDY SCHEDULE
It is a standard OUM practice that learners accumulate 40 study hours for every
credit hour. As such, for a three-credit hour course, you are expected to spend
120 study hours. Table 1 gives an estimation of how the 120 study hours can be
accumulated.
Study
Study Activities
Hours
Briefly go through the course content and participate in initial discussion 3
Study the module 60
Attend 3 to 5 tutorial sessions 10
Online participation 12
Revision 15
Assignment(s), Test(s) and Examination(s) 20
TOTAL STUDY HOURS 120
COURSE OUTCOMES
By the end of this course, you should be able to:
COURSE SYNOPSIS
This course is divided into 8 topics. The synopsis for each topic is presented
below:
Topic 1 gives an overview of IT, which covers the principles of IT, functions and
benefits of IT, careers in IT, IT development in Malaysia and cyber laws.
Topic 2 discusses the main computer hardware components, which are the
Central Processing Unit (CPU), main memory, and etc. Specifically, we will focus
on the CPU or the microprocessor, which is at the core of all activities inside a
computer that are responsible for changing raw data into the required
information. Besides that, we will also discuss data representation and coding
system. Towards the end of the topic, you will be introduced to some tools and
hardware in a computer system.
Topic 3 introduces various methods of input and output. The keyboard is the
most popular and frequently used input device. Besides the keyboard, there are
also many latest input and output devices in the market, which will also be
discussed in this topic.
Topic 4 introduces another computer component, that is, the secondary storage.
Here, you will learn the various types of secondary storage available in the
market and the comparison of storage types. This topic also explains the types of
magnetic storage, optic storage and advantages of secondary storage.
Topic 5 introduces the software used in the computer system. There are two
types of main software, that is, the system software and application software.
The system software is used to switch on (start) the computer and to coordinate
the hardware components and the application software. There are three
categories of software within the system software, namely the operating system,
utility programs and language translators. This topic discusses the concept and
types of operating systems being used. Language translators are explained
through programming languages. Programming languages will be discussed
from the perspectives of generation, approach and compilation. At the end of this
topic, you will discuss various types of application software that are commonly
used such as word processing, spreadsheet and graphic software.
Topic 7 focuses on the development and history of the Internet. In this topic, we
will learn about the elements of the Internet and the activities that can be
performed on the Internet. Besides that, you will also identify the process of
searching and manipulating information effectively over the Internet.
Topic 8 describes current software on the Internet. Some can be obtained for free,
while others have to be paid for. Open source software will also be discussed
here. We will also discuss a popular method of communication over the Internet
that is e-mail. Initially, e-mail was merely text-based, but now you can send
(attach) various types of data together with e-mails such as document, graphic,
audio and Power Point presentation files. At the end of this topic, we will touch
briefly on Internet scripting languages such as HTML and XML.
Learning Outcomes: This section refers to what you should achieve after you
have completely covered a topic. As you go through each topic, you should
frequently refer to these learning outcomes. By doing this, you can continuously
gauge your understanding of the topic.
Summary: You will find this component at the end of each topic. This component
helps you to recap the whole topic. By going through the summary, you should
be able to gauge your knowledge retention level. Should you find points in the
summary that you do not fully understand, it would be a good idea for you to
revisit the details in the module.
Key Terms: This component can be found at the end of each topic. You should go
through this component to remind yourself of important terms or jargon used
throughout the module. Should you find terms here that you are not able to
explain, you should look for the terms in the module.
PRIOR KNOWLEDGE
This is an introductory course on information technology. Hence, there is no
specific pre-requisite. However, the ability to use computers, especially the
productivity software like word processor, spreadsheet and browser will help
you to perform activities and complete the assignment.
ASSESSMENT METHOD
Please refer to myVLE.
REFERENCES
Shelly, G. B., & Vermaat, M. F. (2009). Discovering computer 2009: Complete.
Boston, MA: Cengage Learning.
X INTRODUCTION
Information technology (IT), which has been around for more than half a century,
had its beginnings in a laboratory. Now, IT is taught in schools and considered
one of the major resources in a business organisation. IT is even used in the latest
information and communication technology (ICT) gadgets, such as smartphones
and tablets (Figure 1.1).
In this topic, you will be introduced to the IT era. You will also familiarise
yourself with the concept of IT and its characteristics. Other important issues
which we will discuss are the principles, functions and benefits of IT. Towards
the end of this topic, the Multimedia Super Corridor Malaysia (MSC Malaysia)
and Cyber Laws will also be presented.
Era Description
Agricultural Most workers are peasant farmers, where their lives depend on
Era agriculture (Figure 1.2).
In order to understand the evolution of the three eras, please refer to Table 1.2.
The technologies used in the agricultural, industrial and information era are all
different. For example, the technologies used in the industrial era (such as bull-
dozers and cranes) were meant to increase physical capabilities, while the
technologies of the information era (such as computers) are meant to enhance
workers productivity. Furthermore, the information era links people together by
communication tools that use IT. Although we are in the information era, both
agricultural and industrial activities are still important.
There are six features that differentiate the information era from the previous
eras (Senn, 1998):
ACTIVITY 1.1
1. According to Alvin Tofler (http://calculemus.org/lect/07pol-
gosp/arch/proby-dawne/materialy/waves.htm), we are now in
the third wave, which is known as the information wave. Discuss
in groups on what information era is and present it during your
tutorial.
2. From the three eras you have read in the text above, in which era
do you think Malaysia is currently? Explain your opinion.
Element Definition
Data Raw facts, figures, diagrams and other details, such as quiz marks and
the cost of computers.
Information An organised and meaningful interpretation which is useful about the
data, such as quiz performance and computer specification.
Knowledge Understanding and giving attention to a set of information and on how
the information can be used well, such as to give extra classes or to
upgrade computer performance.
The definitions in Table 1.3 explain that data which have been refined,
formatted and summarised are changed into information. Information that has
been interpreted, decided and acted upon is changed into knowledge. With
knowledge, users can make the best decisions and take appropriate actions.
In general, IT is the main player in the information era. This technology is used to
access, store and distribute information, especially information in digital form. IT
refers to the use and deployment of various items in the creation, storage and
distribution of information. Table 1.4 contains some definitions of IT.
Source Definition
Behan and IT is a term for explaining the technology that enables us to record,
Holmes (1990) store, process, retrieve, send and receive information.
Martin et al. IT consists of all forms of technology involved in the collection,
(1994) manipulation, communication, presentation and utilisation of data
(which are transformed into information).
Senn (1998) IT contains three components, which are computers,
communication and expertise. A combination of the three
components creates opportunities for people and organisations to
become more productive, effective and generally successful
without being separated.
Renolds (2010) IT includes all tools that capture, store, process, exchange and use
information.
There has never been a rigid definition of the various classes of computers.
Indeed, their functions and capabilities keep on expanding and as such, the
number of classes is even debatable. However, there is a broad spectrum of
computing hardware ranging from supercomputers to microcomputers, with no
sharp line dividing the classes. In general, computers decrease in size and cost as
you go down from the large supercomputers and mainframes to the small
microcomputers. The five classifications are shown in Table 1.6.
Computer
Description
Classification
Microcomputer It is a desktop computer, as well as a personal computer (PC). The
label personal computer is associated with microcomputers because
they are designed for use by one person at a time. It is not to be
confused with the microprocessor, which is literally a computer on a
chip. In a microcomputer, the microprocessor, electronic circuitry
and memory chips are mounted on a single circuit board called
the motherboard. It is the motherboard that distinguishes one
microcomputer from another. Important hardware components will
be discussed in detail in the next few topics.
Mainframe This computer is defined as the big sized commercial computer
designed specifically for a multi-user environment and it is used by a
whole corporate body. It normally has more than 100 remote
terminals. The mainframe is very strong in terms of security,
connectivity and data management capabilities. It must reside in a
specially controlled environment with special heating, ventilation
and air-conditioning equipment to control the temperature, humidity
and dust level around the computer.
Minicomputer Until the late 1960s, all computers were mainframes only. They were
just called computers. Later, computer vendors began to introduce
smaller machines to make them affordable to the smaller companies.
This gave birth to the minicomputers. Today, a minicomputer can be
defined as the smallest computer designed specifically for a multi-
user environment. The system must be able to service between two
and 100 remote terminals at one time.
Supercomputer This is the largest, fastest and most expensive computer available.
It is extremely powerful and especially designed for high-speed
numerical computations needed in complex engineering
applications. Supercomputers are processor intensive, whereas the
mainframes are input-output intensive. Supercomputers can perform
arithmetic calculations at a speed of billions of floating-point
operations per second (gigaflops). Cray Research, NEC and Fujitsu
are the leading manufacturers of supercomputers.
Workstation There are other classifications of computers like super-minis, super-
micros, mini computers, etc. they are the intermediate stages of an
earlier classification. Some computers are called servers and clients.
The workstation is a network terminal (intelligent but without disc).
It often refers to a terminal with RISC processors, instead of Intel. In
general, a workstation is simply a high-end personal computer.
SELF-CHECK 1.1
ACTIVITY 1.2
Principle Description
Reliable It is impossible to say that an IT system works 100% all the time.
Sometimes, it works 99% of the time and 1% it does not work.
However, it is important that reliability does not go below a certain
threshold.
Secure The environment in which the IT system operates must be secure
from unauthorised access or malicious destruction.
Flexible People are able to use the IT system anywhere they are and
anytime.
Foster innovation Creativity in developing new software and hardware for the new
era, such as early warning systems for bad weather.
Responsive IT system is able to provide a range of services.
Easy and All the tools and facilities should be easy to learn and use.
transparent
Consistent The IT environment must be consistent and internationally
interoperability accepted so that information can be exchanged readily.
Affordable People should be able to afford the IT systems they intend to use.
There are four benefits that the advancement of IT has given to all its users. These
can be seen in Table 1.9.
Benefit Definition
Speed A relative value computers can perform within seconds, at speeds that
are much faster than humans.
Consistency Computers are efficient in doing repetitive jobs consistently, i.e.
producing the same results for the same jobs.
Accuracy Computers work very accurately tracking even small differences.
Reliability With their speed, consistency and accuracy, we can trust and rely on
computers in producing the same results again and again.
With these four benefits that can be gained from the use of IT, we cannot ignore
the opportunities offered by it. In general, there are two categories of
opportunities:
(a) Helping People For example, assisting special people (the disabled),
increasing human productivity and helping people towards having better
lives; and
IT has been used in various fields with the objective of solving problems and
helping people. Hence, we should know the three basic responsibilities of IT
users as follows:
Both IT professionals and IT users need to communicate with each other for the
increasing use of IT, for creating new ideas and getting the desired benefits.
SELF-CHECK 1.2
Where are we in the utilisation of IT? As of now, there are still very few factories
or manufacturers that use IT, not to mention the robotic systems. Industries that
do utilise IT, do not fully exploit the potential of this technology. The results of a
review by Universiti Kebangsaan Malaysia (UKM) and National Productivity
Corporation (NPC), as reported in the Seventh Malaysia Plan, show that most
manufacturers utilise IT for administration, rather than the manufacturing
process. However, there are signs of an increase in the use of IT in the
manufacturing processes of small and medium-sized industries.
(f) Being a regional leader in Intellectual Property Rights and Cyber Laws;
ACTIVITY 1.3
ACTIVITY 1.4
There are six Cyber Laws that have been passed by Parliament. Work in
pairs, visit this website www.mdec.com.my and please state all six
Cyber Laws, together with their explanations.
There are six differences between the information era and previous eras:
emergence of an information-based society, success of business and
management jobs depends on IT, work processes are changed and
transformed to upgrade productivity, IT provides basis for optimisation,
success in IT depends on the effectiveness in using it, and IT is embedded or
integrated into many products and services.
We may not be the first nation to invent IT, but we can use IT as a platform to
make Malaysia a developed nation.
Martin, E. W., DeHayes, D. W., Hoffer, J. A., & Perkins, W. C. (1994). Managing
information technology: What managers need to know (2nd. ed.).
New Jersey, NJ: Prentice Hall.
X INTRODUCTION
A computer system is a combination of hardware and software. Hardware is the
physical manifestation of the computer, while software consists of the programs
that command the hardware.
In this topic, we will discuss the most important component of the computer
hardware, that is the central processing unit (CPU). The CPU
or processor, is at the centre of all activities in the computer that are responsible
for changing raw data into the required information. Then, we will move on to
the
next most important computer hardware the memory. This is the hardware
component that works closely with the CPU. While the CPU performs the
complexity of processing, memory lends itself for storing data, intermediate data
and results from the CPU processes. Besides the data being processed, the
program codes are also stored inside the memory. The processor and memory
work hand in hand while the computer is on. Towards the end of this topic, the
system unit and the system clock will also be presented.
There are two sections in a CPU: Control unit and arithmetic logic unit (ALU).
Let us now learn about these sections.
In other words, the control unit manages the taking of an instruction, decodes the
instruction to know its aim, instructs the ALU to execute the instruction, and
then directs storing of results to the memory (primary storage), register or cache.
2.1.2 ALU
ALU executes two types of operations, which are basic arithmetic operation and
logical operation, as shown in Figure 2.3:
SELF-CHECK 2.1
ACTIVITY 2.1
(b) Reduced Instruction Set Computing (RISC) Chip This type of computer
chip uses the approach of reduced instruction set computing, which
involves less instruction. Its design is simpler and cheaper than the complex
instruction set computing chip. This chip is used mostly inside high-
powered microcomputers. Refer to Table 2.1 for the most popular
microprocessors.
SELF-CHECK 2.2
2.3 MEMORY
The memory is separated from the CPU but is normally integrated with it and is
accessed by it. Data and instructions need to be present inside the memory before
being accessed by the CPU. The memory simply holds the data and instructions
temporarily, as long as the program being used is operational. In general, the
storage space for the memory can be used in five different forms for:
(a) Storing the operating system and other system software programs that act
as interfaces between hardware and application programs and controlling
computer resources;
(c) Storing data temporarily, i.e. data received from input devices or secondary
storage to be processed or to be sent to output devices or secondary storage
after processing;
(d) Storing data required during processing inside an area of storage work; and
Figure 2.4 illustrates how the memory communicates with the processor.
Figure 2.4: Methods of how the memory communicates with the processor
There are three types of memory chips as shown in Figure 2.5, which
are random access memory (RAM), read only memory (ROM) and
complementary metal oxide semiconductor (CMOS).
SELF-CHECK 2.3
There are many types of memory inside a computer. What are the main
functions of memory?
2.3.1 RAM
The RAM stores the programs and data being processed by the CPU. It is a
temporary storage because as soon as the electrical switch is turned off, all that
has been saved inside the RAM will be lost. However, there is a new type of
RAM that can store programs and data permanently. Flash RAM or flash
memory chip can store data even when there is an electrical failure. This type of
memory is more expensive than the normal RAM and is mostly used in portable
computers. The capability or content of the RAM is measured in bytes. Four units
of measurement that are normally used to describe memory capability are as
shown in Table 2.2:
The two types of RAM chips that are normally used are:
(a) Dynamic RAM (DRAM) Memory that holds data in a dynamic manner.
Data is not stored continuously. Instead, the computer will refresh the data
hundreds of times every second. It is normally used in personal computers;
and
(b) Static RAM (SRAM) Memory that holds data continuously, for as long as
there is electricity, without any refresh process. It is faster than DRAM but
its design is more complex.
ACTIVITY 2.2
2.3.2 ROM
The ROM chip contains a program that is loaded in the factory. The ROM chip
does not evaporate and cannot be changed by users. Read Only means that the
CPU can read or access the program written inside the ROM chip. Computers
cannot write or code or change any data or instruction inside the ROM. There are
four types of normally used ROM, as shown in Table 2.3:
SELF-CHECK 2.4
What do you know about flash memory? State the differences and
similarities between flash memory and ROM or RAM.
There are three binary coding schemes the most popular one uses eight bits to
form one byte. These codes are ASCII, EBCDIC and Unicode, as explained in
Figure 2.5.
Code Definition
American Standard These codes represent text in computers, communication
Code for Information equipment and other devices that use text.
Interchange (ASCII)
Extended Binary Coded An 8-bit character encoding that is usually used in IBM
Decimal Interchange mainframe operating systems and IBM computers.
Code (EBCDIC)
Unicode A 16-bit code invented to cater for the need of international
languages like Chinese and Japanese.
Please refer to Table 2.7 to see how data is represented in ASCII and EBCDIC
codes.
SELF-CHECK 2.5
2.5.2 Motherboard
The motherboard (also known as system board, mainboard, logic board and
planar board) is a communication network for the entire computer system. Every
component of the system unit is connected directly to the motherboard. It
functions as a data bus that enables various components to communicate with
each other. External devices like the keyboard, mouse and monitor cannot
communicate with the system unit without the motherboard.
The motherboard is a thin circuit board that is filled with sockets and electronic
components including various types of chips. One chip contains a very small
circuit board embedded in a stamp size piece of silicon. This chip is also known
as the silicon chip, semiconductor or integrated circuit. The chips are packaged
and inserted into the sockets of the motherboard. These electronic components
and chips are fixed to the system board as illustrated in Figure 2.6.
The BIOS provides a service enabling software to communicate with the input
and output devices. The ROM BIOS contains specific instructions. When a
computer is switched on, the BIOS will perform a power-on self-test (POST),
such as diagnostic tests for the CPU and memory. It will then test
communications with the hardware such as the keyboard, disk drive and others.
Finally, the BIOS will boot up the operating system and submit control to the
operating system.
The expansion slot is a socket on the main board, which enables an expansion
card to be installed. An expansion card, or expansion board, or adapter, or
simply card, is actually a circuit board that gives more memory, or input/output
device control, or software.
An expansion card is inserted into the slot inside the system unit. A port on the
card enables cabling to be connected from the added card to the device outside
the system unit. We will see various functions of the boards or cards, as shown in
Table 2.8.
2.5.5 Port
The port is a connecting socket located outside the system unit. The port enables
software devices or input/output devices to be plugged in for connection to the
computer, so that they can communicate with the computer system. A cable can
be used to connect input/output devices to the system unit through the port, as
shown in Figure 2.7.
There are various types of ports and their functions are as shown in Table 2.9.
SELF-CHECK 2.6
When a microprocessor chip changes, the bus line also changes. Most of the
devices like the expansion board, will work with one type of bus only. There are
three types of bus lines (see Table 2.11), as follows:
SELF-CHECK 2.7
Explain three types of bus line with their characteristics and uses.
ACTIVITY 2.2
A CPU is divided into two sections or units, which are the control unit and
arithmetic logic unit.
The control unit of the processor can be compared with the human brain. It
informs the entire computer on how to execute program instructions.
Arithmetic logic unit executes two types of operations, which are arithmetic
operation and logical operation.
Both CPU and memory always need each other. However, the memory is not
part of the CPU.
The RAM stores the programs and data being processed by the CPU.
The ROM chip contains a program that is loaded in the factory. The chip does
not evaporate and cannot be changed by users.
The system unit is a hardware unit or a space where the processor, memory
chips, ports, buses, additional slots, board (hardware in which chips and
related circuits are placed) and other electrical components are located.
The system clock is a circuit chip, which generates electronic pulses at a fixed
rate to synchronise or control timing activities of processing.
The bus line is also known as data bus, or simply bus, which connects the
CPU components with each other.
LEARNING OUTCOMES
By the end of this topic, you should be able to:
1. Explain various input methods and devices; and
2. Explain various output methods and devices.
X INTRODUCTION
In the previous topic, you were introduced to the two most important
components of computer hardware, the processor and the memory. To enable the
processor to process data and the memory to store them, data needs to be
brought into the computer. After processing, the resulted information needs to be
taken out of the computer. These two jobs of "taken in" and "taken out" are done
by the input/output unit of the computer system.
In this topic, you will learn about various input and output methods. The
keyboard is the most popular input device used. Besides the keyboard, there are
many other latest input and output devices that are available in the market. They
will also be discussed here.
ACTIVITY 3.1
Approach Description
Offline data entry After data has been entered, it will be changed into a suitable
form and will be verified. Data will be corrected if there are
errors. All data that has been confirmed as correct will be
processed. This method is less often used now and this is
also referred to as batch method.
Online data entry Similar to offline data entry; the difference is that the data
entered is directly examined and corrected. Processing will
be done after all the data has been entered.
Interactive data entry Similar to online data entry, except that data is examined
every time it is entered and processing on the data is done
immediately. There is no need to wait for all data to be
entered.
Input devices take data and programs that can be read or understood by humans,
and convert them into a form that can be processed by the computer. This new
form consists of electronic signals of 0 and 1, which can be read by machines
as explained in the section on data representation.
(a) Entry via Keyboard Data is transferred as input into the computer via a
keyboard that resembles the keyboard of a typewriter, but contains a few
additional keys. For this type of entry, users read the original document,
called source document. The contents of this document will be entered via
keyboard; and
An example of an input device that uses both types of entries (entry via keyboard
and direct entry) is the point-of-sale (POS) terminal. It is a kind of electronic cash
register that is used widely in business.
SELF-CHECK 3.1
1. Name five input devices.
3.2.1 Keyboard
The devices that are often used are keyboard for data entry and terminal for
displaying what has been entered. There are various forms, styles, sizes,
arrangements, touch or feel and number of keys on a keyboard
(a) Number of Keys Normally there are 101 keys, but it also depends on
types of computers, especially types of microcomputers, whether desktop
or handheld. Handheld computers provide fewer numbers of keys because
of their small size.
(b) Group/Type of Keys There are three types of keys, as shown in Table 3.2.
Keys Description
Alphanumeric Consists of numbers and alphabets, similar to the typewriter.
Cursor Cursor is a symbol on the display screen, which shows the site of
Movement data to be entered; also called arrow.
Numeric Also called numeric keypad; these are separate keys for numbers
(09), which have been arranged like a calculator. Sometimes, there
are two objectives, depending on the Num Lock key, i.e. cursor or
numeric movements.
(c) Functions Keys that are labelled as F and normally F1F12 have their
functions defined by the software.
(d) Special Objectives Normally called additional keys, these are keys which
have specific tasks like Backspace, Delete, Insert, Escape, Home, Pause,
Print Screen, and others.
(f) Touch/Feel Now, the softness of pressing the keys and the sound emitted
can be controlled by software.
(g) Styles (and Size or Shape) These are designed according to its inventor, to
be user-friendly and more ergonomic. Ergonomics is a study of how to
make something user-friendly, less danger-prone or less uncomfortable to
users.
(h) Physical vs. Virtual Nowadays, mobility is the top concern of everyone.
Most people want to be able to move hassle free. With this concern in mind,
a virtual projection keyboard was designed and developed. A virtual
keyboard works by projecting the keyboard image on a surface (e.g. table).
The right keystroke is captured when the user presses an area covered by
the image of the key.
The keyboard contains control and buffer keys. Whatever is typed will be stored
inside a buffer (which can store more than one symbol) and later, will be scanned
by the computer processor after receiving interrupt signals from the control key.
3.2.2 Terminal
The terminal is an input (and output) device that connects you to a mainframe or
other types of computers, called a host computer or server. There are three types
of terminal, as shown in Table 3.3.
Terminal Description
Dumb Terminals Used for input and to receive data, but cannot process data by
themselves. They are used only to access information from the
computer and are often found at airline companies, post offices and
road transport department (RTD) offices.
Intelligent They have a processing unit, memory and secondary storage like a
Terminals magnetic disk. Basically, an intelligent terminal is a microcomputer
with the communication software and modem or other
communication connectivity. This connects the terminals to a bigger
computer or the Internet.
Network Also known as network computers, they are cheaper alternatives to
Terminals intelligent terminals. Most network terminals do not have a hard
disk drive and must rely on the host computer or the server for
their system and application software.
Mouse Description
Ball Mouse It uses balls to move and is also known as a mechanical mouse.
Optical Mouse It uses light and requires a mouse pad that can reflect the light. This
mouse contains a section called photo-detector. It functions like the
ball mouse and is normally used on a high-powered computer like a
server.
Touch Sensitive This has a pad that is sensitive to finger touch, for moving the
Mouse icon/cursor.
Wireless Mouse It communicates with the computer by emitting infrared signals or
low-intensity radio signals (see Figure 3.6).
(b) Touch Screen It is a monitor screen that is overlaid with a plastic layer. At
the back of the layer, there is an invisible, criss-crossing infrared light. This
arrangement enables a user to choose either an action or instruction on the
screen by using fingers. The touch screen is easier to use, especially when
someone requires information immediately. It is usually used at automated
teller machines (ATM), information kiosks, several restaurants and petrol
stations.
(c) Light Pen It is a pen or a device like a pen, which is light sensitive and
connected via a cable to a computer. The location (or choice) is identified by
pressing its button against a specific position on the screen. It is normally
used for drawing images and selection of menu.
(d) Digital Board This is a device that can be used to plot or copy certain
drawings or pictures. The item to be copied is placed on a digital tablet.
Then, a specific stylus connected to the computer is used to plot the
material. As the stylus moves from one location to another, the computer
records the locations from the digital tablet. When the material has been
plotted, the image can be displayed on screen, printed on paper or stored in
a computer system for future use. Digitisers are normally used by
designers, architects and engineers.
(e) Pen-Based System This uses a pen to enter handwriting or marks into the
computer containing software to identify and digitise handwriting and also
hand drawings. There are four types of pen-based systems like those
explained in Table 3.5.
SELF-CHECK 3.2
ACTIVITY 3.2
(a) Optical Recognition This technology device, also known as the optical
reader, uses light to scan images. Examples of optical recognition devices are
illustrated in Figure 3.8.
(ii) Fax Machine Fax machine (see Figure 3.9) is used for scanning
images and sending them electronically via a telephone line to a
destination (fax machine). There are two types:
(iii) Barcode Reader It is used for reading input in bar form - marks that
resemble vertically shaped zebra stripes.
(c) Voice Recognition Device This device converts human voice/speech into
digital codes. Human voice is transferred through a microphone that is
connected to a computer. When this input device is combined with sound
cards and appropriate software, a sound recognition system is formed. This
system enables a user to operate a microcomputer to develop documents,
by giving orders using the human voice. It has the potential to be used as a
security method.
Copyright Open University Malaysia (OUM)
52 X TOPIC 3 INPUT AND OUTPUT
(d) Smart and Optical Card The smart card refers to the multi-purpose card,
or MyKad, distributed by the National Registration Department (JPN), as
well as credit and debit cards distributed by various commercial banks like
Maybank and CIMB Bank. The use of the optical card is still restricted
despite its ability to store information of up to 2,000 pages as compared to
smart cards (able to store information up to 30 pages, depending on the
capability of the microprocessor) and magnetic cards (able to store
information of up to half a page).
(a) Audio Input Device It is used to record or play analogue music in digital
form. It can generally receive various forms of sound as input, whereas, a
sound recognition device can receive only one type of audio input, i.e.
sound input. There are two methods of digitising the audio:
(i) Audio Board The board that changes analogue sound to digital
sound and saves it for future use; and
(b) Video Input Device Enables video pictures to be converted into digital
form through a specific card. There are two types of video card:
(i) Frame Capture Can digitise one frame at one time only; and
(ii) Full Movement Can convert at the rate of 30 frames per second.
The main problem here is storage, not the input. Nowadays, digital video
cameras are available in the market, where the output is in digital form.
Digital video recorders will facilitate multimedia presentation or a form of
new broadcasting on the Internet, i.e. web television.
(d) Sensor These are input devices that collect data in specific forms directly
from the environment and send them to the computer. Sensors can be used
to track data such as speed, weight, temperature, image, shape, light, air
pollution, etc. Have you ever weighed yourself using an audio enabled
weighing scale at a supermarket? That is one example of a sensing device
used to measure your weight and also your height.
SELF-CHECK 3.3
1. What is the most common type of input device? Why are there
various types of input devices?
ACTIVITY 3.3
How do we know that the data we have entered into the computer is
correct?
Besides soft copies and hard copies, decisions on output largely depend on a
number of factors, such as:
ACTIVITY 3.4
3.5.1 Printer
The image displayed on the monitor is often referred to as soft copy. Information
that is produced on paper, whether from printer or plotter is called a hard copy
(see Figure 3.14).
Three popular types of printers always used together with microcomputers are
as follows:
(a) Ink Jet Printer Sends out droplets of ink at high speed onto the surface of
paper. This process does not only produce images of high quality letters,
but also allows printing to happen in various colours. An ink jet printer is a
printer that is reliable, quiet and cheap.
(b) Laser Printer Utilises the emission of a laser beam onto the drum, and is
transferred onto paper by using the toner (as in the photocopy machine).
There is a laser printer that is classified as a postscript printer. Postscript is
a printer language, often called page description language (PDL), which has
been accepted as a standard for laser printer.
The measure of printer speed depends on the type of printer or the method of
printing, i.e. whether on the basis of characters, lines or pages. The speed is
characters per second, lines per minute or pages per minute. Most printer models
are desktop printers which are difficult to move around (depending on size). The
use of laptop computers leads to portable printers.
Among the criteria in choosing printers are image quality, speed, level of noise
and cost of operation, such as ink cost, spare parts, etc.
SELF-CHECK 3.4
3.5.2 Monitor
Monitors are used for output as well as for input. There are two types of
monitors cathode ray tube (see Figure 3.15) and flat panel display (see
Figure 3.16).
(a) Cathode Ray Tube (CRT) A vacuum tube that is used as a display screen
for the computer or video display terminal. The technology is the same as
the television. The cathode ray tube is an output device commonly used
together with the computer. The smallest unit on the screen is called a pixel
(picture element).
(b) Flat Panel Display It is lighter, thinner and uses less power compared to
cathode ray tube. This panel is made up of two pieces of glass/plastic that
have activated materials between them.
Standard
A number of standards have been developed to determine the degree of
computer resolutions. Four standards that are commonly used now are shown in
Table 3.6.
Standard Definition
Super Video Graphics Minimum resolution of 800 600 pixels.
Array (SVGA)
Extended Graphics Resolution up to 1,024 768 pixels; popular standard now.
Array (XGA)
Super Extended Resolution of 1,280 1,024 pixels.
Graphics Array (SXGA)
Ultra Extended The latest and highest standard; its use is continuously
Graphics Array growing, especially for engineering designs at high level
(UXGA) and for graphical fine arts.
3.5.3 Plotter
Plotters are used specifically for producing bar charts, maps, architectural
drawings and three-dimensional illustrations. A plotter can produce multi-
coloured documents of high quality and also documents bigger than that
produced by other printers. There are four types of plotters, which are:
(a) Pen Plotter It moves pens or pencils on the paper draft. This plotter is
very cheap and easy to maintain, but it is slow and less capable of
producing voluminous images and shaded images.
(b) Electrostatic Plotter It uses an electrostatic charge that is faster than a pen
plotter or ink jet plotter. An electrostatic plotter is used for applications that
require voluminous output of high quality, such as those in advertising and
design of graphic arts.
(c) Ink Jet Plotter It produces art lines and multi-coloured output by emitting
droplets of ink onto the paper surface. Its best characteristics are speed,
high quality output and operating quietly. Its main weakness is the
possibility of its jet getting blocked, and this requires more maintenance.
SELF-CHECK 3.5
ACTIVITY 3.5
Input is like a bridge between data and processing, which is to enable data to
be carried from users to computer.
Direct data entry consists of data that can be read by a machine (computer)
and transferred as input directly into the computer.
Indirect data entry requires various media and processing of the data source
before the actual computer processing.
There must be input control to safeguard the integrity of data and to prevent
them from becoming garbage in garbage out.
Output can take various forms, such as screen output, printed paper, signals,
voice, microfilm, etc.
Output devices used together with microcomputers are the monitor, printer,
plotter and voice output device.
LEARNING OUTCOMES
By the end of the topic, you should be able to:
1. Describe five advantages of secondary storage;
2. Explain two types of magnetic storage;
3. Recognise four types of optical storage; and
4. Identify other types of storage devices.
X INTRODUCTION
After our discussion on input and output in the previous topic, we shall now
move on to another computer component device; secondary storage. You will be
introduced to various types of secondary storage in the market, together with
their comparisons.
Primary storage holds data temporarily, while secondary storage does otherwise.
Secondary storage is the physical material on which a computer stores data,
instructions and information. A storage device is designed to store data and
instructions in a permanent form and to retrieve them back. This storage does not
Copyright Open University Malaysia (OUM)
64 X TOPIC 4 SECONDARY STORAGE
Capacity of a storage medium refers to the number of bytes (characters) that can
be held. Figure 4.2 shows the capacity of a storage medium.
The speed of storage devices is defined by access time. Access time measures the
amount of time it takes to locate the required data on a storage medium.
Characteristics Advantages
Size Can accommodate large amounts of data.
Data stored can reach gigabyte (GB) or terabyte
(TB).
Reliability It can be considered safe.
Convenience Data can be accessed immediately.
Economic Storage costs can be reduced.
Lifetime It is permanent and can be used for archiving.
Some storage has a lifespan of up to 100 years.
ACTIVITY 4.1
As the tape is in roll form, data will be stored serially. Every tape column (seven
or nine tracks) will represent one character. For data that is stored serially, the
storage method used is serpentine, where data is stored one by one along one or
two tracks at one time. Data will be written from the beginning to the end of the
track concerned, and this will continue onto the part that has not yet been used,
as shown in Figure 4.3.
Besides that, there is also data that is stored in parallel. For the parallel type, data
will be written block by block or record by record. Every block of data will be
separated by a space, which is called inter-block gap. For record by record, the
space is called inter-record gap. The space is required because the tape cannot
stop immediately after it has been rolled. Normally, the use of tape is only
35%70%, depending on the blocking factor.
A magnetic tape drive is measured by how much data can be stored on the
magnetic tape and also the speed of the tape passing through the read/write
head. The combination of these two determines the rate of transfer or the number
of characters per second that can be sent to the primary storage. Tape density is
measured by character per inch or bit per inch. Data density varies from 800 bpi
to 7000 bpi. The tape length is normally 600 m, 366 m or 731 m.
Therefore, a tape of 366 m with 6,250 bpi can store up to 180 MB of data. The size
of data that can be stored is normally between 40 MB to 5 GB. The drive that can
upgrade its maximum loading is digital audio tape (DAT). A digital audio tape
drive consists of two read heads and two write heads which read/write one type
of magnetic pole only. Data on the tape will be accessed and written serially.
There are two types of magnetic tape magnetic tape unit for large computers
and tape cartridge unit for personal computers. Currently, most tapes are used
for safe storage and copy storage because they are portable and cheap. Storage
size of a normal magnetic tape is between 20 GB40 GB.
The disadvantage of a magnetic tape is the slow rate of serial data access. Its
advantages are it is cheap, portable and long lasting.
SELF-CHECK 4.1
1. Give two advantages of secondary storage.
The hard disk can store and access data faster and has a higher capacity. The
hard disk is a very sensitive device. Its read/write head floats on the disc surface
at a distance of 0.000001 inches. This very close distance allows dusts, atoms of
smoke, human hair and fingerprints to cause destruction to the read-write head.
This damage can cause some or all the data on the hard disc to be destroyed as
well.
An external hard disk is a separate hard disk that connects with a cable to a USB
port on the system unit or communicates wirelessly. Meanwhile, a removable
hard disk is a hard disk that you insert and remove from a drive. Compared to an
internal hard disk, external and removable hard disks (Figure 4.5) are better in
terms of:
(d) Add storage space to a notebook and desktop computer, without having to
open the system unit.
ACTIVITY 4.2
How does it look like in a hard disk drive? Visit the following link to
discover the components of a hard disk drive:
http://www.youtube.com/watch?v=kdmLvl1n82U
During the writing of data onto the surface of an optical device, a high powered
laser beam is used to form microscopic holes (pits) on the disc. Each pit
represents data 0 while part of the disc without a pit represents data 1.
During the reading of the optical disc, a low powered laser beam is directed on
the disc surface. A reflection of the laser beam depends on the holes on the
surface. If there are holes, the reflection of the beam disperses and cannot be
detected by the light detector. This portrays the 0 state. If there is no hole or if
the surface is flat (land), a reflection of the beam focuses and can be detected by
the light detector. This portrays the 1 state.
There are four optical disc technologies used by computers, as shown in Table 4.2.
The examples of Flash Memory Storage are solid state drives, memory cards and
USB flash drive.
(a) Solid state drives are a storage device that uses flash memory to store data,
instructions and information. It is used in all types of computers and
portable devices.
Solid state drives are better than a magnetic hard disk in terms of:
(iv) Lasts three to five years longer than a hard disk lifespan.
(b) Memory cards allow users to easily transport the digital content of their
camera, audio or video player, and other devices to a computer or vice
versa. A memory card is a removable flash memory device that you
normally insert and remove from a slot in a computer, mobile device or
card reader/writer.
(c) USB flash drives are a flash memory storage device that plugs into a USB
port on a computer or mobile device. It is one of the popular portable
storage nowadays, due to its size and weight. It is small and light, with
storage capacities ranging from 512 Mb to 64 GB.
(a) Access files from any device that has Internet access;
Some of the widely used cloud storage providers are as in Figure 4.8.
(a) A magnetic stripe card is a card with a stripe that contains information
identifying you and the card. Information stored in the stripe normally
includes your name, account number, or cards expiration date. A magnetic
stripe card reader reads the information stored on the stripe. An example of
a magnetic stripe card is a membership card.
.
Figure 4.9: Magnetic stripe card and smart card
(b) A smart card, which is similar in size to an ATM or a credit card, stores data
on a thin microprocessor embedded in the card. A smart card contains a
processor and has input, process, output and storage capabilities. When a
smart card is inserted into a specialised card reader, the information on the
card is read, and if necessary, updated. An example of a smart card is
MyKad.
ACTIVITY 4.3
What is the history of computer storage? Visit the following link:
http://www.zetta.net/history-of-computer-storage
Note down the main points and compare your notes with your
coursemates.
Types of Cost/Storage
Cost Per MB Lifespan Size
Storage Size
Diskette RM 1/1.44 MB RM 0.69/MB 35 years 1.44 MB
Hard Disc RM 400/8 GB RM0.05/MB 35 years 320500 GB
CD-R RM 5/650 MB RM0.0076/MB 100 years 650 MB
CD-RW RM 30/650 MB RM 0.046/MB 100 years 650 MB
Magnetic Tape 510 years 10 GB30 GB
DVD 100 years 17 GB
RAM RM 200/64MB RM 3.13/MB Volatile 64 MB1 GB
Zip RM 60/250 MB RM 0.24/MB 510 years 250750 MB
(c) Field It is a unit of data that is made up of one or more characters. This is
the lowest logical level of the data unit. Examples of fields are:
(i) Name: It is usually fixed at 40 characters maximum. MOHD AKIL is
an example of data stored in such field; and
(ii) Identity Card (IC) Number: It is fixed at eight characters (old IC) and
10 digits/characters (new IC), such as 740820-03-1233.
(e) File This is a collection of several related records. An example of this is the
student personal file, containing several students personal records.
Figure 4.11: RAID can make disk volumes more reliable and faster
Data files that have been compressed need to be de-compressed before they can
be used as normal. This technique is called data decompression.
Normally data that has been compressed has a special suffix, such as .zip, .tgz, .Z,
.gz, .lha, .arc, .zoo, and .rar. Compression and decompression techniques are
called codec. Sometimes, this process is also called zip and unzip.
The two main techniques of data compression are shown in Table 4.4.
Technique Details
Lossless Where data compression is done by preserving all input data. In
Technique other words, all input data will be used in the compression process.
This enables data that have been decompressed to be the same as the
input data.
SELF-CHECK 4.2
Secondary storage is a storage device that has been designed to store data
and instructions in a permanent form.
The secondary storage has five advantages which are size, reliability,
comfort, economic and lifetime.
There are two types of magnetic storage: magnetic tape and hard disk.
A magnetic tape is a secondary storage medium whereby its data are stored
inside the tape roll.
The hard disk uses a thick and strong metallic plate. It can store and access
data faster and has a higher capacity.
An optical storage device provides an alternative for the need to store a lot of
data. This device uses the principle of light rather than the magnetic principle
of storing data.
There are four types of optical storage, which are CD-ROM, CD-R, CD-RW
and DVD.
The three ways to upgrade the performances of hard disks are racking the
disk, Redundant Arrays of Independent Disks and compressing/
decompressing the files.
Bit Lossless
Compressing/decompressing Lossy
Compact disc-read only memory Magnetic storage
(CD-ROM) Optical storage
Compact disc-recordable (CD-R) Racking the disc
Compact disc-rewriteable (CD-RW) Record
Digital video disk (DVD) Redundant arrays of independent disks
Field (RAID)
File Secondary storage
Hard disk Write once, read many (WORM)
X INTRODUCTION
From the earlier topic, you now know that a computer system is made up of
hardware and software. Hardware is the physical manifestation of the computer,
while software consists of the programs that command the hardware. Computer
software can be divided into system software and application software. Both
software can be divided further into a few categories, as illustrated in Figure 5.1.
Each of these categories will be explained in greater detail, later in this topic.
5.1 SOFTWARE
For most people, when they think about computers, they normally think about
the hardware, such as keyboard, monitor and processor. They do not realise the
presence and importance of software. Computer software is actually a set of
planned instructions and step by step action that is required to convert data into
information, thus making the computer useful.
The system software is actually divided into OS, utility programs, device drivers
and language translators. The OS contains various functions and features like
multitasking, multi-user, multiprocessor, etc. There are many operating systems
in the market and each has its own strengths and weaknesses. Windows is a
personal computer (PC) OS that is the most popular and has been built by
Microsoft Corporation. UNIX is mostly used in the server system. Linux contains
various features of UNIX and is becoming more popular because it is a free and
reliable OS.
Table 5.1 explains the roles of the system software categories shown in Figure 5.3.
SELF-CHECK 5.1
The OS also enables a computer to perform more than one task simultaneously. It
enables the computer to identify the processor (central processing unit), main
memory (RAM), keyboard, video displays, disc drive and others. The OS also
provides facilities for users to communicate with the computer and acts as an
enabler for running the application software.
The OS is normally stored in the hard disk. When a computer is switched on, it
will first perform the power on self-test (POST). Then, the basic input-output
system (BIOS) inside the read only memory (ROM) will search for the OS to boot-
up the system. The BIOS will search for the OS on the master boot record
(MBR) sector in the floppy disc. If there is no OS on the floppy disk, the basic
input-output system will search for it on the master boot record sector of the
hard disk.
The MBR sector contains information on the OS of the computer. After reading
data from the MBR and meeting the supervisor program, the BIOS will load the
supervisor program into the main memory, which is the RAM. Then, the BIOS
will pass on the computer management job to the supervisor program. Now, the
computer is under the control of the OS and can accept commands from users.
Part of the OS will remain in the main memory for as long as the computer is on.
This portion will always be in the memory and is said to be resident (permanent)
and is made up of the supervisor program. The supervisor program will control
the overall OS and will load into the main memory of other OS programs from
the hard disk, when required. The OS program that is located in the hard disk is
non-resident.
The OS forms the core that enables the computer to function. It works behind the
scenes and becomes the middleman for requests from users and programs. It
manages and drives computer hardware, and reads and writes data from and
onto the disc drive. When a user works on an application program, the
supervisor program will load the software into the main memory, before the
program is executed.
When a user uses the computer, the main memory has the supervisor program,
the application software to be run and the data or information being processed.
Thus, a larger RAM size in a certain computer will enable it to function faster and
in a comfortable manner. If a computer does not contain enough RAM to run the
software, then, the computer will run slowly or it may hang.
5.4 FUNCTIONS OF OS
In general, the functions of an OS are to:
This command-line directs the computer to copy a file from the hard disc
(C:) to the floppy disc (A:). You will need to use a clear command when
using the command-line. This command-line also shows that you need to
inform the computer where to find MYFILE and where to copy YOURFILE
to. If you forget important information or use a wrong format, an error
message will be displayed on the screen.
Among the components inside it are icons, dialogue box and menu.
Examples of software that uses graphical user interfaces are Windows,
Macintosh and BeOS. GUI users interact with the OS and other software
packages by using pointing devices like the mouse and keyboard to enter
instructions.
Now, users do not have to type every line of command; users only need to
select from the screen display. Users use the mouse to manipulate icons,
dialogue box and menu. In a GUI, an icon is a graphic image that represents
a processing activity. For example, a user may select the Recycle Bin icon
to delete a file from storage. The GUI was first introduced in 1983 in
Macintosh computers. GUI simplifies a lot of things for users, where they
now do not have to memorise and enter difficult instructions (see Figure
5.6).
The OS is responsible for ensuring that the three processes execute well and
do not cause the computer to hang. This ability in using the three programs
simultaneously is known as multitasking. An important characteristic of
the OS in managing multitasking is robustness; if one program fails, it does
not cause the computer or other processes to hang. OSes that have the
robust characteristic are UNIX, Linux and BeOS.
SELF-CHECK 5.2
1. State the advantages of the graphical user interface over the
command-line interface.
2. State two methods of opening files using a graphical user
interface.
3. Explain at least three main functions of the operating system.
5.5 FEATURES OF OS
Every OS has its own features. Even the ability of every system is different.
Among the main features of an OS are multitasking, multi-user, multi-
processing, batch processing and virtual memory, as shown in Figure 5.7.
5.5.1 Multitasking
If an OS allows only one task to be performed at one time, such a system is called
single tasking. Multitasking enables a user to perform a new task without having
to exit from the task currently being performed and can even use the result of the
second task inside the first task. For example, a user can produce a chart inside a
spreadsheet software, while using a word processing software and later, insert
the chart into the document being typed. Multitasking is divided into two types,
as shown in Figure 5.8.
Users normally do not see the tangible differences between these two types
of multitasking. Tangible differences may be seen in real-time applications.
Preemptive multitasking is more robust and stable than cooperative
multitasking.
5.5.2 Multi-User
If an operating system is capable of accepting more than one user to access the
computer at one time, it is called a multi-user system.
5.5.3 Multi-Processing
The use of more than one processor is suitable for scientific computers because
computers of this type perform a lot of calculations and processing. As such,
scientific computers require an OS that can manage more than one processor.
Examples of multi-processor type of OS are UNIX (Solaris), Linux, BeOS and
Windows 8. Table 5.2 illustrates four OSes and their maximum processors.
BeOS 8
Solaris 64
Linux 16
IRIX 128
During the early computer era, data processing was done using the batch mode.
This means that data and programs are prepared on batch mode for processing.
Users cannot enter data during the running of program. Data and programs are
collected and prepared first, then later, entered one by one for processing by the
computer. Batch processing is still being used now in the mainframe system
environment. Nowadays, the interactive processing type of OS is very popular,
where users can enter data while programs are executed.
For example, users often find computers running slowly when two or three
software run simultaneously. This is because the OS needs to transfer data from
the main memory (RAM) to the secondary storage (hard disk) and vice versa.
This process of data transfer is slow and often involves some noise signifying
that the computer is accessing the hard disk.
The process of transferring data from virtual memory to the main memory
and from the main memory to the virtual memory is called swap.
Swap space (page) on the hard disk is the storage size that is used as virtual
memory, as illustrated in Figure 5.9.
5.6 TYPES OF OS
We have discussed the functions and features of an OS in the previous sections.
However, we also need to realise that there is no single OS that fits for all kinds
of computers. As we know, nowadays, computers exist in different forms
ranging from as small as mobile phones up to huge servers. So, different OSes
are required to make all these computers work.
In general, OSes can be divided into four categories (see Table 5.3).
We will now take a more detailed look into each category of OS in the following
sections.
Table 5.5 describe nine popular OSes used for mobile and embedded computer
systems.
Application software can exist in a variety of forms, depending on the needs and
requirements of individuals, groups or organisations. The following Table 5.6
describes the forms of seven application software:
Application Explanation
Software
Packaged Software developed and sold for profit. As it is mass produced and
software or copyrighted, this means it caters for a wide variety of users. Examples may
commercial include Microsoft Office, Adobe Photoshop and Norton Antivirus.
software
Custom Software that performs specific functions for any business or industry. This
software software is required when there is no packaged software that can meet
such specific requirements. As a result, the company needs to find or hire
developers to develop the tailor-made software to fulfil the business needs.
Some examples are e-procurement system and e-recruitment system.
Shareware Software distributed and available to try for free. Although it requires no
cost during the trial period, it is still copyrighted. Users need to pay certain
fees to the developer in order to use this software for a longer period of
time. Popular examples of shareware are WinZip and WinRAR.
Freeware Software distributed to be used for free. As it is also copyrighted, users still
do not have access to source codes to make any modifications. QuickTime
Player and Yahoo! Messenger are examples of freeware.
Public Free software and can be used, copied, modified and distributed to others
domain without any restrictions. The public owns the ownership; therefore, the
software software is not copyrighted. Pine and Lynx are examples of public domain
software.
Web Software hosted on a server allowing users to access and interact from any
application computer, via an Internet connection.
Open Software that has no copyright restrictions. Thus, it can be used, modified
source and redistributed freely. It can also be downloaded from the Internet
software without any cost. Examples are Blender and Moodle.
(a) Business software Deals with assisting people to ensure their day-to-day
business can run effectively and efficiently. It comprises of programs like
word processing, spreadsheet, database, presentation, personal information
manager, business software suites, project management and accounting.
Examples are Microsoft Word, Microsoft Excel, Oracle Database, Apple
Keynote and Oracle Primavera.
(b) Graphic and multimedia software Offers the capabilities of handling and
working with complex graphic and multimedia. It covers computer-aided
design, desktop publishing, paint/image editing, photo editing, video and
audio editing, multimedia authoring, and web page authoring. Examples
may include Autodesk AutoCAD, Adobe Illustrator and Adobe
Dreamweaver.
SELF-CHECK 5.3
What is the difference between basic application software and
advanced application software? Explain.
A word processing software enables you to create, edit, format, store and
print texts and graphics in one document.
Since you can save memos or documents that you have typed into the disc, you
can access them at other times to modify them, reprint or do whatever you want
with them. Parts of existing documents that do not change do not need to be
re-typed; the entire document that has been checked can be reprinted as new. An
assignment often done by computer users is to prepare information in the form
of documents. Word processing software is the software mostly used by users.
Five important activities of word processing are as illustrated in Figure 5.11.
Activities that can be done during word processing are editing of document,
search and replace, merging of e-mails, document footing and heading,
footnotes, mathematical functions, index generator, content generator, and
document import and export. You can search any word quickly inside a
document by using the search command inside a word processor. A replace
command can replace one word with another. Besides that, spellings can be
verified by the spelling-checker program. The grammar checker will identify the
use of inaccurate sentences, incorrect grammar or sentences that are too long. The
earliest word processing software was Wordstar. Examples of currently and
widely used word processing software are WordPerfect, Ami Pro and Microsoft
Word.
With the addition of more features into word processing packages, word
processing has crossed the boundary into desktop publishing. Desktop
publishing packages are normally better than word processing packages in
When a document is being edited by a user, the word processing software will
load a copy of the document from the secondary storage (hard disk) into main
memory (RAM). All editing activities will be done on this copy inside the main
memory. This is because data access from the main memory is faster than data
access from the secondary memory. When the user completes editing, he/she can
save the document again into the secondary storage to replace the older copy.
This can cause problems in a mixed environment where OSes like UNIX, OS/2,
BeOS, Windows and Linux exist in one place. A number of methods can be used
to produce a form of document that is portable. Among the methods are
producing document in PDF, postscript (ps) format or in markup languages like
standard generalised markup language (SGML), extensible markup language
(XML) or TeX.
Users can use this format to produce portable documents between different OSes.
All forms of documents like those from spreadsheet, power point presentation,
word processing and graphics, can be converted into PDF format by using Adobe
Distiller software. The PDF documents produced have the hypertext capability,
can be printed and displayed on the computer but cannot be edited. The PDF
format was introduced by Adobe (a company). Most articles that are freely
available on the Internet are in postscript or PDF format.
Users can also produce portable documents in a markup language like hypertext
markup language (HTML), SGML and XML. The main objective of producing
documents in a markup language is to separate information from the document
format. This concept is the same as the concept of separating a program from
data in databases. This way, the document format can be modified easily without
involving the information that is present in the document.
Users can also use TeX software to produce portable documents from documents
in the form of TeX markup language. Document based on TeX can be processed
to produce another document in the form of PDF, postscript and device
SELF-CHECK 5.4
What about spreadsheet software for users at home? It provides them the ability
to enter a set of numbers in meaningful ways, such as a set of deposit and interest
rates for buying a house and offer financial ideas to users who cannot do it
themselves (manually). Home users can use a spreadsheet to perform various
tasks from budget preparation to considering whether to accept a new job or not.
A spreadsheet is divided into rows and columns. Each row is numbered, while
each column is given a name. The intersection between each row and column is
called cell. Each cell contains reference address and fixed address. In each cell,
a user can type in a number, text or mathematical formula. Basically, the solution
to a problem using spreadsheet can be divided into four steps:
(b) Planning for presentation stage Covers how to arrange labels, data,
formula and other instructions to achieve maximum efficiency, clarity and
flexibility.
(c) Data entry stage Involves required type of commands for input, edit and
store values, label, formula and functions in the required presentation.
(d) Testing and using stage Stage that tests whether spreadsheet produces the
results accurately when data is entered.
Other features that are available in an electronic spreadsheet are macro (short
program which can be used to repeat specific steps), mathematical functions, plot
3D, active function and integration with other applications. Figure 5.13 illustrates
an Excel electronic spreadsheet.
SELF-CHECK 5.5
When data is available as a report, i.e. a form that is useful to users, data has
become information.
Concert organisers, for example, can store and change data of the date of the next
concert, seat number, ticket cost and sales. When this has been done, organisers
can use the software to access information, such as the number of tickets sold in
every price range or percentage of tickets sold on the day before the concert.
Database software is useful for someone who needs to reach out to a large
number of people. For example, a volunteer who is looking for blood donors for
the National Blood Bank can store a file of all donors in his area, so that he can
access their names and telephone numbers to enquire on the type of blood
donated, postcode or the last date he/she donated blood.
Data can be in the form of text, video, graphics, audio and others. Databases are
stored in secondary storage. To fulfil the need of organisations, data needs to be
collected, stored and accessed effectively. Databases can help with these three
processes. They also enable data to be processed and shared by various parties.
Data can also be edited, added and erased easily. Users can perform queries over
the database to solve problems. A number of important terms in databases are
entities, attributes, field, record and relationship.
(a) Entities are things, people, places or events whereby the data and
information stored are about them. Examples of entities are universities,
students, employees, cars and doctors.
(b) Attributes or fields, are data or information that explains the characteristics
or features of a certain entity. For a student entity, examples of attributes
are name, address, date of birth, identity card number, matrix number and
gender.
(c) Record is a collection of related attributes for a certain entity. It also can
explain a certain event, which is a number of related fields about a certain
event grouped together logically to form a record. An example of a record
which groups together number of attributes for a student entity is
presented as follows:
Name : Abdullah Adam
Matrix number : 789
Address : No. 7, Jalan Sephia 2, Taman Sephia Permai, 43600
Bangi, Selangor
Date of birth : 1 January 1977
(d) Files are various collections of records containing the same attributes. An
example is a file of First Year Student containing all records
of Year 1 students in the Faculty of Information Technology and
Multimedia Communications.
(e) Database is a collection of several files that are related to one another. The
main source of data for a computer-based information system is the
database. Another objective of the database is to reduce data duplication.
For example, a student database may comprise a combination of students
personal file, file of courses offered at Open University Malaysia, co-
curriculum activities file and student finance file, as shown in Figure 5.14.
Figure 5.15 illustrates the different stages of data inside a database.
A relational database type is the most widely used today. In this type of
database, data is arranged in a table with rows and columns. Each column
constitutes of one attribute and each row constitutes of one record.
With the traditional file system, we may face problems in getting a list of
students' names based on department or list of courses taken by a student,
because the information is present inside three different files.
(a) Data redundancy Same data attributes are repeatedly present in different
files;
(b) Data integrity problem Data needs to be updated in all files to ensure that
they are consistent throughout; and
(c) Program and data independence problem Program and data are closely
related as data is created to feed into a program.
(d) Data integrity can be retained in terms of security and reliability; and
In the database, each file has a relationship with other files. Relationships among
files are made through key fields. In a database, data dictionary stores
information in data and the database structure. In building a database
application, the following seven steps are required, as illustrated in Figure 5.17.
These steps are usually discussed in greater detail in the System Analysis and
Design course. Database management system is required to free data and
application programs to make them independent of each other. This will simplify
data access and editing, minimise data redundancy, define data, manage data
security and maintain data integrity. It can be regarded as a software layer
surrounding the database. The software includes query language, report
generator and utilities, and graphics.
There are three types of relationships that can exist in databases one-to-one,
one-to-many and many-to-many, as shown in Figure 5.18.
For example, let us take the database of a business containing their customer
files, sales file, inventory files and supplier files, as follows:
(a) One-to-one relationship One data can only have a relationship with one
other data, e.g. relationship between customer file and sales file;
(b) One-to-many relationship One data can have a relationship with more
than one other data, e.g. customer file with sales file, if a customer makes
many purchases; and
(c) Many-to-many relationship One or more data can have a relationship
with one or more other data, e.g. many suppliers can supply many items.
In a networked database, every child can have more than one parent. This
arrangement can be bent easily as compared to hierarchical database but there is
a limit on the bent and it needs definitions prior to its use. This type of database
can have all types of relationships. It was first introduced in the 1970s. Today,
both hierarchical and networked types are not widely used. Figure 5.20 shows an
example of a networked database.
Relational database is the most stable and flexible database. Its model was first
introduced by E. F. Codd. It does not require the database structure to be initially
defined. Data is arranged in the form of a table with rows and columns. A name
is given to each table and column. Every table is given a unique column, known
as the main key. This main key is used to link different tables. Relational
databases are widely used today. Figure 5.21 shows an example of a relational
database.
5.10.3 Client-Server
Most database management systems are stored in the server. Database
management system software will store and manage data in the server computer.
The client computer will be used by users to access and process the data
contained in the database of the server computer. This method is known as
client-server system. The client-server system enables a database to be shared by
many users. Examples of a server-based DBMS are Oracle, Informix and Sybase.
An example of software that can build user-interface software is PowerBuilder.
Examples of client-server systems are student registration system in OUM and
foreign worker registration in Malaysia Department of Immigration.
(a) Server has the main function as storage and processing is done by clients;
There are two ways on how to access data in a database, i.e. through query
language and application programs as shown in Figure 5.24.
With this language, users can add, edit, delete and access the database. An example
of the query language is Structured Query Language (SQL) which can be used to
access relational type of databases. An example of SQL instructions are presented in
Figure 5.25.
Users can also access databases through programs that are written in
programming languages like COBOL or C which contain SQL statements that are
embedded inside the programs. This technique is known as embedded SQL, as
shown in Figure 5.26.
SELF-CHECK 5.6
The use of graphic software is very satisfactory if the work is done by a graphic
artist who has the ability in both artistic aspect, as well as the ability to use
sophisticated graphic software to translate ideas. An artist uses the software as a
tool for producing fantastic computer-based arts. Graphic software is software
that converts numerical data into a graphic display form, such as the bar chart,
pie chart, etc. It enables users to produce various types of graphical forms. Five
types of graphics software are shown in Figure 5.28.
(e) Animation graphics Add movements over the image and drawing.
Examples of graphics software used for animation are Maya (for 3D
animation) and Adobe Flash Professional CS6. These types of software were
used to produce Toy Story and Toy Story 2.
There are four categories of system software: OS, utility programs, device
drives and language translators.
Windows, Mac OS, UNIX and Linux are commonly used operating systems.
Besides that, we have also seen application software that is often used to
increase productivity of organisations and individuals such as word
processing, spreadsheet, databases, groupware software, etc.
LEARNING OUTCOMES
By the end of this topic, you should be able to:
1. Explain the concept of programming languages;
2. State five generations of computer languages;
3. Identify six characteristics of programming language; and
4. Recognise different types of programming languages.
X INTRODUCTION
In this topic, we shall know more about programming language. Computer
programs are developed using programming languages. A program is a set of
instructions followed by the computer, so that data can be processed. The process
of producing a program is called programming. Programming is a part of the
larger software development process which consists of problem specification,
program design, programming, program testing and program maintenance.
Figure 6.1: Relationship model among users, programming language and computer
Benefit Elaboration
Knowing superiority of the For example, if development involves a rapid prototype,
programming languages then, it is more efficient to use scripting language like
and where it is suitable to Python, rather than using C or C++.
be used
Understanding weaknesses Each language is suitable for one field. For example, to
of the programming develop a graphical user interface (GUI), it is more
languages efficient to use C++ or Java rather than C. To do a lot of
calculations, Fortran is more suitable than Java or C.
Producing more efficient If a user understands a few programming languages,
solutions he/she can use the most efficient language for solving
problems. For example, if the solution requires access to
databases, it is better to use a scripting language like
Python for linking, rather than C or C++.
Programming languages For example, an object-oriented language will make the
will influence users user think of a solution based on the object concept,
thinking in solving while a logic-based language will make the user think of
problems the solution, based on logic.
Programming languages Most problems are more efficiently solved by experts in
are tools for solving the respective fields. Therefore, experts in certain fields
problems using the can learn appropriate programming languages in order
computer to solve their problems.
Programming
Fields Year
Language
(a) First generation Programming language for this generation is the machine
language. With the machine language, a programmer can write an optimal
program. However, this method is quite difficult because the programmer
needs to remember binary code and numbers. Therefore, the machine
language is rarely used today. The machine language is also dependent on
the computer brand and this adds to more difficulties in using it.
It uses symbols and words to represent instructions and data, and does not
use binary digits like the machine language. An example of a program in
the assembly language is given below:
V86_signal_return :
Call SYMBOL_NAME (save_v86_state)
movl
xorl
call SYMBOL_NAME (do_signal)
jmp restore_all
ALIGN
Among the reasons for the invention of the high-level languages are to:
(ii) Enable a program to run on more than one machine, as it only needs
to be re-compiled before being run on a different machine; and
Source codes are programs that are written in high level languages.
(ii) Report generators are languages used to generate queries and reports
from databases; and
SELF-CHECK 6.1
Each characteristic has its own strengths and weaknesses. The following sections
will discuss strengths and weaknesses of each characteristic.
Besides the above mentioned characteristics, there are also other characteristics of
programming languages like:
(c) Single data structure programming, e.g. APL language treats all data in the
form of matrix or sequential order; Icon language treats all data in the form
of expressions; and
Object-oriented language was invented to develop systems that are large and
complex.
The need for an object-oriented language arose when existing languages could no
longer fulfil the need of systems that are becoming more complex. The
advantages of object-orientation are ease of system management, ability to
change system properly and reusability of components in a new system. The
structure of an object-oriented language makes a program easier to design and
understand. Object-oriented languages handle images, audio, video and sound
much easier than procedural languages (third generation). The basic idea is to
focus on objects in a system, not on functions that occur inside the system.
Concept Description
Class Blueprint that defines the variables (or attributes) and the methods
common to all objects of a certain kind.
Object Each object is an instance of a particular class. Many unique objects
can be created from the same class.
Encapsulation Term given to the process of hiding all details of an object that do not
contribute to its essential characteristics. Encapsulation hides the
implementation details of the object and the only thing that remains
externally visible is the interface of the object (i.e. set of all messages
the object can respond to).
Inheritance Capability of a class to use the properties and methods of another
class while adding its own functionality.
SELF-CHECK 6.2
What is meant by object-oriented programming?
In writing a logic-based program, users make use of Horn Logic, i.e. statement
that uses IF-THEN. All facts and rules will be stated in Horn Logic form.
Subsequently, the user will state a problem to be solved. The system will try to
solve the problem based on facts and rules that have been given. For example, we
can produce the following information based on Horn Logic:
actor {ali}
rich {ali}
Finally, we can ask the system the following question which means, is ali
happy?:
? happy (ali)
The system will answer yes or no based on the information given before. An
example of the logic language is Prolog.
Examples of function languages are Lisp, FP, Scheme, Common Lisp, Hope,
Standard ML, Miranda, Haskell, Hugs and Lucid.
6.4.5 Script
Scripting languages are translated languages that are normally produced for
certain objectives. They can be used for developing prototypes rapidly. This type
of language is portable between various types of computer platforms. Systems
that have been developed in scripting languages run slower. Examples of
scripting languages are awk, sed, Perl, Python, REXX, rebol and ruby.
6.5.1 C
It is a small language with attractive features. The C language is mostly used in
the development of system software and application software.
For example, Linux and UNIX operating systems were developed in C language.
The C programming course is a core subject in computer science programs for
most universities. The C language is quite difficult to learn for new users but it is
a language that has various capabilities and is very powerful.
6.5.2 C++
C++ adds on object features to the C language based on ideas from Simula
language. Initially, it was known as C with Classes language. This language is
mostly used in large and complex systems development, such as telephone
switching, graphic user interface system, traffic control on road, etc.
6.5.3 Java
Java is an object-based language invented in 1995 by James Gosling. It has the
features of C++ and Simula.
Java converts Java programs into byte code, not to object code, where the byte
code can run in any OS by using Java virtual machine without any changes. This
technique enables any Java program to be portable among many computer
systems. Initially, Java was mostly used in producing graphics and animation on
websites. It is known as one of the most widely used programming language in
the world. Java has been popular with the slogan Write once, runs everywhere.
6.5.4 Perl
Perl is a scripting language that can be used in processing of text, common
gateway interface, database communication, etc. PERL has portability feature.
6.5.5 Python
Among applications that have been built using Python are web applications,
address book, computer network management and astronomical software.
Python is an alternative to Perl.
main ( )
{
printf (hello world \ n);
}
This source code needs to be compiled or converted into object code before it can
run in any computer. The compilation process is done by a compiler. If this
program is compiled in Linux, it can only run in Linux; if compiled in Windows,
it can only run in Windows.
While the source code is compiled, it will be linked to a library, i.e. set of existing
instructions inside an OS. In a Windows OS, the library is given as extended
dynamic loading library (.dll). Examples of libraries in Windows OS are vb200.dll
and vb3000.dll. The software (or object code) that is produced requires this
library to run. Since the library is present in the specific OS (e.g. Windows) only,
the object code that is produced can run in a Windows system only.
For example, two types of architecture for the processor are reduced instruction
set computing (RISC) and complex instruction set computing (CISC). Examples
of CISC processors are Intel, AMD and Cyrix while examples of RISC processors
are Alpha, Motorola 6800 and PowerPC. Any program that is compiled for an
Intel processor cannot run on an Alpha processor because both contain different
object codes.
The higher the language is, the nearer it is to the human form.
Object-oriented language was invented to develop systems that are large and
complex.
Scripting languages are translated languages that are normally produced for
certain objectives.
There are two types of Internet scripting language HTML and XML.
Assembler is used to convert programs from the assembly language into the
machine language.
Assembler Logic
Compiler Machine language
Encapsulation Object-oriented language
Function-based language Program
Imperative language Visual language
Inheritance
Interpreter
X INTRODUCTION
In this topic, we shall focus on the Internet itself. You may be familiar with
browsing the Internet, but do you know what the real capability of the Internet
is? Do you know the definition, history, development, issues and evolution of the
Internet? In this topic, we shall discuss all these. We are also going to identify the
client and server node in the Internet. Besides that, you will also identify the
effective process of searching and managing information over the Internet.
Finally, we will explore the current and future trends of the Internet. Let us start!
The Internet is the short form of international networking that refers to the
largest type of global network. Now, imagine that all computer networks in the
world are linked to form one big network of a global nature. This network
formed is called the Internet, i.e. a network formed by a combination of computer
networks in the entire world. With the Internet, a computer in Kuala Lumpur can
access a computer in China, India, US, Japan, Saudi Arabia and anywhere else in
the world.
The Internet is a grouping of computer networks that is very large and covers
the whole world. It operates using Transmission Control Protocol/Internet
Protocol (TCP/IP).
There were various proprietary networks linking several countries before the
Internet era, such as the corporate networks of multinationals that link up their
respective offices worldwide. However, these were not the Internet because the
computers use proprietary systems and not TCP/IP to communicate. The
Internet has adopted the TCP/IP in order to enable various types of computers to
work together. The Internet has been successful in creating a global village where
a community can communicate with another community easily, without physical
and time boundaries.
The term intranet refers to a portion of the Internet that is located inside one
organisation. Intra means inside.
For example, the private portion of the Internet located in all the faculties in the
Open University Malaysia (OUM) constitute as an intranet. The portion must be
guarded by special firewalls to ensure that outsiders are unable to access its
confidential files. So, the intranet is really a subset of the Internet one at the
organisation level, while the other, at the global level.
SELF-CHECK 7.1
(a) Internet;
(c) Extranet.
2. Based on the answers above, explain how they differ from one
another.
7.2 HISTORY
The Internet has an interesting history. By looking at the history, we are able to
evaluate the advantages, disadvantages, weaknesses, past development and
future of the Internet. The Internet was born in the US, in 1969 when the
Department of Defence formed the Advanced Research Project Agency (ARPA)
which started the network. This organisation was responsible for upgrading the
activities of research and development in the field of technology to compete with
the USSR, the predecessor of todays Russia. ARPA was a response to the success
of the USSR in launching the Sputnik communication satellite. In the 1970s, the
US and the USSR were in the Cold War period. Many people thought that the
success of the USSR had awakened the US from sleep.
In the 1970s, initiatives were taken to create a standard data sharing among
various types of computer networks. At that time, every computer company
introduced network systems that were different from one another. This initiative
enabled all computers of different brands in various types of networks to share
data or to communicate among themselves easily. In 1974, a data sharing
technique called TCP was introduced. Later, in 1978, this technique was
expanded to what was called TCP/IP.
ACTIVITY 7.1
In the 1980s and early 1990s, Internet usage was still confined to universities,
research centres and government organisations. Its main applications were e-
mail, File Transfer Protocol (FTP) and Usenet. In 1989, a major development
occurred in an amparticle physics laboratory of the European Organisation for
Nuclear Research (CERN), a large research centre in Switzerland that was
destined to change the Internet forever. Tim Berners-Lee, a researcher at CERN,
proposed an information sharing technique based on hypertext for the Internet
environment.
This multimedia system contains graphics, text, audio and video which can be
indexed and accessed easily by users in the entire world. This system has been
given various names like the web, World Wide Web, W3 or WWW. Hence, the
Internet was born! The web can be defined as a network of various types of
information like graphics, audio, video and its text is based on hypertext. The
original term for hypertext was introduced by Ted Nelson in 1967. Originally,
hypertext only involved document texts but now, it involves documents based
on graphics, audio, video and others.
Ted Nelson worked to develop a hypertext system that was named Xanadu. The
basic idea of the hypertext was once presented by Vannevar Bush in an article As
We May Think in 1947. According to Nelson, hypertext means a collection of
documents or nodes that have links or references among them. Users can read a
document and access other documents via interactive links. The basic concepts in
hypertext are link, accessibility and interactivity. With hypertext, the information
provided is linked among themselves like a cobweb.
In 1992, there were 70 sites that offered HTTP and the web services on the entire
Internet. The HTTP was still not widely used enough because there was no
Internet browser that was good and attractive for users. Most Internet browsers
at that time were based on text.
Mosaic software is considered the main invention, i.e. a great application that has
successfully popularised the Internet to general users instantly. At the end of
1993, within two years of the HTTP introduction, there were 700 websites. The
Internet began to attract media and general public. A lot of news concerning the
Internet was found in magazines, newspapers and television.
On the commercial aspect, the Internet began attracting the attention of giant
commercial organisations. Many people think that the Internet is the key to their
future success in business. Many Internet-based companies have been formed in
big numbers. Marc Andreessen and a few friends set up an Internet technology
company and produced an Internet browser called Netscape. This browser was
given free to all users. The giant Microsoft Corporation was quite late in entering
the Internet. This company produced the Internet Explorer browser as a means of
dominating the Internet. Competition between these two Internet browser
software brands in attracting the Internet users market is very interesting. Many
people thought that whoever dominates the browser software would dominate
the Internet. With regards to this, the box below presents an interesting story
about a rivalry between Netscape and Microsoft.
From 1996 to 1999, there was a war on Internet browser software the software
that is used to surf the Internet between software giant Microsoft and
Netscape. Why? Many people thought that whoever managed to control the
market in the Internet browser software, would ultimately control the Internet
because the Internet browser is the vehicle for accessing the Internet.
Microsoft Corporation entered the Internet quite late. After realising the
importance of the Internet, Microsoft began to set out a strategy for controlling
the Internet. Remember that Microsoft was controlling 90% of the personal
computer operating systems market (nine out of 10 personal computers sold
were using Windows 95/98/ME/XP system). As a first step, Microsoft
produced the Internet Explorer and it was given out for free to customers. As a
result, in 1998, almost 90% of the browser market was controlled by Internet
Explorer.
SELF-CHECK 7.2
Although the popularity of the Internet has increased and many dotcom
companies emerged rapidly, 2000 was a difficult year for the Internet.
Weaknesses on the Internet were felt by users. Among problems that arose were
difficulties in searching for relevant information, network congestion, unfiltered
news, various rumours, spread of viruses through e-mails, low security level
when credit cards were used in transactions, computer invasion and widespread
pornographic materials online. Many dotcom companies suffered from losses
and closed down. Based on research, companies that made profits on the Internet
were those that operated websites selling pornographic materials.
ACTIVITY 7.2
1. Surf the web for articles on the Internet between 1997 and 1999. In
their thirst to popularise the Internet, some of the statements made
could have been exaggerated. Based on current facts, which
statements are true and which statements are false?
Year Event
1969 Four computers were connected on the ARPANET network in US. The
computers were from University of California, Los Angeles; University of
California, Santa Barbara; Stanford Research Institute and University of Utah.
1971 The number of computers in the ARPANET was up to 21. A technique of e-mail
communication was introduced.
1973 The University College of London was connected to ARPANET, the first
connection of ARPANET outside the US.
1978 TCP/IP data sharing technique was introduced.
1979 Usenet was introduced. It involved two computers in ARPANET.
1982 ARPANET used TCP/IP completely. Definitions of Internet and intranet were
introduced. Internet refers to the (worldwide) grouping of computer
networks that uses TCP/IP while intranet refers to a computer network
within an organisation that uses IP technology.
1984 The number of computers on the Internet exceeded 1,000 units.
1988 The Internet was massively attacked by the Internet worms which were
computer softwares that spread on their own. This incident shows the low level
of safety on the Internet. Computer Emergency Response Team (CERT) was set
up to monitor security on the Internet.
1989 The number of computers exceeded 100,000 units. A book entitled Cuckoo Nest
was published. This book explained on how a group of invaders from Germany
were successful in entering some of the US military computers without
permission, via the Internet.
1990 ARPANET was terminated and replaced by the National Science Foundation
Network.
1991 HTTP was created by Tim Berners-Lee at CERN. This became the basis for the
development of the web on the Internet.
1992 The number of computers on the Internet exceeded a million units. Malaysia
also joined the Internet. The Internet network in Malaysia is managed by
Malaysian Institute of Microelectronic Systems (MIMOS). This network is
known as JARING and is participated by several local universities like OUM.
1996 Browser war between Netscape Communicator and Internet Explorer. At that
time, almost 80% of users were using Netscape.
1997 The backbone function of National Science Foundation Network for the
provision of Internet passage was taken over by a commercial company. A
computer programming language based on objects Java, was launched by Sun
Microsystem in 23 May 1997. This language received extraordinary response.
Java enables websites to have various attractive animations. Search engines
were also introduced. There were already 17,618 discussion forums based on e-
mails.
1998 The Internet was estimated to have millions of websites. Electronic commerce
(e-commerce) and portal technology began to attract attention.
1999 The number of computers on the Internet was estimated at 76 million units. The
number of web servers was estimated at seven million units.
2000 An estimated about one billion websites were on the Internet.
In the Internet history and timeline, we have found rapid development of the
Internet just within a period of 30 years. The Internet began as a research network.
Then, it became a communication and data sharing network (this later evolved into
the Internet becoming a platform for social media and social network) and a
network for e-commerce. The Internet has removed the physical boundaries that
divided the world and created a global village that transcends time and space.
ACTIVITY 7.3
The Internet greatly affects human life today. Imagine the impact of the
Internet on society whether in Malaysia or the rest of the world. Also,
imagine if the Internet does not exist today. What are the activities that
users cannot do without the Internet? Discuss.
Computers can also function as servers, i.e. computers that can be accessed by
users on the Internet. A server is a high-powered computer that is used as a
platform for websites, e-mails, electronic discussions, archives, file server, etc.
Normally, a server would use UNIX, Linux, Solaris or Windows 2000 Server as
its operating system.
A server has two forms of identification i.e. an IP address and a fully qualified
domain name (FQDN). Examples of a fully qualified domain name for a server
are www.jaring.my (192.228.128.18) or www.oum.edu.my (202.187.48.7). The
analogy here is that a person has an identity card number and name, so a server
too has an IP address and a fully qualified domain name. As a simple rule, if the
computer is high powered, has an IP address and a fully qualified domain name,
then, the computer is a server.
Fully qualified domain names are used to assist Internet users, because it is easier
to remember a fully qualified domain name such as www.jaring.my, rather than
an IP address such as 192.228.128.18. Therefore, every server on the Internet has
an IP number and name for identification. A fully qualified domain name gives a
lot of information regarding a certain server. For example, the server name
lms.oum.edu.my gives the following meaning lms is the computer, oum is the
organisation name and my is the country name. Therefore, in general, the name
lms.oum.edu.my refers to a server located in OUM.
The end part of the server name normally shows the location or type of
organisation in which the server resides. For example:
Because the Internet originates from the US, the domain name for computers in
the US does not have a country name. For example,
www.facebook.com
Did you know that most server names are in the form of a Uniform Resource
Locator (URL) that has been the basis of HTTP? An example of a URL name is
http://www.oum.edu.my:
Based on the above example, the term web, refers to the combination of a hosting
server on the Internet that offers information based on HTTP. As previously
described, HTTP is the protocol for sending and receiving information based on
hypertext. The information in the form of hypertext can be linked with other
information to create a link or web with wider/broader information. A HTTP
server has a prefix of www like www.oum.edu.my, www.jaring.my and
www.um.edu.my. A HTTP server is also known as a web server.
SELF-CHECK 7.3
With e-mail, users can communicate with anyone, anywhere. E-mail is a type of
communication that is cheap and fast. An e-mail sent from OUM takes only
seven seconds to reach the UK. By using e-mail, users can send attachments like
Microsoft Word documents, software, zipped files, graphics or audio.
The Internet also offers various online discussion topics via Usenet. There are
over 7,000 topics discussed on Usenet and users can choose from various topics
that interest them. In a Usenet discussion, anyone from any part of the world can
give opinions or ideas freely. One of the ways to access is by accessing the Usenet
server, such as http://dotsrc.org/usenet.
The Internet also offers discussions based on e-mails. Discussions normally focus
on a specific topic. Users need to have e-mail accounts to participate in the
discussions. There are several locations that offer discussions based on e-mail for
free, such as http://www.groups.yahoo.com.
The Internet has become a platform or host to various social media and social
networking sites, such as Facebook, Twitter, LinkedIn, YouTube and many more.
All these sites have the features of Web 2.0, which is a term referred to sites that
allow users to connect, interact, contribute and collaborate with each other, rather
than being websites with static pages or just for retrieving information. Web 2.0
provides users with the opportunity to effectively present their ideas, lead online
discussions, share educational content and document files and collaborate with
each other mostly in real-time. Some of Web 2.0 applications are Google Docs,
Prezi, Pinterest and various others.
On the Internet, you can also search and get various types of information for
references and reading. There are various types of information available on the
Internet. A user can get the entire literary works of William Shakespeare,
translations of Quran, sayings of Prophet Muhammad, classical Malay literary
works, recipes for cake making, lecture notes, Central Intelligence Agency (CIA)
reports on Malaysia, etc. Many foreign and local universities have placed their
lecture sources like notes, sample examination paper and online software onto
the Internet to be accessed and these benefits the students. An example of a
lecture website is http://www.vlib.org.
The Internet also offers various news sources which are up to date and fast via
newspaper and television websites.
(a) http://www.cnn.com
(b) http://www.thestar.com.my
(c) http://www.bharian.com.my
Users can also buy various things via the Internet. For example, users can buy
reference books from companies in Germany via the Internet. Purchases via the
Internet normally require credit cards. It is estimated that total sales via the
Internet, also called e-commerce, could reach up to a billion in the near future.
(a) http://www.amazon.com
(b) http://www.ebay.com
(c) http://www.lelong.com.my
The Internet also offers a variety of entertainment such as chat, music, videos,
movies, blogs and games. On the Internet, you can also find various websites that
have been built by people for the purpose of promotion, advertising, etc. Users
can visit websites of a museum, a university, a company or of an individual
person and see various types of information being displayed. These websites
contain a variety of information in the form of text, audio, video, graphics,
cinema, software, etc. In other words, there are numerous materials on hundreds
of websites that can be accessed by the Internet.
Based on the discussions, we can think of the Internet as a very large virtual
environment, without boundaries, without a clear map and without anyone in
control, and which covers the entire world. It can be said to contain a reservoir of
knowledge about the world. It also offers ways of communication to human
beings efficiently and quickly.
ACTIVITY 7.4
Searching for information involves the process of searching the place where the
required information is present. This is an important process. Many users spend
a lot of time exploring the Internet searching for information but to no avail. The
user obtains information that is not relevant and out-of-date.
Two main ways of searching for information over the Internet are through search
engines and portals. Other minor approaches that can also be used are the
Usenet, FAQ, e-mail discussion forums and archive sites. Examples of
components used to search the information on the Internet can be seen in
Figure 7.5.
The Internet security level has improved a lot. This can be seen on sites such as
online banking. For example cimbclicks.com and maybank2u.com. Even so, there
are still successful hackers that access the host computer without permission. If
successfully hacked, they will steal data such as credit card numbers, change
sites, and perform other transactions.
ACTIVITY 7.5
Search engines are not intelligent but they are also not dumb either. They
function based on robot and index.
How does this robot work? A search engine will send many robots to wander
around the Internet. These robots will bring back data on the web servers visited.
Based on the data brought back by the robots, an index will be built. This index
basically contains key words and in which servers the key words are present.
Every search engine has different techniques in building the index. Therefore,
two different search engines will give different answers for the same key words.
Since the size of the Internet is so large, not all Internet servers are accessed by
robots. When users make a request based on key words in a search engine site,
the search engine will refer to the index to get relevant servers. The search engine
will always do the updating process over the index.
7.6.2 Portals
The second best way to access information is to use portals. A portal is a server
that contains a directory of several servers on the Internet based on categories of
information available on the servers. Users can find information by accessing the
servers in related categories.
(a) http://www.google.org
(b) http://www.yahoo.com
(c) http://www.wikipedia.org
Portals require human beings to arrange and classify servers into certain
categories. This method produces a list of servers that are more orderly and can
be used easily. For example, if a user wants to know more about the Java
programming language, he can access servers that are available in the category of
computer programming language. This method often produces information that
is suitable and relevant. The portal (site) at http://www.dmoz.org is an initiative
of Internet volunteers in building a portal. Commercial portals are those like
http:// www.yahoo.com and http://netscape.aol.com. An example of a portal
(website) for BlueHyppo is shown in Figure 7.7.
The acronym RTFM means Read the Fine Manual, i.e. the new user should
have read the manual first before asking trivial questions. The FAQ is a list
document in the form of questions and answers. Questions in FAQ are those that
are often asked inside Usenet discussion corners. More details about Usenet and
FAQ will be deliberated in the upcoming topic in this module.
Besides FAQ and RTFM, users can also search for information on the archive
server, i.e. a server that contains a lot of information on certain specific topics.
Copyright Open University Malaysia (OUM)
168 X TOPIC 7 THE INTERNET
The address of the archive normally can be obtained from FAQ portals or
documents. Many hosts on the Internet serve as archives or centres of
information gathering in certain fields.
SELF-CHECK 7.4
(b) Usenet.
Nowadays, there are many crimes committed through the Internet. There are
also individuals who abuse the Internet as a source of reference for criminal
activities. For example the misuse of chat or social networking sites to lure
women or teenagers.
Businesses too will increase via the Internet. Various steps are being taken to
make the Internet more widespread and easily used by users, e.g. Internet access
via TV, third generation (3G) approach to mobile phones, the use of optical fibres
and high powered lines to houses. Based on our earlier discussion, we find the
Internet too has problems. By understanding these problems, users will be aware
of the limitations, future of the Internet and will not easily believe everything
that is found on the Internet. The Internet is a virtual space and has a very wide
coverage.
There are five major trends related to the future of Internet, as shown in Table
7.3.
Trend Description
We always A simple example is that we access our e-mail in the office or at
communicate using a home using a laptop. If we are mobile, i.e. at the airport, for
variety of devices in example, we still can be connected to the e-mail using other
various places devices, such as smartphone or tablet.
We use a variety of For example, online banking, online games, Internet TV, digital
online services movies, video on demand, magazine subscription or online
everyday newspapers, online purchases, online distance learning and
social networking.
The Internet has Users will be powered by equipment and low cost devices
evolved rapidly from which allow them to create their own content and make the
sharing information product and services to be more personal. To make the content
to collaborative and products more attractive, a collaborative concept was
publication practised for production and better service. This sparked a
phenomenon that changed work ethics, commercial and social
activities among Internet users.
The number of smart These smart products are used to collect and process data. The
products increase information could then be used in the subsequent preparation
everyday for decision-making.
Personal information In future, different devices and users can be used to collect
spread in various information about other users (such as location, time and
system and network behaviour). Data accumulated will be used as a set of system to
indicate the particular user. If there is demand, this can be
disbursed quickly to other parties.
Infographics from the following websites may also provide you an overview of
future developments on the Internet:
(a) http://buildtheresidual.com/27/the-internet-in-2015-
infographic/2013/02/
(b) http://dailyinfographic.com/2016-the-year-of-the-zettabyte-infographic
(c) http://www.smashingapps.com/wp-content/uploads/2011/01/The-
Internet-in-2020.jpg
Arguably, if you want to keep abreast of the Internet in many aspects, you can
get it from the Internet as well. Agree?
ACTIVITY 7.6
Beginning in 1969 until today, computers and the Internet have undergone
five phases of change (before 1969, 19701990, 19901997, 19972000 and
2001onwards) and have become a major part of our life.
The Internet is a grouping of computer networks that is very large and covers
the whole world. It operates using Transmission Control Protocol/Internet
Protocol (TCP/IP).
The term Intranet refers to a grouping of some local area networks inside
an organisation only (intra means inside).
The Internet began in the US with the birth of ARPANET for research and
sharing academic resources. ARPANET grew and was later replaced with
National Science Foundation Network.
Hypertext Transfer Protocol and the World Wide Web speed up the rapid
development of the Internet.
There are two types of computers on the Internet, i.e. host computers and
server computers.
Computers can also function as a server, which is the computer that can be
accessed by users on the Internet.
Server has two forms of identification, i.e. IP address and fully qualified
domain name. A fully qualified domain name is much easier to remember
compared to IP address.
There is a lot of information on the Internet about various things. This can be
searched via search engines and portals.
Cyber Law in Malaysia cannot be used to stop the broadcast of the illegal
materials outside Malaysia. Action can only be taken on the websites
operating in Malaysia.
There are several major trends associated with the future of the Internet such
as existence of online services, the burgeoning number of smart products and
so forth.
ARPANET Intranet
Cyber Law Internet
Domain Internet Protocol (IP)
E-mail National Science Foundation Network
(NFSNET)
Extranet
Search engine
Frequently Asked Questions (FAQ)
Security
Fully Qualified Domain Name (FQDN)
Transmission Control
Hypertext Transfer Protocol (HTTP)
Protocol/Internet Protocol (TCP/IP)
Hypertext
Usenet
Information
World Wide Web (WWW)
LEARNING OUTCOMES
By the end of the topic, you should be able to:
1. Explain seven types of software that are available on the Internet;
2. Distinguish between shareware and freeware;
3. Describe the concept and advantages of open source software;
4. Explain the term File Transfer Protocol (FTP) and telnet;
5. Practise ethics and the use of smiley icons, acronyms and signature
to write e-mails effectively;
6. Discuss Usenet and Frequently Asked Questions (FAQ); and
7. Analyse and discuss the Internet phenomenon.
X INTRODUCTION
In this topic, we shall learn about software that are available on the Internet.
Software can be obtained free of charge but some have to be bought. This topic
will also discuss a popular Internet communication technique, i.e. e-mail. In the
beginning, e-mails were text-based but now, you can even send several types of
data together with e-mails, such as text documents, graphics, audios, PowerPoint
presentations and many more. We will also discuss some of the things related to
e-mail such as ethics, smiley icons and many others. Finally we will discuss the
Usenet and Frequently Asked Questions (FAQ). Are you ready?
We will look at the types of software in more detail in the next subtopic.
Shareware is a type of software that can be used by users for free within a
certain period of time.
After that period, if the user continues to use the software, he/she needs to send
payment to the programmer of the software. This allows the consumer to make a
choice whether to continue using it or switch to another application.
Do you know some of the examples of this software? Examples of shareware are
Winzip (see Figure 8.2) and McAfee (antivirus).
Besides shareware, there is also freeware. It is available free of charge from the
Internet. Often, this software has a specific charge to users who want to add
functionality or upgrade the software. If not, the user will remain with the basic
functions or normal functions of the software.
Open source software is software that can be obtained without any cost,
together with its source code that is licensed to be studied, changed and
redistributed freely to others.
Distribution of the software together with its source codes has the following
advantages:
(a) Users can modify the software and are not tied/bound to any company;
(b) Users have the opportunity to remove errors that may be present in the
source codes; and
(c) Users can also learn how the software is built based on the source codes.
The open source software began with the GNU project (GNU is not UNIX), i.e. a
project founded by Richard Stallman from Massachusetts Institute of Technology
(MIT) in the beginning of the 1980s. The original aim of this project was to
produce a system based on UNIX for free. This project has been successful in
producing software of high quality, such as GNU Compiler Collection (GCC)
compiler, Lisp program compiler, Emacs editor and others. All GNU software
uses the copyright called GNU Public Licence (GPL) which states that anyone
can modify the program source code but the modification must be shared with
other users. Basically, GNU encourages software and source code sharing among
users so that high quality software can be produced.
The GNU Public Licence concept is the opposite of the commercial software
concept. Commercial software would tie users to the software company. If the
software contains errors, users will have to wait for the newer version to be
produced and this will take a long time. If the software company raises the price,
users will have to accept that and pay more for the latest version of the software.
Users can make any modification to the source code of the open software but
users are requested to share the modification with other users via the Internet.
With this intellectual sharing, it is hoped that the software will be continuously
modified, so that it will become high quality software.
Examples of open source software widely used today are Linux (operating
system), Apache (web server), GNU Compiler Collection (C language compiler),
Perl and R (statistical software). We can see the definition of GNU Public Licence
software, as shown in Table 8.1.
GNU Public
Definition
Licence Software
Linux Operating system for a computer. It is an alternative to commercial
software like Windows 95/98/ME/NT, Mac OS and Sun Solaris. It
is widely used in universities, research centres, private companies
and public. It contains lasting characteristics (Linux can operate for
years without stopping), multiprocessing, multi-user and other
sophisticated characteristics. Today, a Linux system has a desktop
environment similar to Windows 98/ME/NT in terms of user-
friendliness. It can be installed together with Windows 98/ME in
one computer.
TeX A document processing system. It is used to produce various
types of documents and books, especially those that involve
many mathematical expressions. Detailed information can be
obtained on the website http://www.tug.org. TeX is produced
by Donald Knuth, a famous mathematician and computer
scientist. One of his writings is The Art of Computer
Programming in three volumes.
LibreOffice High quality office software which contains word processing,
spreadsheet, database and presentation software for free. This is
an alternative to the Microsoft Office or Open Office. All types of
documents inside Microsoft Office can be read by LibreOffice.
Many government organisations today have changed to
LibreOffice. Users need a minimum memory of 64MB and at least
a Pentium processor to use the LibreOffice with comfort.
GNU A project started by Richard Stallman at Massachusetts Institute
of Technology in 1981 to produce a free UNIX system. Among
the software products of this project are GNU Compiler
Collection C compiler, Emacs editor, R statistical software, Perl
language, Awk processor and Fortran g77 compiler. All GNU
software use a GNU Public Licence.
There are thousands of high quality open source software pieces available over
the Internet for users.
You can visit the following website for detailed information on open source
software:
(a) http://www.opensource.org
(b) http://www.gnu.org
SELF-CHECK 8.1
File Transfer Protocol (FTP) is a technique of downloading data from any File
Transfer Protocol server on the Internet onto the users computer.
Many servers offer anonymous FTP services, i.e. the server allows anyone,
anywhere, to download data from it. Example of a server that offers anonymous
FTP is ftp://ftp.jaring.my.
Users can use a variety of software to manage the files on the server. Among the
commonly used software is CuteFTP (see Figure 8.5).
8.5 TELNET
To use telnet, a user needs to have a user account on the server to be accessed.
The telnet technique can be used to access servers at foreign university libraries,
Usenet server, Internet Relay Chat (IRC) server, MUD server or database server.
An example of the use of telnet is, suppose a user wants to perform complex
calculations that require high performance computers (super), what should
he/she do? Users can proceed to the supercomputer centre in Malaysia, i.e. at
Universiti Teknologi Malaysia (UTM), Jalan Semarak, Kuala Lumpur to perform
these tasks.
Besides that, users can access to the supercomputer via the Internet. Users can
telnet to the supercomputer and perform computations on the computer
remotely. Therefore, the telnet technique enables the sharing of supercomputer
resources for all users wherever they may be in Malaysia.
8.6 E-MAIL
An e-mail is a communication technique between users on the Internet. In the
early days, e-mails were only text-based. Today, users can send various types of
data together with e-mails, such as Microsoft Word documents, PowerPoint
presentations, Excel spreadsheets, graphic .jpg, audio .mp3 and others. The
computer server that manages an e-mail is called the Simple Mail Transfer
Protocol (SMTP) server.
To use e-mails, users need to have an e-mail account on the e-mail server. Most
organisations like universities and private companies give out free e-mail
accounts to their staff. If users use the services of tm.net.my or jaring.my, they
too are given free e-mail accounts.
There are websites that offer free e-mail accounts such as Gmail at
mail.google.com and Yahoo! Mail at mail.yahoo.com. Users can access the
websites and register for the e-mail accounts. These free e-mail websites are
popular among students and other individuals.
An e-mail account contains two parts account name and the name of the Simple
Mail Transfer Protocol server (domain name). For example, a user with the name
Anis Shafiqah has an account name of anis_shafiqah on the host server Simple
Mail Transfer Protocol oum.edu.my. If the user registers at www.oum.edu.my
with that account name, the users e-mail account is anis_shafiqah@oum.edu.my.
The account name has a minimum of eight characters and a maximum of
32 characters, on condition that it does not contain special characters or space.
The following e-mail account names are not valid: anis shafiqah, a shafiqah;
while the following account names are valid: anis_shafiqah and a_shafiqah.
Select a good account name that is suitable and can be easily remembered
by other users. Names such as brutal99, lanunlaut, amy89810 and
mahakaya are certainly not suitable. Imagine the feelings of the receiver when
he receives an e-mail from someone with the name mat_brutal@hotmail.com.
To read an e-mail on the user account on the Simple Mail Transfer Protocol
server, users can use two techniques and they are:
(a) Users can use the server software and access the said Simple Mail Transfer
Protocol server; and
(b) Users can download e-mail from the Simple Mail Transfer Protocol
server onto a personal computer using the Post Office Protocol 3 (POP3)
technique.
writing an e-mail to the server that manages the discussion corners. Normally,
e-mail discussions are managed automatically by computer without human
intervention. Do remember that users communicate with the computer via
e-mails. Therefore, they follow the instructions to participate or to exit from the
discussion corner correctly. A list of e-mail discussion corners can be obtained at
the websites http://www.groups.yahoo.com and http://www.tile.net.
Advantages Disadvantages
Can discuss with and pose questions The number of e-mails received may be a
to many Internet users who are lot. Certain active discussion corners will
knowledgeable in certain fields. see more than 200 e-mails a day.
Answers to questions may be obtained Users need to spend a lot of time reading
very quickly. e-mails.
Can share opinions and information with Most e-mail contents are rubbish and not
people who have the same interest. beneficial.
Low cost.
(a) Observing the traditional customs during discussions. Always respect other
users opinions even if they disagree. Agree to disagree;
(b) Remembering that it is a virtual discussion corner. Users do not know other
users or their background. Other users may be older or may have more
experience. They may be a professor, researcher, program expert, chief
executive officer, campusmate, neighbour, etc.;
(c) Showing good conduct. This demonstrates your personality to other users.
If a user is noisy and obnoxious during discussions, most likely his
questions will not be entertained by other users;
(d) Sharing your expertise and asking questions, if you need the expertise of
other users. By sharing, a user can establish communication with other users;
(e) Respecting the privacy of other users and not discussing private issues;
(f) Willing to forgive other users mistakes and ready to help in solving
problems. Do not entertain people who like to quarrel;
(g) Discussion forums are archived. Maybe in 10 years time, if users search the
Internet, they may find their old e-mails again. Therefore, be careful when
writing them; and
(h) Not posting users private e-mails onto the discussion forums without
permission of the concerned users (very important). This violates the
privacy act of certain countries.
8.6.3 Smiley
An e-mail content in the form of text makes it difficult for users to express
emotions like anger, happiness, sleepiness, hatred, tears and laughter. Therefore,
the smiley icon technique is used. A smiley contains text-based symbols used in
e-mails to represent a certain emotion like anger, hatred and laughter. To view a
smiley, users need to tilt their heads 90 degrees leftwards. Now, most e-mails
have options for smiley icons (see Figure 8.7):
The e-mail is emotionless and has no effect or impact on its reader. Let us change
it into a more effective e-mail by using the smiley icons:
Smiley symbols are :-) and :-(. The second e-mail shows that the writer feels sad
and jokingly asks if the receiver can help. There are hundreds of smiley symbols
and the three most common ones are shown in Table 8.3.
Do you know how the smiley started? You can visit the following website to
learn the history of smiley icons :
http://www.cs.cmu.edu/~sef/sefSmiley.htm
ACTIVITY 8.1
In your opinion, what are other icons that can be added? Try to find
other icons on other websites. Compare ways and means that they are
written.
8.6.4 Acronyms
What is ASAP, ROTFL, RTFM, YMMV, BTW? These characters are acronyms or
short forms that are used to represent phrases that are normally used on the
Internet. In Table 8.4, nine popular acronyms are shown. Acronyms are used to
facilitate users to write quickly without the need to type full sentences in the e-
mail, discussion and chat. This can save time and reduce the errors in spelling. In
fact, space can also be saved!
ACTIVITY 8.2
Guideline Explanation
Ensure that your e-mail This makes it easier for the receiver to read your e-mail. It
content is short and is not proper to send a long-winded e-mail, hoping the
precise. receiver will read it. Remember, the receiver is also busy
with other work and may receive hundreds of e-mails a
day.
Ensure that an exact title is This will help the receiver to determine the importance of
used. the e-mail received.
Do not enclose a large This would cause problems to the SMTP. Limit the size of
sized attachment. your attachment to less than 1MB. There are cases when
users send e-mail attachments of 50MB in size.
Ensure that the e-mail sent Use the virus scanner to examine the e-mail received.
and received does not
contain a virus.
Process your e-mail in a For example, before going out for lunch, solve all your
batch. e-mail communication directly. Do not postpone.
Archive all important e- For reference or evidence in the future.
mails.
Do not subscribe to many For example, if you subscribe to five discussion corners,
e-mail discussion corners. each discussion has 100 e-mails a day. So, you will receive
an average of 500 e-mails a day. Your day will be used to
read e-mails only.
Do not reply to e-mails E-mail enables you to reply directly even to those who
while you are angry. you are not comfortable with. You may regret sending
the reply. Once replied, an e-mail cannot be retracted.
8.7 USENET
A Usenet discussion does not involve e-mails. Users do not have to register with
any server to enter Usenet. For example, if users access the Internet via jaring.my,
they can use the Usenet server news.jaring.my to participate in and read Usenet.
Usenet discussion is divided into a number of major topics. These topics are later
broken down into more specific subtopics. Therefore, users can easily search for
discussion corners that are of interest, as shown in Figure 8.9.
Nick
In the Usenet discussion forums, users can share opinions, request for help,
argue, spread rumours, sell items, criticise someone, get to know each other, etc.
There is no filtering of the Usenet contents. Therefore, the Usenet contents may
be true or false. Users are reminded not to readily believe in stories such as get-
rich-quick-schemes or pills for preventing old age that are available in Usenet.
In Usenet discussion corners, the same questions are occasionally asked by a new
user. To avoid this, veteran users of discussion forums have taken the initiative to
produce a document called frequently asked questions (FAQ).
It is wise to read the FAQ first before posing questions because it contains useful
information for new users to refer to and to know. An FAQ document is available
at the website http://www.faqs.org and has been discussed in Topic 7.
SELF-CHECK 8.2
One of the phenomenons of the Internet nowadays is the addictive uses of social
network websites and applications such as Facebook, Twitter, Instagram, LINE,
Google+ and many more. So, what do you know about social network websites?
Boyd and Ellison (2013) in their article titled Social Network Sites: Definition,
History and Scholarship have defined the social network websites as web-based
services that allow individuals to:
(b) Articulate a list of other users with whom they share a connection; and
(c) View and traverse their list of connections and those made by others within
the system.
Facebook is the most popular social network site that allows users who are part
of the same network to view others profiles, unless a profile owner has
decided to deny permission to those in their network. Figure 8.11 shows the
interface of Facebook website for Open University Malaysia.
The other trending phenomenon on the Internet that currently attracts many
users are the growth usage of smart phones, that leads to active development of
mobile applications in accessing data over the Internet; cloud computing that
allow accessibility, storage and online communication, such as through Google
ChromeOS or Chromebook, Box, Dropbox, Google Drive and etc.; wearable
computing such as Google Glass, smart watches and etc. all technologies that
have been developing to cater the growth of the Internet all around the world.
SELF-CHECK 8.3
Discuss some phenomenon of the Internet and predict the future of the
software and applications used for the Internet.
There are various types of software on the Internet. Some of them are
shareware, freeware, open source software, protocols, file transfer, telnet,
e-mail and Usenet.
Shareware is a software that can be used by users for free within a specific
period.
The open source software begins with the GNU project (GNU is not UNIX),
i.e. a project founded by Richard Stallman from Massachusetts Institute of
Technology in the beginning of the 1980s. The original aim of this project was
to produce a system based on UNIX for free.
Among the advantages of open source software is that the user can change or
modify the software and it is not tied to any company.
File Transfer Protocol (FTP) is a technique of downloading data from any FTP
server on the Internet onto the users computer.
There are several ethical issues that need to be observed during e-mail
discussions.
Acronym or brief phrases are used to represent the commonly used phrase
on the Internet.
Boyd, D., & Ellison, N. B. (2007). Social network sites: Definition, history and
scholarship. Journal of Computer-Mediated Communication, 13(2): 210230.
OR
Thank you.