0% found this document useful (0 votes)
199 views114 pages

HandbookStudent SC015 20212022

Uploaded by

AISHAH NAZIRAH
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
199 views114 pages

HandbookStudent SC015 20212022

Uploaded by

AISHAH NAZIRAH
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 114

Student Handbook

4th Edition
MATRICULATION

COMPUTER
SCIENCE
For the

2021
Specifications
s

USK
KMKt
KELANTAN MATRICULATION COLLEGE
Content
COURSE GUIDE 3
CHAPTER 1 7
Computer System 7
1.1 System Concept 8
1.2 Number System and Representation 11
1.3 Information Coding Scheme 19
1.4 Logic Gate and Simple Circuit 23
1.5 Hardware 42
1.6 Software 44
CHAPTER 2 46
Internet Technology 46
2.1 Basic Concept of Network 47
2.2 Network Architecture 59
2.3 Classification of Network 63
2.4 Introduction to the Internet 66
The Internet 66
Intranet And Extranet 67
The Intranet 67
The Extranet 68
2.5 The Broadband Internet Connection 69
2.6 The Internet Address 74
CHAPTER 3 78
Computer Ethics & Security 78
3.1 Areas of computer ethics 79
3.2 Netiquette 82
3.3 Computer Security Risks 84
3.4 Security Measures 86
CHAPTER 4 89
Multimedia 89
CHAPTER 5 93
Database 93
Basic Concept of Database 94
The Hierarchy of Data 94

1
Database Object 95
CHAPTER 6 98
SDLC 98
Information System 99
System Development Life Cycle (SDLC) 100
CHAPTER 7 109
Programming 109
Programming Language 109
Programming Paradigm 109
Translator 111

2
COURSE GUIDE
RATIONALE
This course is to prepare matriculation students with core elements of computer science and
information technology to pursue first-year degree in related fields.

COURSE SYNOPSIS
This course is to equip students with the elements of computer science and information
technology with includes information technology, computer system, internet technology,
computer security and ethics, multimedia, database and information system. This course is
divided into 7 topics. The synopsis for each topic is presented below:

TOPIC 1: COMPUTERS SYSTEM


▪ System Concept
▪ Number and System Representation
▪ Information Coding Scheme
▪ Logic Gate and Simple Logic Circuit
▪ Hardware (Practical)
▪ Software (Practical)

2. INTERNET TECHNOLOGY
▪ Basic Concept of Network
▪ Network Architecture
▪ Classification of Network
▪ Introduction to the Internet
▪ The Broadband Internet Connection
▪ The Internet Address

3. COMPUTER ETHIC AND SECURITY


▪ Area of Computer Ethics
▪ Netiquette
▪ Computer Security Risk (Assignment)
▪ Security Measures

4. MULTIMEDIA
▪ Practical
5. DATABASE
▪ Practical

6. SYSTEM DEVELOPMENT LIFE CYCLE (SDLC).

7. INTRODUCTION TO PROGRAMMING.

3
COURSE LEARNING OUTCOME
At the end of the course, student should be able to:
1. Explain the basic knowledge of computer system, internet technology, computer
security and ethics in society
2. Create basic multimedia and database projects
3. Solve simple computational problems using analytical and logic skills.

STUDY SCHEDULE
Based on the Matriculation standard which require students to allocate to allocate 60 hours
of study for each credit hour, this course requires 184 cumulative learning hours.An
appropriate distribution of learning hours is shown in Table 1 below.

Programme Learning Outcome (PLO) SLT


Teaching and
Course Learning Outcome (CLO) Learning
Method
PL PL PL PL PL F2F NF2F T
O1 O2 O3 O4 O5

1. Explain the basic knowledge of


computer system, internet 18 18 36
technology, computer security X Lecture
and ethics in society
(C2, PLO 1, MQF LOD 1) 10 10 20

2. Create basic multimedia and


database projects X Practical 28 28 56
(P4, PLO 2, MQF LOD 2)

3. Solve simple computational Tutorial


30 30 60
problems using analytical and (Exam)
logic skills. X
(C4, PLO 4, CTPS3, MQF LOD Tutorial
6) 6 6 12
(Assignment)

Tutorial
OVERALL X X X 92 92 184
Practical

Table 1: Appropriate Time Allocation for the Course

4
TEXT ARRANGEMENT GUIDE

Before you go through this module, it is important that you note the text arrangement.
Understanding the arrangement should help you to organise your study of this course to be
more objective and more effective. Generally, the text arrangement for each topic is as follows:

Learning Outcomes: This section refers to what you should achieve after you have
completely gone through a topic. As you go through each topic, you should frequently refer to
these learning outcomes. By doing this, you can continuously gauge your progress of digesting
the topic.

Self-Check: This component of the module is inserted at strategic locations throughout the
module. It is inserted after you have gone through one subsection or sometimes a few
subsections. It usually comes in the form of a question that may require you to stop your
reading and start thinking. When you come across this component, try to reflect on what you
have already gone through. When you attempt to answer the question prompted, you should
be able to gauge whether you have understood what you have read (clearly, vaguely or worse
you might find out that you had not comprehended or retained the subsection(s) that you had
just gone through). Most of the time, the answers to the questions can be
found directly from the module itself.

Activity: Like Self-Check, activities are also placed at various locations or junctures
throughout the module. Compared to Self-Check, Activity can appear in various forms such
as questions, short case studies or it may even ask you to conduct an observation or research.
Activity may also ask your opinion and evaluation on a given scenario. When you come across
an Activity, you should try to widen what you have gathered from the module and introduce it
to real situations. You should engage yourself in higher order thinking where you might be
required to analyse, synthesise and evaluate instead of just having to recall
and define.

Summary: You can find this component at the end of each topic. This component helps you
to recap the whole topic. By going through the summary, you should be able to gauge your
knowledge retention level. Should you find points inside the summary that you do not fully
understand, it would be a good idea for you to revisit the details from the module.

5
ASSESSMENT

Type Method Percentage (%)

(a) Continuous Assessment (40%) Practical 1 15

Practical 2 15

Assignment 10

(b) Examination (60%) UPS 20

PSPM 40

Total 100

REFERENCE

1. Misty E. V, Susan L. S, Steven M. F, Jennifer. T, Mark F; (2018) Discovering Computers ©2018: Digital
Technology, Data, and Devices 1st Edition
2. Deborah. M, Charles S. P (2012) Understanding Computers: Today and Tomorrow, Comprehensive Cengage
Learning
3. Vaughan T,; (2011) Multimedia: Making It Work, Ninth Edition 9th Edition

6
CHAPTER 1
Computer System

“T o understand how a computer processes data, you should know how a


computer represents data. People communicate through speech by combining words
into sentences. Human speech is analog because it uses continuous (wave form)
signals that vary in strength and quality. Most computers are digital. They recognize
only two discrete states: on and of” (Discovering Computer 2018 p.6-13)

7
1.1 System Concept

Introduction

A computer is an electronic device, operating under the control of instructions stored in its
own memory, that can accept data (input), process the data according to specified rules,
produce information (output) and store information for future use.

Computer system is a collection of entities (hardware,software and liveware) that are


designed to receive, process, manage and present information in a meaningful format.
● Computer hardware - are physical parts/ intangible parts of a computer. eg Input
devices, output devices, central processing unit and storage devices.
● Computer software - also known as programs or applications. They are classified into
two classes namely - system software and application software.

Information processing cycle is a sequence of events consisting of input, processing,


storage & output. Four phases of the Information Processing Cycle:

input process
output

storage

Figure 1.1.1(a): Information Processing Cycle diagram

Information Processing Cycle (IPC) Model

1. Input – Input is any data and instructions entered into the memory of a computer.

● Feeding the collected raw data in cycle for processing. This is the raw data which
is fed for processing & obtaining information.
● Input can be done by means of various devices such as keyboards, mice, flatbed
scanners, barcode readers, joysticks, digital data tablets (for graphic drawing),
electronic cash registers etc

2. Processing – Activities of transforming data/input into information/output.

● Once the input is provided the raw data is processed by a suitable or selected
processing method. This is the most important step as it provides the processed
data in form of output which will be used further.
● Processing is usually done by CPU (Central Processing Unit) in a computer. CPU
is the crucial component for getting the operations done.

8
3. Storage – Physical material on which a computer keeps data, information, programs,
and applications for future use.

● Storage refers to the hardware component, store data for future use.
● Storage can be done on external hard disk, inbuilt hard disk, usb flash drive, micro
SD cards, compact disks or even in registers.

4. Output – Output is data that has been processed into a useful form.

● This is the final outcome and the raw data provided in the first stage is now
“processed” and the data is useful and provides information and no longer called
data.
● This can be used as it is or used for further processing along with more data.

The use of information processing cycle in today’s technology.

Operation of IPC in machines/systems/application.


The explaination of operations is based on the computer roles.

Operation General Explaination


Input Computer/System accepts or read data or instruction entered by user.
Process Computer/System performs operations on the data to produce information.
Output Computer/System presents or deliver the results of data processing to user
Storage Computer/System saves data, programs, or output for future use

Spell Check Program

9
Figure 1.1.1(b): The use of IPC in today’s technology

10
Self Check: Can you...

● Explain the operations involved in information processing cycle


input, process, output, storage
● Analyse the use of information processing cycle in today’s technology

Activity 1.1

Specify the input, process, output and storage examples for each of the following systems.

(a) Parking payment system using Auto Pay Station.


(b) Self flight check in using Airasia Self Check Kiosk.
(c) Touch n Go transaction at Putrajaya toll gate.
(d) Shop Online with net-banking
(e) Ticket machine in LRT station
(f) Pay bill via credit or debit card in PVR, hotels or shopping mall.

1.2 Number System and Representation

Number systems are the technique to represent numbers in the computer system
architecture, every value that you are saving or getting into/from computer memory has a
defined number system.

Computers are machines that do stuff with information. They let you view, listen, create, and
edit information in documents, images, videos, sound, spreadsheets and databases.

To make computers easier to build and keep them reliable, everything is represented using
just two values. You may have seen these two values represented as 0 and 1, but on a
computer they are represented by anything that can be in two states. For example, in memory
a low or high voltage is used to store each 0 or 1.

There are two (2) representations of data in a computer:


• Bit
• Byte

11
Bits

A bit represents a single binary digit of 0 and 1. “bit” is short for binary digit.
In a computer program value of 1 and 0 can be used to represent true/false, yes/no, on/off.
Bit is the smallest unit of data the computer can process.

Bytes

A byte is a group of 8 bits.


A byte can be used to represent an 8 digit binary number. 011000102 (binary) is equivalent to
98 decimal number.A byte can take any value between 0 and 255 (0x00 to 0xFF in
hexadecimal. There 256 possible values.

A byte can also be used to represent a character (letter, digit or punctuation symbol) using
the ASCII coding. It can be used to represent an instruction in a machine code computer
program.

Bytes and memory

Computer memory is organised in bytes. A byte is the smallest amount of data that a computer
can read from (or write to) memory. You cannot read or write individual bits in memory.In a
similar way, files are also organised in bytes.

Decimal and Binary Numbers

Early computers were designed around the decimal numbering system. This approach made
the creation of computer logic capabilities unnecessarily complex and did not make efficient
use of resources.

To deal with the basic electronic states of on and off, von Neumann suggested using the binary
numbering system. His insight has vastly simplified the way computers handle data.

When we write decimal (base 10) numbers, we use a positional notation system. Each digit is
multiplied by an appropriate power of 10 depending on its position in the number:

For example:

843 = 8 x 102 + 4 x 101 + 3 x 100


= 8 x 100 + 4 x 10 + 3 x 1
= 800 + 40 + 3

For whole numbers, the rightmost digit position is the one’s position (100 = 1). The numeral in
that position indicates how many ones are present in the number. The next position to the left
is ten’s, then hundred’s, thousand’s, and so on. Each digit position has a weight that is ten
times the weight of the position to its right.

12
In the decimal number system, there are ten possible values that can appear in each digit
position, and so there are ten numerals required to represent the quantity in each digit position.
The decimal numerals are the familiar zero through nine (0, 1, 2, 3, 4, 5, 6, 7, 8, 9).

In a positional notation system, the number base is called the radix. Thus, the base ten system
that we normally use has a radix of 10. The term radix and base can be used interchangeably.
When writing numbers in a radix other than ten, or where the radix isn’t clear from the context,
it is customary to specify the radix using a subscript. Thus, in a case where the radix isn’t
understood, decimal numbers would be written like this:

12710 1110 567310

Generally, the radix will be understood from the context and the radix specification is left off.

Decimal number system has only ten (10) digits from 0 to 9. Every number (value)
represents with 0,1,2,3,4,5,6, 7,8 and 9 in this number system. The base of decimal
number system is 10, because it has only 10 digits.

The binary number system is also a positional notation numbering system, but in this case,
the base is not ten, but is instead two. Each digit position in a binary number represents a
power of two. So, when we write a binary number, each binary digit is multiplied by an
appropriate power of 2 based on the position in the number:
For example:

101101 = 1 x 25 + 0 x 24 + 1 x 23 + 1 x 22 + 0 x 21 + 1 x 20
= 1 x 32 + 0 x 16 + 1 x 8 + 1 x 4 + 0 x 2 + 1 x 1
= 32 + 8 + 4 + 1

In the binary number system, there are only two possible values that can appear in each digit
position rather than the ten that can appear in a decimal number. Only the numerals 0 and 1
are used in binary numbers. The term ‘bit’ is a contraction of the words ‘binary’ and ‘digit’, and
when talking about binary numbers the terms bit and digit can be used interchangeably. When
talking about binary numbers, it is often necessary to talk of the number of bits used to store
or represent the number. This merely describes the number of binary digits that would be
required to write the number.

The following are some additional examples of binary numbers:

1011012 112 101102

A Binary number system has only two digits that are 0 and 1. Every number (value)
represents with 0 and 1 in this number system. The base of binary number system
is 2, because it has only two digits.

13
Conversion between Decimal and Binary

a) Conversion binary to decimal


Converting a number from binary to decimal is quite easy. All that is required is to find
the decimal value of each binary digit position containing a 1 and add them up.

Example 1: convert 101102 to decimal.


24 23 22 21 20

1 0 1 1 0

1 x 24 0 x 23 1 x 22 1 x 21 0 x 20

16 0 4 2 0

16 + 0 + 4 + 2 + 0 = 22
∴ 101102 = 22

Example 2: convert 110112 to decimal


24 23 22 21 20

1 1 0 1 1

1 x 24 1 x 23 0 x 22 1 x 21 1 x 20

16 8 0 2 1

16 + 8 + 0 + 2 + 1 = 27
∴ 110112 = 27

b) Conversion decimal to binary


The method for converting a decimal number to binary is one that can be used to convert from
decimal to any number base. It involves using successive division by the radix until the
dividend reaches 0. At each division, the remainder provides a digit of the converted number
starting with the least significant digit.

Example 1: convert 3710 to binary

The resulting binary number is: 100101

14
Example 2: convert 9310 to binary

The resulting binary number is: 1011101.

Activity 1.2(a)

1. Explain how data represented in a computer.


2. Differentiate between bit and byte.
3. Explain the number system
4. What is the decimal value for the binary number:
(a) 1010
(b) 00110011
(c) 1110001
5. What is the binary representation for the number:
(a) 98
(b) 257
(c) 1977

Hexadecimal Numbers

Perhaps the biggest drawback to using the binary numbering system for computer operations
is that programmers may have to deal with long and confusing strings of 1s and 0s. To reduce
the confusion, the hexadecimal, or base‑ 16, numbering system is used as shorthand to
display the binary contents of primary and secondary storage.

For any number base greater than ten, a problem occurs because there are more than ten
symbols needed to represent the numerals for that number base. It is customary in these
cases to use the ten decimal numerals followed by the letters of the alphabet beginning with
A to provide the needed numerals. Since the hexadecimal system is base 16, there are sixteen
numerals required. The following are the hexadecimal numerals:

0, 1, 2, 3, 4, 5, 6, 7, 8, 9, A, B, C, D, E, F

15
The following are some examples of hexadecimal numbers:

1016 4716 3FA16 A03F16

The reason for the common use of hexadecimal numbers is the relationship between the
numbers 2 and 16. Sixteen is a power of 2 (16 = 24). Because of this relationship, four digits
in a binary number can be represented with a single hexadecimal digit. This makes conversion
between binary and hexadecimal numbers very easy, and hexadecimal can be used to write
large binary numbers with much fewer digits. When working with large digital systems, such
as computers, it is common to find binary numbers with 8, 16 and even 32 digits. Writing a 16
or 32 bit binary number would be quite tedious and error prone. By using hexadecimal, the
numbers can be written with fewer digits and much less likelihood of error.

A Hexadecimal number system has sixteen (16) alphanumeric values from 0


to 9 and A to F. Every number (value) represents with 0,1,2,3,4,5,6,
7,8,9,A,B,C,D,E and F in this number system. The base of hexadecimal
number system is 16, because it has 16 alphanumeric values. Here A is
10, B is 11, C is 12, D is 13, E is 14 and F is 15.

a) Conversion binary to hexadecimal


To convert a binary number to hexadecimal, divide it into groups of four digits starting with
the rightmost digit. If the number of digits isn’t a multiple of 4, prefix the number with 0’s
so that each group contains 4 digits. For each four digit group, convert the 4 bit binary
number into an equivalent hexadecimal digit.

Example 1: Convert the binary number 10110101 to a hexadecimal number


Divide into groups for 4 digits 1011 0101

Using 8421 technique 8421 8421


8+2+1 4+1

Convert each group to hex digit 11 5

B 5

∴ 101101012 = B516

Example 2: Convert the binary number 0110101110001100 to hexadecimal


Divide into groups for 4 digits 0110 1011 1000 1100

Using 8421 technique 8421 8421 8421 8421


4+2 8+2+1 8 8+4
6 11 8 12
Convert each group to hex
digit 6 B 8 C

∴ 01101011100011002 = 6B8C16

16
b) Conversion hexadecimal to binary

To convert a hexadecimal number to a binary number, convert each hexadecimal digit


into a group of 4 binary digits.

Example 1: Convert the hex number 374F into binary

Divide digits into groups 3 7 4 F (15)


Using 8421 technique 8421 8421 8421 8421
2+1 4+2+1 4 8+4+2+1
Convert each group to binary 0011 0111 0100 1111
digit

∴ 374F16 = 00110111010011112

Example 2: Convert the hex number 9AC into binary

Divide digits into groups 9 A (10) C (12)


Using 8421 technique 8421 8421 8421
8+1 8+2 8+4
Convert each group to binary digit 1001 1010 1100

∴ 9AC16 = 1001101011002

Decimal to Hexadecimal Converter


The below solved example along with step by step calculation for decimal to hexa-decimal
conversionlet the users to understand how to perform such conversions manually.

Step by step conversion:

Step 1: For decimal to hex conversion by successive division, divide the decimal number by
16 until the quotient reach to 0 or less than 16.

Step 2: Note down every remainder (normally decimal numbers less than or equals to 15)
for each successive division by 16.

Step 3: Arranging the remainder from bottom to into equivalent hex number for the given
decimal.

17
Solved Example:
Convert Decimal number 3509 to its Hex equivalent

∴ 3509 = DB516

Hexadecimal to Decimal Converter

Hex is a base 16 number and decimal is a base 10 number. We need to know the decimal
equivalent of every hex number digit. Here are the steps to convert hex to decimal:

Step 1: Get the decimal equivalent of hex from table.

Step 2: Multiply every digit with 16 power of digit location.


(zero based, 7DE: E location is 0, D location is 1 and the 7 location is 2)

Step 3: Sum all the multipliers.

Solved Example:

Convert Hexadecimal number 7DE to its Decimal equivalent

7DE is a hex number

7DE = (7 * 162) + (13 * 161) + (14 * 160)

7DE = (7 * 256) + (13 * 16) + (14 * 1)

7DE = 1792 + 208 + 14

7DE = 2014 (in decimal number)

Self Check: Can you...

● Explain data representation in computer (Bit, Byte)


● Convert between binary and decimal whole numbers
● Describe why hexadecimal notation is used
● Convert between hexadecimal and decimal
● Convert between hexadecimal and binary

18
Activity 1.2(b)

1. Convert the given numbers below to binary number.


(a) 4010
(b) 5610

2. Express the following binary numbers in decimal numbers.


(a) 10110
(b) 11011

3. Give the next three hexadecimal integers in ascending order after FD.

4. Express the following numbers in hex numbers.


(a) 2910
(b) 2410

5. Convert the given numbers below to decimal numbers.


(a) 4AF
(b) 10A

6. Convert the following binary numbers to hexadecimal numbers.


(a) 11011001
(b) 111001000

7. Convert the following hexadecimal numbers to binary numbers.


(a) 11A16
(b) F616

1.3 Information Coding Scheme

In computing, a single character such as a letter, a number or a symbol is represented by a


group of bits. The number of bits per character depends on the coding scheme used.

The most common coding schemes are:


● ASCII [American Standard Code for Information Interchange]
● EBCDIC [Extended Binary Coded Decimal Interchange Code]
● Unicode [Uniform code capable of representing all world’s languages]

19
ASCII :
● ASCII (pronounced “ask-ee”) is most widely used coding scheme to represent data.
● ASCII uses 8 bits that represents a total of 256 (28 = 256) different characters.
● It is used in minicomputers, personal computers and computers that make information
available on the Internet.

EBCDIC:
● EBCDIC (pronounced “ ebb-see-dic”) is a coding scheme used by IBM mainframe
computers and some IBM midrange systems and high end servers.
● EBCDIC uses 8 bits and represents 256 (28 = 256) different characters.
● EBCDIC is widely considered to be an obsolete coding system, but is still used in
some equipment, mainly in order to allow for continued use of software written many
years ago that expects an EBCDIC communication environment.

Unicode:
● Today, computers make international communication and business transactions
possible, with a new coding system named Unicode.
● Unicode uses 16 bits and represent 65, 536 (216 = 65,536) different characters, and
can symbolize all the world’s written languages.
● Unicode is implemented in several operating systems including Windows, Mac OS,
and Linux.

DISADVANTAGES OF ASCII AND EBCDIC


● The 256 characters and symbols that are represented by ASCII and EBCDIC codes
are sufficient for English and Westerns European languages.
● But they are not large enough for Asian and other languages that use different
alphabets .e.g: Eastern languages and historic symbols.

ADVANTAGES OF USING ASCII AND UNICODE


● ASCII uses 8 bits to represent a character, meaning that storing data in ASCII takes
up less memory.
● Unicode represent 65,536 characters, (216 = 65,536) that includes world’s current
languages, classical and historical languages and symbols.

Figure 1.3.1: ASCII Table

20
Figure 1.3.2: EBCDIC Table

Figure 1.3.3: Unicode Table

How computer encode characters using information coding scheme?

Step 1 Use press character on the keyboard, a chip in the keyboard convert key
electronic signal into special code called scan code

Step 2 The scan code for the character is sent to system unit

Step 3 The system unit converts the scan code for the character to its binary ASCII,
EBCDIC or UNICODE and store in memory for processing

Step 4 After processing, the binary code for the character is converted into image
and displayed on the output device

21
Example :

Calculate the total number of bits/bytes in a given word based on each coding scheme

Example :
www.google.com

ASCII EBCDIC UNICODE


Numbers of characters 14 14 14
Bits to represent a character 8 8 16
Number of bits 14 x 8 = 112 14 x 8 = 112 14 x 16 = 224
Number of bytes 112/8 = 14 112/8 = 14 224/8 = 28

1 byte = 8 bits
1 byte = 1 character

Self Check: Can you...

● Describe how computers encode characters using ASCII (8 bits),


EBCDIC, Unicode
● Calculate the total number of bits/bytes in a given word based on
each coding scheme
● Differentiate the coding system based on number of bits and total number of
character represented

22
Activity 1.3

1. What is the advantage of using Unicode over ASCII and EBCDIC coding system?
2. How many characters exists in the following statements?
(a) Computer
(b) Computer Science (SC015)
3. How many bits and bytes used to represent following statements using different coding
schemes?

ASCII EBCDIC UNICODE


characters
bits bytes bits bytes bits bytes

Kelantan Matriculation College

“I’m Lovin It”

我爱饭

1.4 Logic Gate and Simple Circuit

A logic gate is an elementary building block of a digital circuit. Most logic gates have two inputs
and one output. At any given moment, every terminal is in one of the two binary conditions low
(0) or high (1), represented by different voltage levels. Thus, we can define logic gates as
electronic circuits that are used to implement the logic expressions, or Boolean expressions.

Basic Logic Gates


There are three basic logic gates each of which performs a basic logic function, they are called
NOT, AND and OR. All other logic functions can ultimately be derived from combinations of
these three. For each of the three basic logic gates a summary is given including the logic
symbol, the corresponding truth table and the Boolean expression.

The NOT gate


The NOT gate is unique in that it only has one input. It looks like

The input to the NOT gate is inverted i.e the binary input state of 0 gives an output of 1
and the binary input state of 1 gives an output of 0.

23
is known as "NOT A" or alternatively as the complement of .
The truth table for the NOT gate appears as below

0 1

1 0

The AND gate


The AND gate has two or more inputs. The output from the AND gate is 1 if and only if all of
the inputs are 1, otherwise the output from the gate is 0. The AND gate is drawn as follows

The output from the AND gate is written as (the dot can be written half way up the
line as here or on the line. Note that some textbooks omit the dot completely).
The truth table for a two-input AND gate looks like

0 0 0

0 1 0

1 0 0

1 1 1

The OR Gate
The OR gate has two or more inputs. The output from the OR gate is 1 if any of the inputs is
1. The gate output is 0 if and only if all inputs are 0. The OR gate is drawn as follows

The output from the OR gate is written as .

24
The truth table for a two-input OR gate looks like

0 0 0

0 1 1

1 0 1

1 1 1

Other Logic Gates


The three basic logic gates can be combined to provide more complex logical functions. Four
important logical functions are described here, namely NAND, NOR, XOR and XNOR. In each
case a summary is given including the logic symbol for that function, the corresponding truth
table and the Boolean expression.

The NAND gate


The NAND gate has two or more inputs. The output from the NAND gate is 0 if and only if all
of the inputs are 1 otherwise the output is 1. Therefore the output from the NAND gate is the
NOT of A AND B (also known as the complement or inversion of . ). The NAND gate
is drawn as follows

where the small circle immediately to the right of the gate on the output line is known as an
invert bubble.

The output from the NAND gate is written as (the same rules apply regarding the
placement and appearance of the dot as for the AND gate - see the section on basic logic
gates).

The Boolean expression reads as "A NAND B".


The truth table for a two-input NAND gate looks like

0 0 0 1

0 1 0 1

1 0 0 1

1 1 1 0

25
The NOR gate

The NOR gate has two or more inputs. The output from the NOR gate is 1 if and only if all of
the inputs are 0, otherwise the output is 0. This output behaviour is the NOT of A OR B. The
NOR gate is drawn as follows

The output from the NOR gate is written as which reads "A NOR B".
The truth table for a two-input NOR gate looks like

0 0 0 1

0 1 1 0

1 0 1 0

1 1 1 0

The eXclusive-OR (XOR) gate.

The exclusive-OR or XOR gate has two or more inputs. For a two-input XOR the output is
similar to that from the OR gate except it is 0 when both inputs are 1. This cannot be extended
to XOR gates comprising 3 or more inputs however.
In general, an XOR gate gives an output value of 1 when there are an odd number of 1's on
the inputs to the gate. The truth table for a 3-input XOR gate below illustrates this point.
The XOR gate is drawn as

The output from the XOR gate is written as which reads "A XOR B".

26
The truth table for a two-input XOR gate looks like

0 0 0

0 1 1

1 0 1

1 1 0

For a 3-input XOR gate with inputs , and the truth table is given by

0 0 0 0

0 0 1 1

0 1 0 1

0 1 1 0

1 0 0 1

1 0 1 0

1 1 0 0

1 1 1 1

The eXclusive-NOR (XNOR) gate

The exclusive-NOR or XNOR gate has two or more inputs. The output is equivalent to inverting
the output from the exclusive-OR gate described above. Therefore an equivalent circuit would
comprise an XOR gate, the output of which feeds into the input of a NOT gate.
In general, an XNOR gate gives an output value of 1 when there are an even number of 1's
on the inputs to the gate. The truth table for a 3-input XNOR gate below illustrates this point.
The XNOR gate is drawn using the same symbol as the XOR gate with an invert bubble on
the output line as is illustrated below

The output from the XNOR gate is written as which reads "A XNOR B".

27
The truth table for a two-input XNOR gate looks like

0 0 1

0 1 0

1 0 0

1 1 1

For a 3-input XNOR gate with inputs , and the truth table is given by

0 0 0 1

0 0 1 0

0 1 0 0

0 1 1 1

1 0 0 0

1 0 1 1

1 1 0 1

1 1 1 0

Truth tables for combinational logic systems


Before going ahead to look at the outputs in the truth tables, it is worth reminding ourselves
of the number of combinations of inputs possible per number of actual inputs.

One input
If there is only one input (A), then there are only two combinations (logic 0 or logic 1). So the
incomplete truth table would be drawn up as below (ignoring the results in the output column,
Z).
A Z

28
Two inputs
If there are two inputs (A and B) they can be arranged in four different combinations:
A and B both off
A off and B on
A on and B off
A and B both on.

You cannot create any other combinations. The truth table would therefore be drawn up as
below (ignoring the results in the output column, Z). You should notice that the input
columns are arranged in binary number order.

A B Z

0 0

0 1

1 0

1 1

Three inputs
If there are three inputs (A, B and C) they can be arranged in eight different combinations.

A B C Z

0 0 0

0 0 1

0 1 0

0 1 1

1 0 0

1 0 1

1 1 0

1 1 1
Summary
The pattern in the truth tables above is clear. Starting with one input giving two combinations,
you simply double the number of combinations each time an input is added.

1 input: 2 combinations
2 inputs: 4 combinations
3 inputs: 8 combinations
4 inputs: 16 combinations
and so on.

**You will never be asked to work with a system that has more than three inputs.

29
Worked example
The example below shows a logic diagram that has two logic gates. There are three inputs,
so this gives eight combinations in the truth table.

Stage 1 Stage 2
Draw up the results for point D.(This is Draw up the results for point Z. (This is
the output from the AND gate, being fed the output from the OR gate, being fed
by inputs A and B only.) by output D and input C only.)

A B C D Z A B C D Z
(A.B) (A.B) (D+C)
0 0 0 0 0 0 0 0 0
0 0 1 0 0 0 1 0 1
0 1 0 0 0 1 0 0 0
0 1 1 0 0 1 1 0 1
1 0 0 0 1 0 0 0 0
1 0 1 0 1 0 1 0 1
1 1 0 1 1 1 0 1 1
1 1 1 1 1 1 1 1 1

By following this technique, logic system problems can be solved easily.

30
Boolean expressions

Each logic gate has a corresponding Boolean mathematical formula or expression. The use
of these expressions saves us having to draw symbol diagrams over and over again.

The name Boolean is taken from an English mathematician, George Boole, who founded
symbolic logic in the nineteenth century.

The following table gives a list of the common logic gates and their equivalent Boolean
notation. Draw the symbol for each gates.

Logical Gates Boolean Notation Gate Symbol

AND A.B

OR A+B

NOT A

NAND A .B

NOR A+B

EX-OR (A.B) + (A.B) or A + B

EX-NOR (A.B) + (A.B) or A + B

Creating logic diagrams from truth tables

When designing systems, it is normal to design a logic diagram from a prepared truth table.
This may seem difficult to start with, but if you concentrate on the combinations which give a
logic 1 condition in the output column, solutions can be found easily.

The truth table below shows two inputs, A and B, and one output, Z.

A B Z

0 0 0

0 1 0

1 0 1

1 1 0

31
The output Z is at logic 1 in the third row down, and we can see that for this to happen A
must be at logic 1 and B must be at logic 0. In other words

This means that we need a two-input AND gate, with B being fed through a NOT gate. We
can write the statement in shorthand Boolean as

This means that the logic diagram is as shown below.

Worked example
In this problem we have three inputs, A, B and C, with one output, Z. From the truth table we
can see that there are two occasions when the output goes to logic 1.

A B C Z

0 0 0 0

0 0 1 0

0 1 0 0

0 1 1 1

1 0 0 0

1 0 1 0

1 1 0 1

1 1 1 0

In other words, Z = 1 if (A is at logic 1 AND B is at logic 1 AND C is at logic 1) OR if (A is at


logic 1 AND B is at logic 1 AND C is at logic 0).

This means we need a two-input OR gate being fed from two three-input AND gates as
shown below.

32
A
A
A.B.C

(A . B . C) + (A . B . C)
C
A.B.C

The shorthand Boolean equation for this truth table is

Creating logic systems from written specifications


Perhaps the most common application of switching logic is creating a logic system to meet a
given specification. Normally, by reading the specification carefully, the system designer can
almost ‘see’ the required logic system.

Worked example
A burglar alarm system is to sound if a master switch is on and either a light beam is broken
or a pressure pad is stood on.
Draw a logic diagram and a truth table for this system.

Read the specification carefully. You should notice that it has three inputs. These are:
a master switch (M)
a light sensor (L), and
a pressure pad (P).

It has one output, an alarm bell (B).

The bell should go to logic 1 if the master switch is at 1 and either the light beam goes to logic
0 or the pressure pad goes to logic 1. This can be written in Boolean as:

Note: The alarm has to be triggered when the light beam is broken and so a NOT gate is
needed.

33
In other words, you need a two-input AND gate that is fed directly from M and also from a two-
input OR gate that is fed from L (through an inverter) and P. The logic diagram is shown below.

P B
L
L

The truth table for this system is shown below. Again, all you have to do is read the
specification carefully and then read across each row, one at a time, and decide whether the
bell should be ringing or not. There are some short cuts. For example, in the first four rows the
master switch is off; therefore the bell must be at logic 0 – even if there is a burglar in the
house.
M L P B

0 0 0 0

0 0 1 0

0 1 0 0

0 1 1 0

1 0 0 1

1 0 1 1

1 1 0 0

1 1 1 1

34
Activity 1.4 (a)

1. Write an expression for each logic circuit below:

2. Draw a circuit diagram corresponding to the following Boolean expression:

(a) Q=(A + B)(B + C)


(b) Q  A.B  C
(c) Q  B.( A  A)  C
(d) Q  A  B  A.(C  B)
(e) Q  C  ( A  B)

3. Show the behavior of the following circuit with a truth table:

(a)

35
(b)

(c)

(d)

(e)

(f)

36
Construct truth table based on a given logic statement or scenario

Scenario One.

Ali want to print his assignment in library. He can only print the assignment when the the ink
is available and at the same time printer is NOT power off also he has granted to do so by
the library staff. Write down the boolean expression for this statement. After that, lets derive
truth table for the boolean expression and also create gates schematic correctly.

Then you can derive a boolean expression from the statement, this is the example based
on above statement.

𝑋 = 𝐴. 𝐵 . 𝐶

From boolean expression above you can separate it into these elements such as written in
the truth table below.

A B C B AB 𝐴𝐵𝐶

0 0 0 1 0 0

0 0 1 1 0 0

0 1 0 0 0 0

0 1 1 0 0 0

1 0 0 1 1 0

1 0 1 1 1 1

1 1 0 0 0 0

1 1 1 0 0 0

Scenario Two.

The archer trying to targets an arrow straight to the main middle point of the target circle in
order to the get ‘bullseye’ score point. The archer should consider the wind and angle. When,
the wind is blowing NOT too strong and the angle degree percentage is correct OR when the
wind is blowing little bit STRONG but the angle are NOT too accurate. Then the archer should
release the arrow immediately.

Then you can derive a boolean expression from the statement, this is the example based on
above statement.
𝑇 = 𝐴𝐵 + 𝐴 𝐵 can be write as A ⊕ 𝐵

From boolean expression above you can separate it into these elements such as written in
the truth table below.

37
A B A B AB AB 𝐴𝐵 + 𝐴B

0 0 1 1 0 0 0

0 1 1 0 1 0 1

1 0 0 1 0 1 1

1 1 0 0 0 0 0

Scenario Three.

Lets study the logic circuit below and write down correct boolean expression for them.

Suggestion for solution:

STEP 1: To start the processes try to divide the circuit into stages as shown.
STEP 2: Write down the Boolean expressions for all of the output sections of stage 1
STEP 3: Complete stage 2, to arrive at the expression for the system as 𝑄 = (𝐴 + 𝐵) + 𝐶

So, the complete tracing is like below.

38
𝑄 = (𝐴 + 𝐵) + 𝐶

*for your info, the symbol C’ and 𝐶 is in the same meaning.

From this scenario you can evaluate it using truth table such as an example below.

A B C C 𝐴 + 𝐵 (A + B ) + C

0 0 0 1 0 1

0 0 1 0 0 0

0 1 0 1 1 1

0 1 1 0 1 1

1 0 0 1 1 1

1 0 1 0 1 1

1 1 0 1 1 1

1 1 1 0 1 1

39
Draw simple logic circuit for a given logic statement or scenario

First Scenario Schematic: From boolean expression above you can draw a schematic for it.

This the example of full schematic for X = AB + C

Second Scenario Schematic: From boolean expression above you can draw a schematic
for it.

This the example of full schematic for T = AB + AB can be like this 𝐴 ⊕ 𝐵

Then it can also drawn like below:

𝐴 ⊕𝐵

40
Self Check: Can you...

● Identify logical operators (AND, OR, NOT) and symbols (gate) used to
represent each of the operators (AND, OR, NOT)
● Identify combination of different gates) (NAND, NOR, XOR, XNOR)
● Derive Boolean expression (and truth table) based on a given logic
statement
● Construct truth table based on a given logic statement or scenario (maximum 3 inputs)
● Draw simple logic circuit for a given logic statement or scenario (AND, OR, NOT, NAND,
NOR, XOR, XNOR)

Activity 1.4 (b)

Directions: For each of the following word problems, do the following in order:
1. Determine what your Boolean variables are and what they represent. Write what they are
in a key/legend
2. Write out the truth table that represents the word problem. Fill out the truth table according
to the scenario's constraints
3. Simplify the Boolean expression. You can verify your simplified expression with another
truth table
4. Draw the digital circuit for the simplified Boolean expression

(a) KMKt provide vending machine at the library, academic building and mini mart. The
machine can accept either coin or notes. Liza wants to buy a drink from this machine.
The machine will produce a drink if Liza insert enough coins or notes and the type of
drink that she chooses is available.

(b) Each library has a system to manage books as well as to help librarian to perform
borrowing transactions. In KMKt students are allowed to borrow not more than eight
(8) books at one time, while the librarian only manage the borrowing transaction if the
system can function (not out of service). Laila will borrow books if only the book that
she prefers is available.

(c) Three sensors are attached to a printing device, with three alarms attached to the
sensors. The first sensor, "A," detects if the device needs ink. The second sensor, "B,"
detects if the device needs repair. The third sensor, "C," detects if the device should
jam. An alarm sounds if 2 or more problems occur.

(d) A committee of three individuals decide issues for an organization. Each individual
votes either yes or no for each proposal that arises. A proposal is passed if it receives
at least two yes votes. Design a circuit that determines whether a proposal passes.

41
(e) Sometimes light fixtures are controlled by more than one switch. Circuits need to be
designed so that flipping any one of the switches for the fixture turns the light on when
it is off and turns the light off when it is on. Design circuits that accomplish this when
there are two switches and when there are three switches.

(f) Consider a lightbulb hooked to two 3-way switches. You sometimes see these near
staircases. ( Wiring a 3-Way Switch ) The light goes on if only one switch is in the "up"
position and the other switch is in the "down" position. If both are in the "up" position
or both are in the "down" position, the light is off.

PRACTICAL
1.5 Hardware

● A computer is an electronic device, operating under the control of instructions stored in its
own memory, that can accept data (input), process the data according to specified rules,
produce information (output), and store the information for future use
● What is inside a personal computer?
● The electronic components and circuitry of a personal computer usually are part of or are
connected to a motherboard.
● A motherboard, sometimes called a system board, is the main circuit board of the personal
computer.
● Many electronic components attach to the motherboard; others are built into it. Two main
components on the motherboard are the processor and memory.
● Many motherboards also integrate sound, video, and networking capabilities.
● A processor, also called a CPU (central processing unit), is the electronic component that
interprets and carries out the basic instructions that operate a computer.
● Memory consists of electronic components that store instructions waiting to be executed
and data needed by those instructions.

42
Rubric for Assemble Component

CRITERIA 1 2 3 TOTAL

Remove PC Student did not Student removed Student removed


components remove any most components all components
Remove all components successfully from successfully from
components from successfully from their PC. their PC.
the PC. their PC.

Identify Student correctly Student correctly Student correctly


Components identified less identified between identified all
Identify all than 3 5 components from components from
components from components from disassembled PC. disassembled PC.
disassembled PC. disassembled PC.

Assembly of PC Student could not Student correctly Student correctly


Correctly install all correctly install assembled most assembled all
components into PC. any components components into components into
on PC. PC. PC.

TOTAL SCORE

Self Check: Can you...

● Demonstrate competency in the following areas:


i. PC disassembly
ii. PC parts identification
iii. PC assembly

43
PRACTICAL

1.6 Software

● Electronic components in computers process data using instructions, which are the steps
that tell the computer how to perform a particular task.
● A collection of related instructions organized for a common purpose is referred to as
software or a program.
● Using software, you can complete a variety of activities, such as search for information,
type a paper, balance a budget, create a presentation, or play a game.

Rubric for create a complete custom tailored installation of OS in PC

CRITERIA 1 2 3 TOTAL

OS Installation flow Student did not Student did not Student submitted a
chart submit a make necessary complete and
The student submitted completed and revisions to satisfy comprehensive flow
a completed and comprehensive the OS installation chart as required.
comprehensive flow flow chart. process. The flow
chart to guide their chart is incomplete
installation process. and/or lacking areas
of importance.

Install Operating Student was Student was unable Student was able to
System Correctly unable to to successfully successfully install
install appropriate successfully install the the appropriate
Operating System on install the appropriate Operating System,
the PC. appropriate Operating System with very little
Operating on the PC without supervision and
System close guidance and guidance
assistance

Install all device Student was Student was unable Student was able to
drivers Correctly unable to locate, to successfully successfully locate,
identify and install all identify and install locate, identify and identify and install
necessary device the drivers on the install the drivers on the drivers on the
drivers PC. the PC; without PC with very little
close guidance and supervision and
assistance guidance

Install Virus Student was Student was able to Student was able to
Checking Software unable to perform 1 to 3 of the successfully
Download, install and download, install, following five tasks: download, install,
update AVG/Avast free or update the 1. Download and update
edition and run a virus virus checking AVG/Avast Free AVG/Avast Free
scan on the root drive. software. Edition. 2. Install Edition and run a
AVG/Avast Free virus scan on the
Edition on the PC. root drive of the PC,
3. Update as well their USB
AVG/Avast Free drive.
Edition on the PC.
4. Run a virus scan
on the root drive of
the PC. 5. Run a
virus scan on the
student's personal
USB drive.

44
Install 3rd party Student was Student was able to Student was able to
software Download unable to install 1 - 3 of the install all of the
and install the download and five required required
following applications install any of the applications. applications.
on the PC: 1. Adobe required
Acrobat Reader. 2. software.
Shockwave Player. 3.
Flash Player. 4. Java.
5. VLC Media player.

Protection / Student was Student was able to Student was able to


Productivity Install unable to complete installation complete the
task appropriate determine the of 1 - 2 of the installation of all
protection/office appropriate required task related necessary task
productivity suite. software for the software. specific software.
task assigned.

Adequate Student did not Student provided Student recorded


Documentation document as limited, vague adequate
Adequate needed documentation of documentation of
Documentation made throughout the the installation the entire
of the install process installation process. installation process
process.

TOTAL SCORE

Self Check: Can you...

● Create a complete custom tailored installation of OS in PC

45
CHAPTER 2
Internet Technology

“T he Internet is the largest computer network, connecting millions of computers


and devices around the world. How do you access the Internet? Businesses, called
Internet service providers (ISPs), offer users and organizations access to the Internet
free or for a fee. By subscribing to an ISP, you can connect to the Internet through
your computers and mobile devices. Many everyday devices and objects or “things”
are equipped with sensors that transmit data to and from the Internet. The term, the
Internet of Things (IoT), is used to collectively refer to this communications capability.
The IoT includes activity trackers, smartwatches, thermostats, alarm clocks,
coffeemakers, appliances, and more.” (Discovering Computer 2018 p.1-18)

46
2.1 Basic Concept of Network

Definiton : A network is a collection of computers and devices connected together via


communications devices and transmission media.

(a)
(b)
(c)

(h)

(g) (d)

(f) (e)
Figure 2.1.1: Communication System

Figure 2.1.1: A simplified example of a communications system. Some devices that serve as
sending and receiving devices are (a) servers, (b) desktops, (c) laptops, (d) tablets, (e)
smartphones and headsets, (f) portable media players, (g) handheld game devices, and (h)
GPS receivers in vehicles. Transmission media consist of phone and power lines, cable
television and other underground lines, microwave stations, and satellites.

Communications
The process in which two or more computers or devices transfer data, instructions, and
information is known as digital communications. Today, even the smallest computers and
devices can communicate directly with one another, with hundreds of computers on a
corporate network, or with millions of other computers around the globe — often via the
Internet.

Some communications involve cables and wires; others are sent wirelessly through the air.
For successful communications, you need the following:
● A sending device that initiates an instruction to transmit data, instructions, or
information.
● A communications device that connects the sending device to transmission media.
● A transmission media, or a communications channel, on which the data, instructions,
or information travel.
● A communications device that connects the transmission media to a receiving
device.
● A receiving device that accepts the transmission of data, instructions, or information.

47
Figure 2.1.2: Communication System Device

Communications devices

Definition : Communications devices is any type of hardware capable of transmitting data,


instructions, and information between a sending device and a receiving device.

Types of communication devices

1. Modems

Definiton : Modems converts or "modulates" an analog signal from a telephone or cable


wire to a digital signal that a computer can recognize.

There are different types of modem which are used in computer networking; below explain
each one –
i. Cable Modem: In the cable modem, to use the coaxial cables those are connected
to the back edge of modem.
ii. ADSL Modem: ADSL stands for “Asymmetric Digital Subscriber Line” and these
types of modems uses the telephone line for sending and receiving all
information.
iii. DSL Modem: DSL stands for “Digital Subscriber Line“, and it is also known as
“Broadband Modem“. DSL modems offer broadband services for using of
different types of internet connections. DSL modems are comfortable for
higher internet speed.
iv. ISDN Modem: ISDN stands for “Integrated Services Digital Network“, and it
provides to make communication standards for using of digital transmission
of voice, video data over wire or optical fiber.

48
2. Wireless Access Point (WAP)

WAP is a central communications device that allows computers and devices to


transfer data wirelessly among themselves or to a wired network using wireless
technologies, such as Wi-Fi (wireless fidelity). A wireless access point either connects
to a router via an Ethernet or other cable or is part of a router.

Figure 2.1.7: Wireless Access Point (WAP)


3. Router

A router is a communications device that connects multiple computers or other


routers together and transmits data to its correct destination on a network.

Figure 2.1.8 (a): Router

● A wireless router is a device that performs the functions of a router and also a
wireless access point.
● A broadband router is a device that performs the functions of a router and also
a broadband modem.

49
Figure 2.1.8 (b): Through a router, home and small business networks can share access to a
broadband Internet connection, such as through a cable or DSL modem.

4. Network Cards

A network card enables a computer or device that does not have built-in networking
capability to access a network. Sometimes called a network interface card (NIC pronounced
nick). The network card coordinates the transmission and receipt of data, instructions, and
information to and from the computer or device containing the network card.

Figure 2.1.9: Network card for a desktop computer.


5. Hubs or switches

A hub or switch is a device that provides a central point for cables in a network.

Hub is a networking device that allows one to connect multiple PCs to a single network.
Hubs may be based on Ethernet , Firewire, or USB connections. This device does not
manage the traffic intelligently. Unlike a network switch or router, a network hub has no
routing tables or intelligence on where to send information and broadcasts all network data
across each connection.

Switch is a device that connects devices on a computer network by using packet


switching to receive, process, and forward data to the destination device only. It is a
networking device that manage a network between multiple devices smartly. In contrast to the
hub, it reviews the packets of data and directs them just to the right one.

50
Hub Switch

Figure 2.1.10 (a) : hub and switch

Figure 2.1.10 (b) : A hub or switch is a central point that connects several devices in a
network together, as well as connects to other networks, as shown in this simplified diagram.

Transmission Media

Definition: Material or substances capable of carrying one or more communication


signals.

Types of Transmission Media

1. Physical/Wired transmission media

Physical/Wired transmission media use wire, cable, and other tangible materials to send
communications signals.

51
(a) Twisted-pair cable
Twisted-pair cable consists of one or more twisted-pair wires bundled together. The
wires are twisted together to reduce noise ( electrical disturbance).

Figure 2.1.11 :A twisted-pair cable consists of one or more twisted-pair wires.

(b) Coaxial cable


Coaxial cable, often referred to as coax (pronounced KO-ax), consists of a single
copper wire surrounded by at least three layers: (1) an insulating material, (2) a woven
or braided metal, and (3) a plastic outer coating. CATV network wiring often uses
coaxial cable because it can be cabled over longer distances than twisted-pair cable.

Figure 2.1.12: Coaxial cable

(c) Fiber-Optic Cable


The core of a fiber-optic cable consists of dozens or
hundreds of thin strands of glass or plastic that use
light to transmit signals. Each strand, called an optical
fiber, is as thin as a human hair. Inside the fiber-optic
cable, an insulating glass cladding and a protective
coating surround each optical fiber.

Fiber-optic cables have the following advantages over


cables that use wire, such as twisted-pair and coaxial cables:
● Capability of carrying significantly more signals than wire cables
● Faster data transmission

52
● Less susceptible to noise (interference) from other devices, such as a copy
machine
● Better security for signals during transmission because they are less
susceptible to noise
● Smaller size (much thinner and lighter weight)

Disadvantages of fiber-optic cable are :


● It costs more than twisted-pair or coaxial cable and can be difficult to install and
modify.
● Despite these limitations, many phone companies replaced original analog
phone lines with fiber-optic cables, enabling them to offer fiber-optic Internet
access to home and business users. Businesses also use fiber- optic cables in
high-traffic networks or as the backbone in a network.

2.1.13: A fiber-optic cable consists of hair-thin strands of glass or plastic that carry data as
pulses of light, as shown in this simplified example.

2. Wireless Transmission Media

Wireless transmission media send communications signals through the air or space
example radiowave. Many users opt for wireless transmission media because it is more
convenient than installing cables. In addition to convenience, businesses use wireless
transmission media in locations where it is impossible to install cables.

Examples of wireless transmission media are infrared, broadcast radio, cellular radio,
microwaves and communications satellite.

(a) Infrared
Infrared (IR) is a wireless transmission medium that sends signals using infrared light
waves.

53
Figure 2.1.14: Remote control and other device use infrared

(b) Brodcast Radio

Broadcast radio is a wireless transmission medium that distributes radio signals


through the air over long distances such as between cities, regions, and countries and
short distances such as within an office or home.
Example: Bluetooth, UWB, Wi-Fi, WiMAX

Figure 2.1.15 : Radio tower transmission


(c) Cellular Radio

Cellular radio is a form of broadcast radio that is in wide use for mobile
communications, specifically wireless modems and mobile phones.

A mobile phone uses high- frequency radio waves to transmit voice and digital data

54
messages. Because only a limited number of radio frequencies exist, mobile service
providers reuse frequencies so that they can accommodate the large number of users.
Some users install an amplifier or booster to improve the signal strength.

Figure 2.1.16 : As a person with a mobile phone drives from one cell to another, the radio
signals transfer from the base station (microwave station) in one cell to a base station in
another cell.

(d) Microwaves
● Microwaves are radio waves that provide a high- speed signal transmission.
● Microwave transmission, often called fixed wireless, involves sending signals from one
microwave station to another.
● A microwave station is an earth-based reflective dish that contains the antenna,
transceivers, and other equipment necessary for microwave communications.
● As with infrared, microwaves use line-of-sight transmission. To avoid possible
obstructions, such as buildings or mountains, microwave stations often sit on the tops
of buildings, towers, or mountains.
● Microwave transmission typically is used in environments where installing physical
transmission media is difficult or impossible and where line-of-sight transmission is
available. For example, microwave transmission is used in wide-open areas, such as
deserts or lakes, between buildings in a close geographic area, or to communicate with
a satellite.

55

Figure 2.1.17 : A microwave station is a ground-based reflective dish that contains the
antenna, transceivers, and other equipment necessary for microwave communications.

(e) Communications Satellite


● A communications satellite is a space station that receives microwave signals
from an earth-based station, amplifies (strengthens) the signals, and broad-
casts the signals back over a wide area to any number of earth-based stations.
● These earth- based stations often are microwave stations. Other devices, such
as smartphones and GPS receivers, also can function as earth-based stations.
● Transmission from an earth-based station to a satellite is an uplink.
Transmission from a satellite to an earth-based station is a downlink.
● Applications such as air navigation, television and radio broadcasts, weather
forecasting, videoconferencing, paging, GPS, and Internet connections use
communications satellites.
● With the proper satellite dish and a satellite modem, consumers can access
the Internet using satellite technology. With satellite Internet connections,
however, uplink transmissions usually are slower than downlink transmissions.

Figure 2.1.18: Communications satellites are placed about 22,300 miles above the Earth’s
equator.

56
A network can be internal to an organization or span the world by connecting to the Internet.
Many home and business users create a network to facilitate communications, share
hardware, share data and information, share software, and transfer funds.

Advantages of using networks.

 Help people communicate efficiently and easily via email, online social networks,
instant messageing and others.
 Sharing devices such as a printer can be use by multiple users and it can save money.
 Files or documents stored on a network can easily be shared between users.
 Users connected to a network can access shared software on the network.
 Electronic funds transfer (EFT) allows users connected to a network to transfer money
from one account to another such as online banking.
 Data is easy to backup as all the data is stored on the file server.

Figure 2.1.19 :Networks facilitate communications; enable sharing of hardware, data and
information, and software; and provide a means for transferring funds.

Disadvantages of using networks

 Viruses easily spread to other computers throughout a computer network.


 If the server down or network down most of file or data on the network cant be access.
 Network start slow down as more users log onto the network and request files, send things
to be printed and open more software applications.
 To setup a network it required special devices and cabling so that it need a higher cost.
 A largest network need to be maintain by expert worker
 There is a danger of hacking, security procedures are needed to prevent such abuse.

57
Self Check: Can you...

● Explain the concept of network


● Explain types of communication devices and transmission media used in a
network
● Describe the advantages and disadvantages of a network

Activity 2.1

1. Get the meaning of the following term:


a. Network
b. Transmission media
c. Communication devices

2. Ahmad intends to establish a network connection to connect computers, printers,


cameras and scanners in his home to facilitate the sharing of the use of each member
of his family in the home.
a. Name two (2) communication devices that enable the computers and other
devices to be connected to a network. Give the function of the devices.
b. Give two advantages that every family of Ahmad will get after the network has
been successfully created.
c. Explain two disadvantages of a computer network to be faced by Ahmad.

3. 15 PCs and 2 printers need to be set up for a network in Sepakat Jaya Enterprise that
enable for collaboration such as printer and file sharing.
a. Name two (2) communication devices that enable the computers to be
connected to a network. Give the function of the devices.
b. Name one (1) communication device which would enable the network to be
connected to the Internet. Justify your answer.
c. Explain three (3) types of wired media that can be used to setup the network
in an office.
d. Identify the most suitable wireless media that can be used to make computer
connected to a network in an office. Justify your answer.

58
2.2 Network Architecture

Network Architectures

Definiton : The configuration of computers, devices, and media on a network.

Two examples of network architectures are client/server and peer-to-peer.

1. Client/Server
On a client/server network, one or more computers act as a server, and the other
computers on the network request services from the server.

Figure 2.2.1 : Client/ server architecture

● A server controls access to the hardware, software, and other resources on the
network and provides a centralized storage area for programs, data, and
information.
● The clients are other computers and mobile devices on the network that rely on the
server for its resources. For example, a server might store an organization’s email
messages.
● Clients on the network, which include any users’ connected computers or mobile
devices, access email messages on the server.
● Both wired and wireless networks can be configured as a client/ server network.
Although it can connect a smaller number of computers, a client/ server network
architecture typically provides an efficient means to connect 10 or more computers.
● Most client/server networks require a person to serve as a network administrator
because of the large size of the network. some servers are dedicated servers that
perform a specific task. For example, a network server manages network traffic
(activity), and a web server delivers requested web pages to computers or mobile
devices.

59
2. Peer-to-Peer
In peer-to-peer (P2P) networking, a group of computers are linked together with equal
permissions and responsibilities for processing data.

Figure 2.2.2 : Peer-to-peer architecture

● Peer-to-peer networks allow users to share resources and files located on their computers
and to access shared resources found on other computers on the network.
● Peer-to-peer networks do not have a common file server. Instead, all computers can use
any of the resources available on other computers on the network. For example, you might
set up a P2P network between an Android tablet and a Windows laptop so that they can
share files using Bluetooth or so that you can print from the tablet to a printer accessible
to all devices on the network.
● Both wired and wireless networks can be configured as a peer-to-peer network. P2P
networks are ideal for very small businesses and home users.
● Home P2P networks does not require an Internet connection and P2P software. It can be
only two computers connected via a network cable to transfer file.
● An Internet P2P network is set up using an Internet connection and P2P software such
as Limewire and Bearshare.
● Some operating systems include a P2P networking tool that allows users to set up a peer-
to-peer network.
● Many businesses also see an advantage to using P2P. That is, companies and employees
can exchange files using P2P, freeing the company from maintaining a network server for
this purpose.
● Business-to-business e-commerce websites find that P2P easily allows buyers and sellers
to share company information such as product databases.

60
Client-Server Vs Peer-to-Peer

Client/Server Peer-to-peer

A network in which one or more computers act A network in which each computer (called peer)
as a server and the other computers software, have equal capabilities and responsibilities to
and other resources on the network, called share hardware, data or information with other
client, request services from the server. A server computers on the network
controls access to the hardware,

Drawing of Client/Server Drawing of Peer to Peer

● Centralized control by the server can be ● Every machine (users) is taking care of
more efficient at administering the whole his/her own machine so could be difficult to
network. administer the network.
● Network professionals are normally needed ● Easy to install and configure for the
to manage and maintain the whole network. computers in the network.
● Cost to install and manage the network can ● Cost to install and maintain network is
be expensive. inexpensive.
● Only servers have high responsibilities and ● Each computer has equal responsibilities
capabilities. and capabilities.

Advantages

● All files are stored in a central location ● No need for a network operating system
● Network peripherals are controlled centrally ● Does not need server because individual
● Backups and network security is controlled workstations are used to access the files
centrally ● Much easier to set up than a client-server
● Users can access shared data which is network - does not need specialist
centrally controlled knowledge
● No need for specialist staff such as network
technicians because each user sets their
own permissions as to which files they are
willing to share.

Disadvantages

● A specialist network operating system is ● Files and folders cannot be centrally


needed backed up
● The server is expensive to purchase ● Ensuring that viruses are not introduced to
● Specialist staff such as a network the network is the responsibility of each
administrator is needed individual user
● If any part of the network fails a lot of ● Because each computer might be being
disruption can occur accessed by others it can slow down the
performance for the user
● There is little or no security besides the
permissions. Users often don't need to log
onto their workstations.

61
Illustrate types of network architecture based on the given scenario

Scenario :
You are a Network Planner, in your company and you need to draw a computer network layout.
All the devices and workstations in the network is centralised control.The network consists of
five (5) computers. The network also has two (2) unit printer. The network must be connected
to Internet.

Internet

Printer Router/modem
PC1 1
PC2 Switch/hub server

PC3 PC5 Printer2


PC4

Self Check: Can you...

● Explain types of network architecture (Peer-to-peer, Client/Server).(L)


● Illustrate types of network architecture based on the given scenario

Activity 2.2

1. Network architectures are always classified into two broad categories: client-server
architectures, and peer-to-peer architectures.
(a) State one (1) difference between client-server and peer-to-peer architectures.
(b) Draw client-server architecture.
(c) Explain two (2) disadvantages of client-server architecture compared to peer-to-peer
architecture.

2. Identify the type of network architecture based on the situation.


(a) Individuals store files on their personal computers and enable their computers so
that others may download the files.
(b) An office apply centralized network where one or more computers act as dedicated
resource providers to a pool of other computers that need services.

3. Illustrate two (2) types of peer-to-peer network architecture with proper labelling.
 Home P2P
 Internet P2P

62
2.3 Classification of Network

A computer network can be classified into different categories. Different criteria are used to
classify computer networks such as geographical spread (size) and ownership.

Figure 2.3.1: LAN and WAN

1. LOCAL AREA NETWORK (LAN)

● A local area network (LAN) is a network that connects computers and devices in a
limited geographical area such as a home, school, office building or closely
positioned group of buildings.
● Examples of LAN is network in school computer lab, network in cybercafe, network
in small office
● Each computer or device on the network, called a node, often shares resources, such as
printers, large hard drives, and programs. Often, the nodes are connected via cables.
● A wireless LAN (WLAN) is a LAN that uses no physical wires.

Figure 2.3.2: LAN in office

63
Figure 2.3.3: A wired and wireless LAN

Advantages
● Easy to share devices (printers, scanners, external drives)
● Easy to share data (homework, pictures)
● Cost of LAN setup is low because of small coverage area compared to WAN

Disadvantages
● Area covered is limited
● Security-each computer and device become another point of entry for threats
● If all computers running at once, can reduce speed for each.

2. WIDE AREA NETWORK (WAN)

A wide area network (WAN) is a network that covers a large geographical area such as
a city, country, or the world using a variety of wired and wireless transmission media such
as telephone lines, cables, and radio waves. The Internet is the example of world’s largest
WAN.

A WAN can be one large network or can consist of multiple LANs connected together.

What is the advantages and disadvantages


of WAN?

64
How Are LAN and WAN Different?
The main differentiation among these classifications is their area of coverage and network
ownership.

Figure 2.3.4: LAN and WAN compared

Comparison LAN and WAN

Network Area Coverage Network Ownership Example

LAN Connects computers Private which is typically  school computer laboratory


and devices in a limited owned, controlled, and  network in cybercafe
geographical area such managed by a single  network in small office
as home, school, office person or organization.
building.

WAN Connects computers Public -WANs are not ● Internet (the biggest
and devices in a large owned by any one network in the world)
geographical area such organization but rather
as city, country, world. exist under collective or
distributed ownership and
management over long
distances

Table 2.3.1: LAN and WAN compared

Enterprise Private Network (EPN)

An Enterprise Private Network is a computer network that helps enterprise companies with a
number of different offices connect those offices to each in a secure way over a network. An
enterprise private network is mainly set up to share computer resources.

Virtual Private Network (VPN)

A Virtual Private Network is a private network that is built over a public infrastructure. Security
mechanisms, such as encryption, allow VPN users to securely access a network from different
locations via a public telecommunications network, most frequently the Internet.

65
Self Check: Can you...

a) Explain classification of Network.


b) differentiate among Local Area Network, and Wide Area Network based on
area of coverage

Activity 2.3

1. State two(2) main classifications of Network.


2. Define each network classification.
3. Explain the differences between LAN and WAN.

2.4 Introduction to the Internet

The Internet
The Internet began in 1969 as a research project funded by the Department of Defense with
a goal of creating a means of communication beside telephone lines. The first network was
called ARPANET (Advanced Research Project Agency NETwork). In 1985, the U.S. National
Science Foundation (NSF) commissioned the development of a university network backbone
called NSFNET. The system was replaced by new networks operated by commercial internet
service providers in 1995. The focus was on communicating in the event part of the network
was disabled. This early network was the precursor to the Internet. It was limited in function
but launched the idea of a different method of communication. By 2015, approximately 3.2
billion people, or nearly half of the world’s population, were estimated to have access to the
Internet.

Definition Intenet : A worlwide collection of computer networks that connects millions


of businesses, goverment agencies, educational institutions and individuals

The Internet is a public and global communication network that provides direct connectivity to
anyone over a local area network (LAN) or Internet Service Provider (ISP). The Internet is a
public network that is connected and routed over gateways. End users are connected to local
access providers (LANs or ISPs), who are connected to the Internet access providers, to
network access providers, and eventually to the Internet backbone. Since access to the
Internet is open to all, there is a lack of control that may result in an unruly proliferation of
information.

66
Advantages of Internet

 Using internet such as email, VoIP and social media make a communication more
efficient.

 Provide a variety of information and help students to complete their asignment easily
and faster.

 Internet provide the most common sources of entertainmet such as online games,
music, movies and dramas.

 Information is available 24 hours a day through access on the Internet or home


computer files or office/ workshop servers and computer facilities.

 Cloud storage also provides users with the convenience of accessing and store their
files from almost anywhere.

 Most of daily activity can doing thru online such as shooping, transfer money, bill
payment and others.

Disadvantages of Internet

 If personal and confidential records were not protected properly, it might be stole by
inresponsible person.

 A person who uses the Internet very frequently can face abusive or trolls' people and
lead to cyberbullying.

 Allow easy access to pornographic or violent materials among children and teenagers
which leads to bad social and moral development of the younger generation.

 Expose to theft of personal information when using internet applications such as email
and online banking.

 Prolonged or improper computer use to access to the Internet can lead to injuries or
disorders of the hands, wrists, elbows, eyes, neck, and back.

 Users addicted to the Internet will become socially disconnected as they will be drifted
apart from their family and friends.

Intranet And Extranet

The Intranet
An Intranet is a network inside an organization that uses Internet technologies (such as
web browsers and servers, TCP/IP network protocols, HTML hypermedia document
publishing and databases, and so on) to provide an Internet-like environment within the
enterprise for information sharing, communications, collaboration, and the support of
business processes. It is protected by security measures such as passwords, encryption, and
firewalls, and thus can be accessed by authorized users through the Internet.

67
The Extranet
Extranets are network links that use Internet technologies to interconnect the Intranet
of a business with the Intranets of its customers, suppliers, or other business partners.
Extranets provide secured connectivity between corporation’s intranets and the intranets of its
business partners, material suppliers, financial services, government, and customers. Access
to intranets is usually limited by agreements of the collaborating parties, is strictly controlled,
and is only available to authorized personnel.

The protected environment of the extranet allows groups to collaborate, sharing information
exclusively, and exchanging it securely. Since an extranet allows connectivity between
business through the Internet, it is an open and flexible platform suitable for supply chain
management. To increase security, many companies replicate the database they are willing
to share with their business partners and separate them physically from their regular intranets.

Figure 2.4.1 Diagrammatic Contrast of the Internet, Intranet, and Extranet (Source: Turban et
al. (2000), p. 243)

Network Type Typical Users Access Type of


information

The Internet Any individual with Unlimited public; no General public, and
dial-up access or restrictions advertorial
LAN

Intranet Authorized Private and Specific, corporate,


employees only restricted and proprietary

Extranet Authorized groups Private and Shared in authorized


from collaborating authorized outside collaborating groups
companies partners
Table 2.4.1: Characteristics of the Internet, Intranet, and Extranet (Source: Turban et al.
(2000), p. 241)

68
Differences between Internet, Intranet and Extranet
Type Accessibility

Internet Thus content in the network is accessible to anyone connected.

Intranet Intranet is a computer network within an organisation that uses


Internet technologies for members of the organisation only.

Extranet Extranet is the portion of a company’s network that allows customers


or suppliers of a company to access parts of an enterprise’s intranet.
An extranet providers a secure, physical connection to the company’s
network.

Self Check: Can you...

a) Explain the Internet


b) Describe advantages and disadvantages of the Internet.
c) Explain the use of Internet technologies in Intranet and Extranet

Activity 2.4

1. Define Internet
2. Discuss the usage of Internet in our daily life.
3. List two (2) disadvantages of Internet.
4. Differentiate between Intranet and Extranet

2.5 The Broadband Internet Connection

Broadband is the common term for a very fast connection to the Internet. It allows
users to download online entertainment such as video clips and music, listen to digital radio,
send email faster and speeds up everything they do online.
A broadband service can transmit information at up to 40 times the speed of a dial-up
modem connection. As the connection is always on, like water or electricity, users don't
need to dial up every time they want to log on.
Broadband is revolutionising online activities everywhere for businesses, entertainment and
public services. Faster speeds of up to 160 times a dial-up connection will bring about new
services, including internet-TV and video on demand, across home, business and public
life.

Types of broadband
Users can connect their computers and mobile devices to the Internet through wired or
wireless technology and access its services free or fo fee.
With wired connections, a computer or device physically attaches via a cable or wire to a

69
communications device, such as the modem that transmit data or other items over
transmission media to the Internet.
For wireless connection, many mobile computers and devices include the necessary built-
in technology so that they can transmit data and other items wirelessly.
However, the type of broadband service you need and have access to will be determined
by your speed requirements, budget, and the location (city or regional) of your home or
office.

(A) Wired broadband


Wired broadband essentially means there is a physical connection to a physical
location (a home or business) through a cable. There are three main types of wired
broadband connections for consumer or residential use: DSL, coaxial cable, and fiber.
DSL uses traditional copper wire telephone lines. Cable television companies
traditionally provide service over coaxial cables. Fiber systems are comprised of glass
fiber strands over which optical (light) signals are sent. (Other options for wired
broadband include T1 or T3 lines and Broadband over Power Lines (BPL)). With the
use of a router, all wired technologies can also provide a Wi-Fi network within the home
or business.

(i) DSL ( Digital Subscriber Line)


DSL is a wired transmission that uses traditional copper telephone lines
already installed to homes and businesses. Availability and speed of DSL
service may depend on the distance from a home or business to the closest
broadband-equipped telephone company central office or telephone exchange.
A modem in your home connects the computer or wireless router to a copper
telephone line using an Ethernet cable. The phone line connects to a digital
subscriber line access multiplexer (DSLAM) at the telephone central office or, in
some instances, at a remotely located junction box in outlying neighborhoods. The
DSLAM, combines multiple signals into one aggregate connection and routes it to
the ISPs Internet backbone.

DSL: Advantages
An advantage of DSL service is that it works with existing wiring. The only
equipment needed is a modem plugged into an existing phone jack and filters for
each telephone in your home or office. Another benefit of DSL service is that each
user has a dedicated link and the speed is constant and will not diminish if more
people in your neighborhood are also using DSL. DSL provides reliable broadband
service for most residential and small business customers.

DSL: Disadvantages
A disadvantage of DSL service is the inability to deliver the service further than
18,000 feet from the central phone office or other DSLAM location. DSL cannot be
reliably delivered to homes or businesses beyond this distance. Another
disadvantage is that the upload speeds do not match download speeds. While DSL
connections are adequate for the average consumer, with technology
enhancements and innovation, the bandwidth that DSL offers may be outdated for
many due to its bandwidth constraints.

70
(ii) Cable Internet Services
Cable television companies provide broadband using the same coaxial
cables that deliver pictures and sound to your TV set. A cable modem is an
external device that normally has two connections: one to the cable wall outlet, the
other to a computer. Cable Internet is usually faster than DSL.
Subscribers can access their cable modem service by simply turning on their
computers, without dialing-up an ISP which is referred to as an “always on”
connection. You can still watch cable TV while using broadband and get telephone
service through Voice over Internet Protocol (VoIP) phone technology. Cable
provider’s market their services in bundles, which can be a cost effective way to
purchase internet services. While cable broadband is faster than DSL,
transmission speeds vary depending on the type of modem, cable network, and
how many people in the neighborhood are using a cable connection.

Cable: Advantages
A benefit of cable modem service is its availability to all cable company customers
where the cable network has been upgraded to deliver cable modem service. The
distance between your residence and the cable company will not affect your
Internet speed. Cable is also generally faster than DSL.

Cable: Disadvantages
A disadvantage of cable modem service for rural communities is the lack of cable
service beyond the edges of the larger towns. Another disadvantage is that the
connection is shared between you and other people on the network segment and
therefore speed may vary greatly at different times of the day and can slow down
significantly in a neighborhood where many residents using cable connections
access the Internet simultaneously. For example, if you live in a neighborhood
where cable modem penetration is high you may notice a significant increase in
the time it takes to upload and download information in the evening when people
return home from work and school. Another disadvantage is that upload speeds
never match download speeds.

(iii) Fiber to the Premises (FTTP)


Fiber optic technology converts electrical signals to light pulses (on/off) and
sends the light pulses through transparent glass fibers about the diameter of
a human hair. There is less signal loss or degradation with fiber optic technology
than conventional copper wires or coaxial cables. Fiber transmits data at speeds
far exceeding current DSL or cable modem speeds.

Fiber: Advantages
There are advantages to using fiber optic cable for telecommunications; the main
advantage is the ability to provide higher bandwidth and greater distance
between terminals. Compared to conventional copper wire, fiber optic cable can
deliver more bandwidth than conventional metal wire. Because of its size, many
optical fibers can be bundled into one outer covering, or jacket, allowing for a
higher carrying capacity—more phone or cable lines going through one channel.

71
Fiber optic cable can deliver more bandwidth than other broadband technologies
at a lower cost of maintenance and allows for future expansion and opportunities
as innovative and entrepreneurial concepts evolve.

Fiber: Disadvantages
Installing fiber and lighting the fiber cable is expensive and maybe cost-
prohibitive for many providers serving rural areas. Fiber cable is fragile and also
requires equipment to convert electrical signals into light signals and then re-
convert them back into an electrical signal at the receiving end.

(B) Wireless Broadband


Wireless broadband services are similar to wired broadband in that they connect
to an internet backbone usually a fiber-optic trunk; however they don’t use
cables to connect to the last mile or business/residences. Instead they use
Wireless Fidelity (Wi-Fi) connections or radio waves. A computer or mobile device has
a wireless adapter that translates data into a radio signal and transmits the signal using
an antenna. A wireless router receives the signal, decodes it and then sends it to the
Internet through a wired Ethernet connection.

(i) Fixed wireless


Fixed wireless is a type of high-speed Internet access where connections to
service providers use radio signals rather than cables. Fixed wireless offers
connections speeds between 1 and 10 mbps and use transmission towers similar
to cell phone towers that communicate to a resident’s transceiver equipment that,
as the name implies is fixed at the premise. The transceiver equipment
communicates with the providers’ ground stations.

(ii) Wireless fidelity (Wi-Fi)


Wifi is a fixed, short-range technology that is often used in combination with
DSL, fixed wireless, fiber, or cable modem service to connect devices within
a home or business to the Internet using a radio link between the location and
the service provider’s facility. Wi-Fi service can be available in your home or at
community locations (airports, coffee shops, schools, businesses, etc.) and are
often called “hotspots.” A Wi-Fi network uses radio waves, similar to two-way radio
communications. A computer has a wireless adapter that translates data into a radio
signal and transmits it using an antenna. A router receives the signal, decodes it,
and then sends the information to the Internet using a physical connection, usually
via an Ethernet cable, a cable that carries the broadband signal between the
modem, router, computer, and other wired Internet capable devices.

(iii) Mobile broadband


Mobile broadband is high-speed wireless broadband connection that is
accessible from random locations. The locations depend on the provider’s
cellular towers and monthly service plans. Many technologies make up wireless
networks, but no matter the technology or acronyms you read or hear, mobile
wireless networks are radio systems.

72
Mobile wireless services are continually being upgraded to provide data
transmission speeds considered to be broadband. The faster mobile wireless
networks are referred to as 3G or 4G.The “G” stands for “generation,” meaning 3rd
and 4th generation or the evolution of broadband cellular networks; supposedly,
each generation provides a faster more secure wireless network. A mobile wireless
service requires a base station that is connected to a high capacity landline data
transmission network to reach the Internet. In other words, it’s never wired OR
wireless; ultimately, it has to be both. Wireless broadband in common usage
means that the so-called “last mile” connection to the user is done via radio signals
from a tower to a cell phone or other wireless devices (e.g., a tablet).

Long Term Evolution (LTE) is a 4G technology provides increased peak data rates,
reduced latency, scalable bandwidth capacity than 4G predecessors. LTE can
manage multicast and broadcast streams and handle quick-moving mobile phones.
It uses an IP-based network architecture that allows for seamless handovers for
voice and data to older model cell towers.

(iii) Satellite
Satellite broadband is sometimes the only option available to users in very
rural or sparsely populated areas. Like telephone and television services,
satellites orbiting the earth provide necessary links for broadband. With satellite
service, you must have a clear view of the southern sky. Satellite service can be
disrupted by weather conditions and changes in line of sight to the orbiting satellite.
Satellite may have a higher monthly service charge than other broadband options
and the need to purchase more home or business equipment compared to the
other options. Because satellites are located a significant distance from customers,
there are issues of “latency” and therefore a noticeable time lag between sending
and receiving data by the end customer.

Downstream and upstream speeds for satellite broadband depend on several


factors, including the provider and service package purchased the consumer’s line
of sight to the orbiting satellite, and the weather. Satellite speeds may be slower
than DSL and cable modem, but they can be about 10 times faster than the
download speed with dial-up Internet access. Service can be disrupted in extreme
weather conditions.

Self Check: Can you...

● Describe different types of Broadband Internet connection (wired and


wireless transmission media).

73
Activity 2.5

Complete the table below:

Technology Description

W Cable Internet service


i
r
e DSL (Digital Subscriber Line)
d

Fiber to the Premises( FTTP)

W Wi-Fi ( wireless fidelity)


i
r
e Mobile broadband
l
e
s Fixed wireless
s
Satellite Internet services

2.6 The Internet Address

● The Internet relies on an addressing system much like the postal service to send data to
a computer or device at a specific destination.
● Internet Protocol (IP) address, is a sequence of numbers that uniquely identifies the
location of each computer or device connected to the Internet or any other network.
● This unique number will be assigned to each and every computer or devices connected to
a network.
● IP address is used as an address to send data and information to a specific computer or
device on the Internet.

● The Internet uses two IP addressing schemes:


○ IPv4
○ IPv6

The importance of IPv6


○ Due to the growth of the Internet, the original IPv4 addresses began dwindling
(running out) in availability.
○ The IPv6 scheme increased the available number of IP addresses
exponentially.
○ IPv6 providing much larger address space, with improved traffic routing and
better security.

74
Structure of the IP address

o IPv4 addresses are 32-bit IP address written as four decimal numbers (octet) from 0
to 255 separated by dots/periods.

o IPv6 addresses are 128-bit IP address written in hexadecimal and separated by


colons.

Example :

IPv4 172.16. 254.1


IPv6 2001 : db18 : 3333 : 4444 : CCCC : DDDD : EEEE : FFFF

IPv4 IPv6

IP address is written in decimal separated by IP address written in hexadecimal and


periods. separated by colons.

Combining the four octets of an IP address Combining the eight hexadecimal string of an
IP address.

Must be a decimal value between 0 and 255 Can be any hexadecimal value between 0 and
FFFF

IPv4 addresses are 32-bit IPv6 addresses are 128-bit

Provides a possible 232 or 4,294,967,296 unique Provides a possible 2128 unique values
values.

Table 2.6.1: Structure of IPv4 and IPv6 address

Figure 2.6.1: Structure of IPv4 and IPv6 address

75
Domain Name
● Because lengthy IP addresses can be difficult to remember, the Internet supports
domain names.
● A domain name is the text version of an IP address.
● Domain name is a text-based name that corresponds to the IP address of a server,
such as a web server that hosts a website.
● A domain name is part of the web address that you type in a browser’s address bar to
access a website.
● Example : www.kmkt.matrik.edu.my

Figure 2.6.2: The IP address and domain name for the Google Web site.

Every domain name contains a top-level domain (TLD)


● The last section of the domain name
● Purpose of TLD - Identifies the type of organization associated with the domain
● Two (2) types of TLD
i. Generic TLD (gTLD) - A generic TLD identifies the type of organization
associated with the domain
ii. Country Code TLD (ccTLD) - Country Code TLD identifies the country of
origin associated with the domain.
.
● Examples of generic Top Level Domain (gTLD)

gTLD Purpose

biz businesess of all sizes

com commercial organizations, businesess and companies

edu educational institutions

gov goverment agencies

net network provider or commercial companies

org nonprofit organizations

76
● Examples of Country Code Top-level domain (ccTLD)

ccTLD country
my Malaysia
au Australia
kr Korea
sg Singapore
th Thailand

Self Check: Can you...

● Identify basic structure of IPv4 and IPv6 address.


● Describe why IPv6 is used instead of IPv4.
● Describe the purpose of an IP address
● Describe the relationship between IP address and domain name.

Activity 2.6

1. Describe the purpose IP address.


2. Give one examples of IPv4 address.
3. Give one example of IPv6 address.
4. State the smallest and the largest numbers that can be used for IPv4 address.
5. Differentiate between IPv4 and IPv6.
6. Define the term domain name.
7. Discuss about relationship between IP address and domain name.

77
CHAPTER 3
Computer Ethics & Security

“T oday, people rely on technology to create, store, and manage their critical
information. Thus, it is important that computers and mobile devices, along with the
data and programs they store, are accessible and available when needed. It also is
crucial that users take measures to protect or safeguard their computers, mobile
devices, data, and programs from loss, damage, and misuse.” (Discovering Computer
2018 p.5-2)

78
3.1 Areas of computer ethics

(a) Computer ethic is moral guidelines that govern the use of computers and
information systems.
(b) Six area of computer ethics
1. Information Accuracy
2. Green Computing
3. Software Piracy
4. Codes of Conduct
5. Information Privacy
6. Intellectual property rights

Area of computer ethics

1. Information accuracy
● Information Accuracy concerned with assuring the authenticity and
fidelity of information, and identifying those responsible for
informational errors that harm people.
● No one should assume that information on the Internet is accurate, timely,
clear, and important.
Why is information accuracy become a concern today?
● It is because many users access information maintained by other
people or companies such as on the Internet.
● Do not assume that all the information on the Web page is correct.
● Users should evaluate the value of a Web page before relying on its
contents.

2. Green computing
● Involves reducing the electricity and environmental waste while using a
computer.

Why do we need to apply green computing?


● Computer energy is often wasteful.
● For example, leaving the computer on when not in use.
● Printing is often wasteful such as printing out draft documents.

How can you contribute to green computing?

1. Do not leave a computer or device running overnight.


2. Turn off your monitor, printer, and other devices when you are not using
them.
3. Use energy-efficient hardware
4. Use paperless methods to communicate
5. Recycle paper and buy recycled paper
6. Recycle toner, computers, mobile devices, printers,and other device
7. Telecommute
8. Use videoconferencing and VoIP for meetings.

Table 3.1.1: Green Computing Suggestion

79
3. Software Piracy
● Software piracy is the illegal copying, distribution, or use of software.
● The time-limited or function-restricted versions of commercial software called
shareware are less likely to be pirated since they are freely available.
● Similarly, freeware , a type of software that is copyrighted but freely distributed at no
charge, also offers little incentive for piracy.

4. Codes of Conduct
● A written guideline that helps determine whether a specific computer action is
ethical or unethical.

● How to established codes of conduct?


❖ Established by a number of computer-related organizations after recognizing
that individuals need specific standards for the ethical use of computers.

Sample IT Code of Conduct

1. Technology may not be used to harm other people.


2. Employees may not meddle in others’ files.
3. Employees may use technology only for purposes in which they have been
authorized.
4. Technology may not be used to steal.
5. Technology may not be used to bear false witness.
6. Employees may not copy or use software illegally.
7. Employees may not use others’ technology resources without authorization.
8. Employees may not use others’ intellectual property as their own.
9. Employees shall consider the social impact of programs and systems they
design.
10. Employees always should use technology in a way that demonstrates
consideration and respect for fellow humans.

Table 3.1.2: Code of Conduct

5. Information privacy
● It refers to the right of individuals and companies to deny or restrict the collection
and use of information about them.
● Information theft occurs when someone steals personal or confidential information.
● For example, a corrupt individual may steal credit card numbers to make fraudulent
purchase.
● Techniques companies, employers, or hackers use to collect your personal data:
❖ Electronic profiles – data collected when you fill a form or register online
❖ Cookies – a small text file that web server stores on your computer
❖ Phishing – a scam using email to get personal and financial information
❖ Spyware and adware – malicious code that spread through the network
● Ways to safeguard your personal information:
❖ Limit the amount of information you provide to Web sites or forms, fill in only
necessary information.
❖ Install a personal firewall.

80
❖ Do not reply to spam for any reason.
❖ Clear your history file when you are finished browsing.
❖ Install a cookie manager to filter cookies.
❖ Purchase goods with cash, avoid unnecessary online payments.

6. Intellectual property rights


● Intellectual property (IP) refers to unique and originals works such as ideas,
inventions, art, writings, processes, company and product names, and logos.
● Intellectual property rights are the rights to which creators are entitled for their
work.
● Violation of the intellectual property rights occurs when someone makes unauthorized
copying, distribution or manipulation of any intellectual property.

Why IP Rights?
● Because many of these works are available digitally.

Importance of IP rights:
1. To protect any original work that created by individual person/ company
2. Preserve the features and processes that make things work and let inventors profit
from their inventions.

Types of IP rights

1. A patent is an exclusive right granted for an invention, which is a product or a process


that provides a new way of doing something, or offers a new technical solution to a
problem.
2. A trademark is a sign which distinguishes the goods and services of one trader from
those of another. A mark includes words, logos, pictures, names, letters, numbers or a
combination of these.
3. A copyright exclusive rights given to author/artist for their materials (literary works;
musical works; artistic works; films; sound recordings; broadcasts; and derivative works)

Self Check: Can you...

● Define computer ethics


● Describe areas of computer ethics. (Information accuracy, green
computing, software piracy, codes of conduct, information privacy,
intellectual property rights)
● Identify reasons of choosing types of computer ethics based on the given scenario.

81
Activity 3.1

1. Define Computer Ethics.


2. Describe areas of computer ethics
3. Information accuracy is a concern today because many users access information
maintained by other people or companies, such as on the Internet. What is the effect of
invalid information to the public?
4. Green computing involves reducing the electricity and environmental waste while using
computer.
(a) State two (2) measures can be taken by an organization to reduce electrical waste.
(b) As a computer user, suggest two (2) ways you can contribute to green computing.
5. Recognizing that individuals need specific standards for the ethical use of computers, a
number of computer- related organizations have established IT (information technology)
codes of conduct.
(a) Identify the purpose of having an IT code of conduct.
(b) Name two (2) examples of IT code of conduct.
6. Intellectual property (IP) refers to unique and original works, such as ideas, inventions, art,
writings, processes, company and product names, and logos.
(a) List three (3) types of Intellectual Property.
(b) List two (2) reason why Intellectual Property is important.
(c) A new company imitates a popular logo of another famous brand for its sport shoes.
Is this legal? Why should a business register a logo as a trademark?
7. Identify the area of computer ethics based on the description below:
(a) Aidil always clear his history file whenever he finishes browsing the net.
(b) Ziana’s notebook will automatically go into sleep mode when her laptop is inactive for
more than 10 minutes.
(c) Mr. Tan downloads and prints materials from Web and distributes it to all his students.
(d) Mimi is a great fan of Maher Zain. She bought the latest Maher Zain album and copied
the whole songs before uploading it in her No.1 Fan Site.
(e) Digital manipulation can be used to misquote individuals, create false or misleading
photographs.

3.2 Netiquette

Netiquette is the code of acceptable behaviors users should follow while on the
Internet; that is, it is the conduct expected of individuals while online.

Netiquette includes rules for all aspects of the Internet ,including;


● World Wide Web
● E-mail
● Instant Messaging
● Chat Rooms
● File Transfer Protocol
● Message boards

82
Rules of Netiquette

1. Use appropriate language.


a. Be polite. Avoid offensive language.
b. Use proper grammar, spelling, and punctuation
2. Avoid sending or posting flames, which are abusive or insulting messages.
3. Avoid sending spam, which is the Internet’s version of junk mail. Spam is an
unsolicited e-mail message or newsgroup posting sent to many recipients or
newsgroups at once.
4. Be careful when using sarcasm and humor, as it might be misinterpreted.
5. DO NOT USE ALL CAPITAL LETTERS, WHICH IS THE EQUIVALENT OF
SHOUTING!
6. Use emoticons to express emotion for informal communication.
7. Use abbreviations and acronyms for phrase.

btw By the way

imho In my humble opinion

fyi For your information

tyvm Thank You Very Much

8. Clearly identify a spoiler, which is a message that reveals a solution to a game or


ending to a movie or program.
9. Do not assume material is accurate or up-to-date. Be forgiving of others mistake.
10. Read the FAQ, if one exists. Many newsgroup and Web pages have an FAQ.
● FAQ: helps user find answers to commonly asked questions
11. Read the message before you send it.
● Make a good impression
● review / edit words and images before sending
12. Keep message brief.
● Do not send uncompressed attachment.
13. Use meaningful subject lines.
● Make sure the subject line reflects the email contents.
14. Never read someone else's private email.

Self Check: Can you...

● Identify the rules of Netiquette


● Apply the rules of Netiquette in the given scenario

83
Activity 3.2

1. What is netiquette ?
2. State the rules of netiquette social interaction and communication electronically.
3. Brother Lan is sending an e-mail to his boss. Accidentally, he mistypes the subject title
with capital letter. Explain why we are not allowed to use capital letter.
4. Online chat may refer to any kind of communication over the internet that offers a real-
time transmission of text messages from sender to receiver.
(a) Explain three (3) Netiquette should use while chatting online with other users.
(b) List two ways can chatters use to express emotion while chatting online?
(c) List three (3) commonly uses abbreviation during chatting.
5. Identify the rules of netiquette should be apply for each situation below
(a) For the majority of participants, online communication is straightforward.
Sometimes unintended meanings are conveyed.
(b) Give a descriptive phrase in the subject line of the message header that tells the
topic of the messages.
(c) Halim use to express emotion while chatting online.

Assignment subtopic 3.3 and 3.4

3.3 Computer Security Risks

Computer Security Risks is any event or action that could cause a loss of or damage to
computer hardware, software, data, information, or processing capability.

Types of Computer Security Risks

1. Malicious Code
2. Unauthorized access and use
3. Hardware theft
4. Software theft
5. Information theft
6. System failure ( not in syllabus but accepted to be use in assignment)

Malicious Code

Malicious code which are program that act without a user’s knowledge and deliberately alter
the computer operation.

Computer viruses, worms, and Trojan horses are classified as malware (short for malicious
software).

84
Computer viruses are software that are designed to be spread from one computer to another.
They’re often sent as email attachments or downloaded from specific websites with the intent
to infect your computer.

Computer worms are pieces of malware programs that replicate quickly and spread from one
computer to another.

“Trojan,” is a malicious bit of attacking code or software that tricks users into running it willingly,
by hiding behind a legitimate program.

Unauthorized Access and Use

 Unauthorized access - The use of a computer or network without permission.

 Unauthorized use - The use of a computer or its data for unapproved or possibly
illegal activities.

Hardware Theft

Hardware theft is the act of stealing computer equipment.

Software Theft

 Steals intentionally software


 erases media programs illegally
 illegally registers, copies program or activates a program

Information Theft

Occurs when someone steals personal ornconfidential information. If stolen, the loss of
information can cause as much damage as (if not more than) hardware or software theft.

Self Check: Can you...

● Analyse types of security risks based on given scenario

85
3.4 Security Measures

Security measures is the ways to overcome the computer security risk.

1. Data backup

 An action to copy of the original files, software, or disk at an off-site location or


other location.
 The file will be restore back if the original file lost or can not be retrieve.

2. Cryptography

 Technology of encoding information so it can only be read by authorized individual.


 Consist of two process
o Encryption – Transform the readable data into unreadable code
(ciphertext).
o Decryption – Transform back unreadable code (ciphertext) into readable
data.

3. Anti-virus

 Software that scan for viruses, and solves detected treats to protect computer.
 This software identifying and removing any virus found in memory, storage media
and incoming file.
 Antivirus must be installed and upgrade regularly.
 Example:
o Kaspersky anti-virus
o Avast! anti-virus
o McAfee anti-virus
o VirusScan anti-virus
o AVG anti-Virus

4. Anti-spyware

 Software designed to detect and prevent spying activities.


 This software can remove spyware tools from hiding in our computer.
 It is installed on a computer without the user's knowledge in order to collect
information about them
 Example:
o SpyBot
o SpywareBlaster
o SUPERAntiSpyware

86
5. Firewall

 Part of computer system or network designed to block unauthorized access while


permitting outward communication.
 Firewall can detect programs that enter the network. It will decide whether to allow
the program enter the network by checking the user’s setting.
 Firewall setting can be applied on hardware and software
 Example firewall software:
o FortiGate.
o Check Point Next Generation Firewalls (NGFWs)
o Sophos XG Firewall
o Huawei Firewall
o WatchGuard Network Security
o GlassWire Firewall

6. Physical Access Control

 Security technique that can be used to regulated who or what can view or use
resources in a computing environment.
 Various method for physical access control:
o Use password and username for computers
o Use smartcard as a door access system
o Use biometric identification as a security identification and
authentication device
o Use CCTV to monitor the interior and exterior of a property
o Set up an alarm system for computer lab or office
o Use cables to lock laptop or computer devices to tables or floors

7. Human Aspect Awareness

 Action should be taken by user to make sure their computer in safety


condition.
 The action can be taken :
o Maintenance their computer.
o Lock the computer when leave it without supervision.
o Don’t expose user name and password.
o Connect computer to a surge protector.
o Place a computer lab in higher level.
o Put the fire extinguisher inside the computer lab.
o Expose employess to computer security through continuously traning
or courses
o Make a systematic routine check to update antivirus, anispyware,
firewall of a computer system - early preventing a threat/risks.

87
Security Measures Computer Security Risks

Data Backup Attack by Malicious Code, Software theft, Information theft,


System failure.

Cryptography Attack by Malicious Code, unauthorized access and use,


information theft.

Anti-Virus Attack by Malicious Code (Virus, Worm)

Anti- Spyware Attack by Malicious Code (Spyware)

Firewall Attack by Malicious Code, Unauthorized access and use

Physical Access Control Unauthorized access and use, hardware theft, software theft,
information theft.

Human Aspect Attack by Malicious Code, Unauthorized Access and Use,


(Awareness) hardware theft, software theft, information theft, system failure.

Self Check: Can you...

● Explain different ways to overcome computer security risks


based on given scenario

88
CHAPTER 4
Multimedia

“M ost web pages include multimedia, which refers to any application that
combines text with media. Media includes graphics, animation, audio, video, and/or
virtual reality. The sections that follow discuss how the web uses these types of
media.” (Discovering Computer 2018 p.2-30)

89
Multimedia development process

Multimedia, which refers to any application that combines text with media. Media includes
graphics, animation, audio, video, and/or virtual reality delivered by computer.

Multimedia development process can be divided into the following phases:


1. Conceptualization
The process of making multimedia starts with an "idea" or better described as "the vision"
- which is the conceptual starting point.

2. Development plan
Defining project goals and objectives

3. Preproduction
The process of intelligently mapping out a cohesive strategy for the entire multimedia project

4. Production
● Activities in this phase include:
● Content Research
● Interface Design
● Graphics Development
● Selection of musical background and sound recording
● Development of computer animation
● Production of digital video Authoring

5. Postproduction
In this phase, the multimedia application enters the Alpha and beta testing process

Alpha:
● Testing conducted internally by the manufacturer
● Takes a new product through a protocol of testing procedures to verify product
functionality and capability

Beta:
● The second-stage test-version, which is distributed free to a limited sample of users
so that they can subject it to daily use and report any problems to the manufacturer.
● After the "bugs" are fixed, the final version of the program is released to the general
public.

6. Documentation
User documentation is a very important feature of high-end multimedia titles.

90
Figure 5.1: Example of stage in multimedia courseware project
(source:http://www.elearninglearning.com)

Rubric for Interactive Multimedia Project

CRITERIA 1 2 3 TOTAL

Technical The project does not The project runs The project runs
run satisfactorily. adequately with minor perfectly with no
There are too many technical problems. technical problems.
technical problems For example, there
to view the project. are no error
messages, all sound,
video or other
elements are found.

Content Project contents are Project contents are Project contents are
not including neither including either college including the college
college logo or logo or college motto logo, college motto.
college motto. but not both or
contents are not Project duration is
Project duration is including neither within 60 seconds.
exceeding 60 college logo or college

91
seconds time limit. motto.

Project duration is
within 60 seconds or is
not within 60 seconds
or exceeding 60
seconds time limit.

Completion A project is A project is incomplete A project is


incomplete and and contains several completely finished.
contains too many unfinished elements.
unfinished
elements.

Screen The exaggerated Multimedia elements The effective


Design emphasis on and content combine to combination of
graphics and special adequately deliver a multimedia elements
effects weakens the message with the and content;
delivering message elements and words accurately convey a
to the audience. reinforcing each other. message to the
audience with style.

Organization No elements are Most elements are All elements are


present or not organized and used organized and used
organized or been appropriately to deliver effectively to enrich
used inappropriately ideas. the experience and
to deliver ideas. contribute
significantly to
convey the intended
meaning.

TOTAL SCORE

Self Check: Can you...

● Identify steps of production in multimedia


● Produce multimedia project

92
CHAPTER 5
Database

“A lthough databases and spreadsheets both store data, these programs have
different purposes and capabilities. Spreadsheet programs are ideal for calculating
results or creating charts from value in the worksheet. You should use a database
program, however, if want to collect, reorganize and filter data, and/or create reports
from the data.” (Discovering Computer 2018 p.4-14)

93
Basic Concept of Database

● Database is a collection of data organized in a manner that allows access, retrieval, and
use of that data.
● Computers process data in a database to generate information for users. A database at a
school, for example, contains data about its students and classes.
● With database software, often called a database management system (DBMS), users
create a computerized database; add, modify, and delete data in the database; sort and
retrieve data from the database; and create forms and reports from the data in the
database.
● Example of DBMS:
1. Microsoft Office Access
2. Open Office Base
3. Oracle
4. PHPMyadmin
5. DB2

The Hierarchy of Data

● Data is organized in levels.


● Each higher level of data consists of one or more items from the lower level. Depending
on the application and the user, different terms describe the various levels of the hierarchy.

Figure 5.1: Sample Data File

94
Database Object

Database Object Function

1 Table ● To arrange data in rows and columns


● To describe the characteristic of data

2 Form ● To retrieve and maintaining, viewing and printing


records in database
● Present a friendlier interface compared to table
● Allows viewing data one record at a time

3 Query ● Specifies which records should be retrieved by


● Can specify the fields to be displayed
● it is a way to get specific information from database

4 Report ● Provides presentation-quality output


● To display or print the data in the database
Table 5.1: Database Object

Rubric for Database Project


CRITERIA 1 2 3 TOTAL

A: TABLE

Create a table and specify A student was A student was A student was
fields with their data types, unable to perform able to perform 2- able to perform
enter data and modify all the following 3 of the following all the following
table structure in a table tasks Create tasks : Create tasks : Create
table Specify field table Specify field table Specify field
Enter data Modify Enter data Modify Enter data Modify
table structure. table structure. table structure.

Add, modify, delete data A student was A student was A student was
and navigate records unable to perform able to perform 2- able to perform
within a table all the following 3 of the following all the following
tasks : Add data tasks : Add data tasks : Add data
Modify data Modify data Modify data
Delete data Delete data Delete data
Navigate records Navigate records Navigate records
within a table within a table within a table

Assign a primary key A student was A student was A student was


unable to assign able to assign able to assign the
the correct primary key but correct primary
primary key for incorrect. key for the table
the table

B: FORM

Create, open, save, close A student was A student was A student was
and delete a form. unable to perform able to perform 2- able to perform
all the following 3 of the following all the following
tasks : Create a tasks : Create a tasks : Create a
form Open a form form Open a form form Open a form

95
Save a form Save a form Save a form
Close a form Close a form Close a form
Delete a form Delete a form Delete a form

Use a form to enter, A student was A student was A student was


modify, delete records. unable to perform able to perform 1- able to perform
all the following 2 of the following all the following
tasks : Enter tasks : Enter tasks : Enter
records Modify records Modify records Modify
records Delete records Delete records Delete
records records records

Create and add, modify A student was A student was A student was
text in Headers, Footers in unable to perform able to perform 1- able to perform
a form and use correct all the following 2 of the following all the following
naming conventions for tasks: Create and tasks: Create and tasks: Create and
forms add text in add text in add text in
Headers, Footers Headers, Footers Headers, Footers
in a form Modify in a form Modify in a form Modify
records text in records text in records text in
Headers, Footers Headers, Footers Headers, Footers
in a form Use in a form Use in a form Use
correct naming correct naming correct naming
conventions for conventions for conventions for
forms forms forms

C: QUERY

Create, edit and save a A student was A student was A student was
query unable to perform able to perform 1- able to perform
all the following 2 of the following all the following
tasks : Create tasks : Create tasks : Create
query Edit query query Edit query query Edit query
Save query Save query Save query

Add criteria to a query A student was A student was A student was


using any of the following unable to perform able to perform 1 able to perform
operators: < (Less than), all the following of the following all the following
<= (Less than or tasks : Add tasks : Add tasks : Add
equals), > (Greater criteria to a query criteria to a query criteria to a query
than), >= (Greater than or using any of the using any of the using any of the
equals), = (Equals), <> following following following
(Not equal to) and Sort operators: < operators: < operators: <
multiple data in a query (Less than), <= (Less than), <= (Less than), <=
output, in ascending or (Less than or (Less than or (Less than or
descending numeric or equals), > equals), > equals), >
alphabetic order (Greater (Greater (Greater
than), >= than), >= than), >=
(Greater than or (Greater than or (Greater than or
equals), = equals), = equals), =
(Equals), <> (Not (Equals), <> (Not (Equals), <> (Not
equal to) Sort equal to) Sort equal to) Sort
multiple data in a multiple data in a multiple data in a
query output, in query output, in query output, in
ascending or ascending or ascending or
descending descending descending
numeric or numeric or numeric or
alphabetic order alphabetic order alphabetic order

96
D: REPORT

Create and save a report Change Save a report Save a report


based on a table, query arrangement of Change Change
and change arrangement data fields and arrangement of arrangement of
of data fields and headings within a data fields and data fields and
headings within a report report layout headings within a headings within a
layout. report layout report layout

Add, modify text in A student was A student was A student was


Headers, Footers in a unable to perform able to perform 1- able to perform
report and group data all the following 2 of the following all the following
under a specific heading tasks : Add text in tasks : Add text in tasks : Add text in
(field) in a report in Headers, Footers Headers, Footers Headers, Footers
ascending, descending in a report Modify in a report Modify in a report Modify
order. text in Headers, text in Headers, text in Headers,
Footers in a Footers in a Footers in a
report. Group report. Group report. Group
data under a data under a data under a
specific heading specific heading specific heading
(field) in a report (field) in a report (field) in a report
in ascending, in ascending, in ascending,
descending descending descending
order. order. order.

TOTAL SCORE

Self Check: Can you...

● Identify basic concepts of database


● create database project

Activity 5.1

Can you create a simple Library Book Loan System using Microsoft Access?

1. Start Access.
2. Click the “Blank desktop database” template.
3. Type a file name for the database you're about to create.
4. Choose the folder where you want to store your database.
5. Click the big Create button (under the File Name box).
6. Create tables (Student and Book).
7. Enter your data.
8. Create query.
9. Design form.
10. Design report.

97
CHAPTER 6
SDLC

“A user may request a new or modified information system for a variety of


reasons. The most obvious reason is to correct a problem, such as an incorrect
calculation or a security breach. Another reason is to improve the information system.
Organizations may want to improve hardware, software, or other technology to
enhance an information system.” (Discovering Computer 2018 p.11-24)

98
Information System

An information system is a collection of hardware, software, data, people, and procedures that
work together to produce information.

Figure 6.1: Interrelation between all components in Information System

System development is a set of activities used to build an information system. The activities
are grouped into categories called phases. This collection of phases is called the system
development life cycle (SDLC).

P – Planning
A – Analysis
D – Design
I – Implementation
M – Maintenance

Figure 6.2: SDLC

99
System Development Life Cycle (SDLC)

SDLC consists of five phases. Each phase consists of a series of activities, and the phases
form a loop.

Figure 6.3: SDLC Phases

PLANNING PHASE

1. Review project requests


When an information system user request
a new or modified system, either to correct
problem or to improved the system, the
project will be received and handled by a
group of people called Steering committee.
This activity is to review and then approve the project requests.

2. Prioritize project requests


The information system projects that receive the highest priority or being the most
important will be given the immediate attention and approval by the management.
Then, the steering committee evaluates the other remaining project requests based on

100
their value to the company or organization. The steering committee approves some
projects and rejects others.

3. Allocate resources
Projects with the highest priority will be allocated with resources such as money,
people and equipment. It is likely that only a few will begin system development
immediately. While other approved projects have to wait for additional funds or
resources to become available.

4. Identify project development team


A development team is responsible to determine the specific objectives of the
information system (project) and responsible to deliver a system that meets the
objectives. A development team includes users, managers, system analysts,
programmers, technical specialists and other stakeholders. Each of these parties has
a different role to play.

Example :

● A project manager is responsible to coordinate team members and the


resources in completing a project on time.
● A system analyst is responsibles to analyst and design the systems.
● A programmer is a technical specialist responsible for developing specific
computer programs that meet the specifications.

ANALYSIS PHASE

1. Conduct preliminary investigation


Also known as feasibility study. The main purpose is to determine the exact nature
of the problem or improvement & decide whether it is worth to pursue the project or
not.
The first task in the preliminary investigation is to interview the user who submitted the
project request. In addition to interviewing, members of the project team may use other
gathering technique to obtain data (eg: review documentation, observe, survey and
research). Second task is system analyst write feasibility report and present to the
steering committee.

2. Perform detailed analysis activities:


Detailed analysis sometimes is called logical design because the systems analysts
develop the proposed solution without regard to any specific hardware or software.

101
Involves three major activities:

A. study how the current system works


B. determine the users’ wants, needs &
requirements
C. recommend a solution
The purpose of the system proposal
to assess the feasibility of each alternative modifying or expanding current
system. If the steering committee approves a solution, the project enters the
design phase.

DESIGN PHASE

Consist of two major activities that been perform by system analyst at the same time.

1. Acquire hardware and software if necessary

After steering committee approves a solution, system analyst obtains additional


hardware and software. System analyst may skips this activity if the approved
solution does not require new hardware or software. If this activity is needed it
consist of four major tasks:
A. Identify technical specification
a. Talk to other system analyst
b. Visit vendor stores
c. Search the web
B. Request vendor proposals
Summarize requirement for potential vendor using documents such as
request for quotation (RFQ),request for proposal (RFP) or request for
information (RFI)
C. Test and evaluate vendor proposals
a. System analyst receive complete quotation and proposal, evaluate
and select the best one
b. System analyst use many techniques to test software products such
as user reference, demonstrations of products, supply trial version and
benchmark test
D. Make a decision
System analyst present a recommendation to the steering committee for
award contract or not.

2. Develop all of the details of the new or modified information system

To develop detailed design specifications for the


components in the proposed solution.The activity
include developing and designing database,
input, output, program, interface and others.

102
● Database design - system analyst work with database administrator to identify
new and current data elements exist in organization
● Input and output design - system analyst design the menu, screen and report
specified for the requirement. Also develop mock-up or layout chart for each
input and output. Mock-up is a sample of the input or output that contains
actual data
● Program design - system analyst prepares the program specification
package, which identifies required programs and the relationship among each
program include input, output and database specifications

IMPLEMENTATION PHASE

The purpose of implementation phase is to construct or build new or modified system


and delivered it to user. Four major activities in this phase are:

1. Develop Program and Apps

a. Development team may skip this activity if organization purchase


packaged software with no modifications.
b. For custom software that is new, program and apps are developed or
modified either by an outside firm or in-house.
c. Software developer write or modified programs and apps from
program specification package created during design phase by follow
program development life cycle.

2. Install and Test the New Systems

The system must be tested to make sure all programs work together in the
system before deliver to user. Consists four types of tests :
a. Unit Test - verifies each individual program or object works by itself.
b. System Test - verifies that all programs in an application work together
properly.
c. Integration Test - verifies that an application works with other
applications.
d. Acceptance Test - performed by end-users and checks the new
system to ensure that it works with actual data.

103
3. Trains Users

Training involve showing users exactly how they will use the new hardware
and software in the system. Users should practise on actual system during
training and provided user manual for references. The way to train user:
a. One-on-One Session (involve only two people)
b. Classroom Style - hands-on classes
c. Web Based Training - which is self-directed, self-paced online
instruction method

4. Convert to the New System

A process of changing old system to the new system.Strategies of


conversions:
a. direct conversion - the user stops using the old system and begins
using the new system on a certain date.
The advantage of this strategy is that it requires no transition
costs and is a quick implementation technique.
The disadvantage is that it is extremely risky and can disrupt
operations seriously if the new system does not work correctly the first
time.

b. Parallel conversion consists of running the old system alongside the


new system for a specified time. Results from both systems are
compared.
The advantage of this strategy is that you can fix any problems
in the new system before you terminate the old system.
The disadvantage is that it is costly to operate two systems at
the same time.

c. Phased conversion - each location converts at a separate time. For


example, an accounting system might convert its accounts receivable,
accounts payable, general ledger, and payroll sites in separate
phases. Each site can use a direct or parallel conversion. Larger
systems with multiple sites may use a phased conversion.

d. Pilot conversion, only one location in the organization uses the new
system — so that it can be tested. After the pilot site approves the
new system, other sites convert using one of the other conversion
strategies.

104
Figure 6.4: Converting Strategies

MAINTENANCE PHASE

The purpose of this phase is to provide ongoing assistance for an information


system after the system is implemented. This phase consist of three activities:

1. Perform Maintenance Activities


a. Fixing errors in (corrective maintenance), as well as improving, a
system’s operations.
b. Enhancements or additional requirements that involve modifying or
expanding an existing information system (adaptive maintenance).

2. Monitor System Performance


a. To determine whether the system is inefficient or unstable at any
point.
b. If it is, the systems analyst must investigate solutions to make
the information system more efficient and reliable (perfective
maintenance)

105
3. Evaluate System Security

a. Elements of an information system must be secure from threat both


inside or outside the organization.
b. Users should be allowed to access data and information for which
they are authorized.
c. Data should be secure so that intruders cannot alter,damage,or steal
data.
d. Networks need safeguards to prevent them from being compromised.
e. A chief security officer (CSO) is responsible to protect the
organization’s information assets.

Self Check: Can you...

● Describe the steps of system development life cycle (Planning, Analysis,


Design, Implementation and Maintenance).

Activity 6.1

1. List down at least three example of people in group below:

Steering Committee Project Development Team

2. List down five phase in SDLC

P-
A-
D-
I-
M–

106
3. Discuss the task below and present to class.

Planning Phase

1. What is the factor that influence user or worker request to develop new
system?
2. Why existing system need to modified?
3. Why the requested system need to prioritize?
4. What is the factor that influence the project should be approved or rejected?
5. In your opinion, what the organization should be do if the skill of the worker is
not enough to develop a new system?

Analysis Phase

1. Suggest three way to conduct preliminary investigation


2. Why detail analysis also known as a logical design?
3. Assume Bank Muamalat want to develop a new system for their customer to
do a online transaction Suggest the suitable task can be done by
development team in major activity below.

Major Activity Suitable Task

Study how the current system


work

Determine user want, need and


requirement

Recommend a solution

Design Phase

1. Explain two major activities that need to be performed by system analyst


during this phase.

2. Explain the process of getting or buying a new hardware and software


between project development team and vendor or supplier of product.

107
Implementation Phase

1. By using one system as an example (eg : e-matris). Explain how the system
is test by using four types of test
2. Discuss advantages and disadvantages for each ways for training users
3. Explain each of the conversion method and list down advantages and
disadvantages for each type of conversion

Maintenance Phase

1. Explain each types of maintenance below


a. Corrective Maintenance
b. Adaptive maintenance
c. Perfective maintenance
2. What is preventive maintenance?
3. You as a Chief Security Officer, discuss three suggest three way to improve
the security of the system

4. Answer the questions below.

(a) Determine the System Developement Life Cycle (SLDC) phase based on the following
activities:
Activities SDLC Phase
(i) Writing the actual code

(ii) Provide live support to end user

(iii) The thought of the idea for the


project
(iv) Study the system and gather
business requirements
(v) Develope a storyboard

(b) Matahari College decided to develop an information system that involves


maintaining database that generates results of student in the college. The system
also needs to produce reports such as reports in performance of students for every
semester, statistics of students that was dismissed and etc. Currently all activities
involving results of student, producing reports and maintaining students’ data are
done manually.

Based on the scenario, describe one (1) activity for each of the phases in SDLC.

108
CHAPTER 7
Programming

Programming Language

To create a program, software developer sometimes write a program’s instructions using a


programming language.

Programming languages is a set of words, abbreviations, and symbol that enables a


software developers use a program development tool to create a program or app.

Several hundred programming languages exist today. Each language has its own rules or
syntax, for writing the instructions.

Programming Paradigm

Programming paradigms is a style or way of computer languages look at the problem


to be solved. Paradigms also can be defined as fundamental style of building the structure
and elements of a program. There are three programming paradigm to learnt in this
subtopic :

● Procedural
● Object oriented
● Logic

109
Procedural

A computer programming paradigm that organizes program code into procedures to


perform computations. It uses a linear or top-down approach. It is designed focuses
on procedure and data.

Programmer identifies the major function of a program called the main module and the main
module is divided into smaller modules.

It contains a systematic order of statements, functions and commands to complete a


computational task or program. For example, ADD stands for addition, or PRINT means to
print. Many procedural languages also use arithmetic operator, such asterisk (*) for
multiplication and plus sign (+) for addition. Procedural paradigm directly instructs a computer
how to complete a task that you want it to do in logical steps.

Examples of programming languages that support this paradigm are C, COBOL,


MATLAB and Python.

Object Oriented

Object Oriented Programming (OOP) paradigm will implements objects in a program. It


follows bottom-up approach. It designed focuses on object and method.

An object is an item that can contain both data and the procedures that read or manipulate
that data. An object represents a real person, place, event or transaction.

Major benefit of OOP is the ability to reuse and modify existing object. For examples
system developer create an Employee object, it is available for use by any other existing or
future program. Thus, system developers repeatedly reuse existing object. For example
payroll program. And health benefit program both would use an employee object.

Programming languages that support OOP paradigm likes Java, C++ and latest version
of of Visual Basic.

Logic

Computer programming paradigm in which program statements express facts and


rules about problems within a system of formal logic. It does not follow explicit algorithm.
It designed focuses on facts and rules.

Rules are written as logical clauses with a head and a body; for instance, "H is true if B1, B2,
and B3 are true." Facts are expressed similar to rules, but without a body; for instance, "H is
true."

Major logic programming language families include Prolog, answer set


programming (ASP) and Datalog.

110
Translator

Translator is a program that translate programming source code into machine language.
Consists three types of translator that is assembler, compiler and interpreter.

Assembler

Use to convert the assembly language sources program into machine language.
Assembly language is the second generation of programming languages, a programmer
writes instructions using symbolic instructions code. Symbolic instructions code are
meaningful abbreviation. For examples, A for addition, C for compare, L for Load and M for
multiply.

In addition, assembly languages must be convert to machine language before the


computer can be execute, or run the program. So assembler will be use to do that.

Compiler

A compiler is a software program that converts entire high-level source code into into
machine language. The machine language version that results from compiling the procedural
language is called the object program or object code. The compiler store the object program
on storage media for execution later.

While it is compiling the source program into the object program, the compilers checks
the source program for errors. The compilers then produces a program listing helps the
software developer make necessary changes the to the sources code and correct errors in
the program.

Examples of programming language that use compiler is C, C++, JAVA

A compiler convert the source program into a machine language object program

111
Interpreter

Translate and executes high level source code into machine codes line by line. An
interpreter reads and instruction, convert it to one or more machine language instructions, and
then executes those machine language instructions. It does this all before moving to the next
instruction in the program. Each time the source program runs, the interpreter translates and
executes it, instruction by instruction. An interpreter does not produce an object program.

Advantage of an interpreter is that when it finds error, it displays feedback immediately.


The software developer can correct any errors before the interpreter translates the next
instruction. The advantages is that interpreted programs do not run fast as compiled program.

With an interpreter , one instructions of the source program at a time is converted into
machine language and then immediately executed by the computer or mobile device.

Examples of programming language that use interpreter is Python, Ruby, Perl.

Self Check: Can you...

● Define programming language, programming paradigm and language


translators
● Differentiate paradigms of programming Language : procedural , object
oriented and logic
● Differentiate types of language translator (compiler, interpreter and assembler)

112
Activity 7.1

1. Define programming language.


2. List three examples of programming language.
3. What is programming paradigms.
4. List three types of programming paradigm.
5. Differentiate three types of programming paradigms that you mention in 4.

Paradigm 1: Paradigm 2: Paradigm 3:

6. State the functions of translator.


7. Differentiate between assembler, compiler and interpreter.

Assembler Compiler Interpreter

113

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy