HandbookStudent SC015 20212022
HandbookStudent SC015 20212022
4th Edition
MATRICULATION
COMPUTER
SCIENCE
For the
2021
Specifications
s
USK
KMKt
KELANTAN MATRICULATION COLLEGE
Content
COURSE GUIDE 3
CHAPTER 1 7
Computer System 7
1.1 System Concept 8
1.2 Number System and Representation 11
1.3 Information Coding Scheme 19
1.4 Logic Gate and Simple Circuit 23
1.5 Hardware 42
1.6 Software 44
CHAPTER 2 46
Internet Technology 46
2.1 Basic Concept of Network 47
2.2 Network Architecture 59
2.3 Classification of Network 63
2.4 Introduction to the Internet 66
The Internet 66
Intranet And Extranet 67
The Intranet 67
The Extranet 68
2.5 The Broadband Internet Connection 69
2.6 The Internet Address 74
CHAPTER 3 78
Computer Ethics & Security 78
3.1 Areas of computer ethics 79
3.2 Netiquette 82
3.3 Computer Security Risks 84
3.4 Security Measures 86
CHAPTER 4 89
Multimedia 89
CHAPTER 5 93
Database 93
Basic Concept of Database 94
The Hierarchy of Data 94
1
Database Object 95
CHAPTER 6 98
SDLC 98
Information System 99
System Development Life Cycle (SDLC) 100
CHAPTER 7 109
Programming 109
Programming Language 109
Programming Paradigm 109
Translator 111
2
COURSE GUIDE
RATIONALE
This course is to prepare matriculation students with core elements of computer science and
information technology to pursue first-year degree in related fields.
COURSE SYNOPSIS
This course is to equip students with the elements of computer science and information
technology with includes information technology, computer system, internet technology,
computer security and ethics, multimedia, database and information system. This course is
divided into 7 topics. The synopsis for each topic is presented below:
2. INTERNET TECHNOLOGY
▪ Basic Concept of Network
▪ Network Architecture
▪ Classification of Network
▪ Introduction to the Internet
▪ The Broadband Internet Connection
▪ The Internet Address
4. MULTIMEDIA
▪ Practical
5. DATABASE
▪ Practical
7. INTRODUCTION TO PROGRAMMING.
3
COURSE LEARNING OUTCOME
At the end of the course, student should be able to:
1. Explain the basic knowledge of computer system, internet technology, computer
security and ethics in society
2. Create basic multimedia and database projects
3. Solve simple computational problems using analytical and logic skills.
STUDY SCHEDULE
Based on the Matriculation standard which require students to allocate to allocate 60 hours
of study for each credit hour, this course requires 184 cumulative learning hours.An
appropriate distribution of learning hours is shown in Table 1 below.
Tutorial
OVERALL X X X 92 92 184
Practical
4
TEXT ARRANGEMENT GUIDE
Before you go through this module, it is important that you note the text arrangement.
Understanding the arrangement should help you to organise your study of this course to be
more objective and more effective. Generally, the text arrangement for each topic is as follows:
Learning Outcomes: This section refers to what you should achieve after you have
completely gone through a topic. As you go through each topic, you should frequently refer to
these learning outcomes. By doing this, you can continuously gauge your progress of digesting
the topic.
Self-Check: This component of the module is inserted at strategic locations throughout the
module. It is inserted after you have gone through one subsection or sometimes a few
subsections. It usually comes in the form of a question that may require you to stop your
reading and start thinking. When you come across this component, try to reflect on what you
have already gone through. When you attempt to answer the question prompted, you should
be able to gauge whether you have understood what you have read (clearly, vaguely or worse
you might find out that you had not comprehended or retained the subsection(s) that you had
just gone through). Most of the time, the answers to the questions can be
found directly from the module itself.
Activity: Like Self-Check, activities are also placed at various locations or junctures
throughout the module. Compared to Self-Check, Activity can appear in various forms such
as questions, short case studies or it may even ask you to conduct an observation or research.
Activity may also ask your opinion and evaluation on a given scenario. When you come across
an Activity, you should try to widen what you have gathered from the module and introduce it
to real situations. You should engage yourself in higher order thinking where you might be
required to analyse, synthesise and evaluate instead of just having to recall
and define.
Summary: You can find this component at the end of each topic. This component helps you
to recap the whole topic. By going through the summary, you should be able to gauge your
knowledge retention level. Should you find points inside the summary that you do not fully
understand, it would be a good idea for you to revisit the details from the module.
5
ASSESSMENT
Practical 2 15
Assignment 10
PSPM 40
Total 100
REFERENCE
1. Misty E. V, Susan L. S, Steven M. F, Jennifer. T, Mark F; (2018) Discovering Computers ©2018: Digital
Technology, Data, and Devices 1st Edition
2. Deborah. M, Charles S. P (2012) Understanding Computers: Today and Tomorrow, Comprehensive Cengage
Learning
3. Vaughan T,; (2011) Multimedia: Making It Work, Ninth Edition 9th Edition
6
CHAPTER 1
Computer System
7
1.1 System Concept
Introduction
A computer is an electronic device, operating under the control of instructions stored in its
own memory, that can accept data (input), process the data according to specified rules,
produce information (output) and store information for future use.
input process
output
storage
1. Input – Input is any data and instructions entered into the memory of a computer.
● Feeding the collected raw data in cycle for processing. This is the raw data which
is fed for processing & obtaining information.
● Input can be done by means of various devices such as keyboards, mice, flatbed
scanners, barcode readers, joysticks, digital data tablets (for graphic drawing),
electronic cash registers etc
● Once the input is provided the raw data is processed by a suitable or selected
processing method. This is the most important step as it provides the processed
data in form of output which will be used further.
● Processing is usually done by CPU (Central Processing Unit) in a computer. CPU
is the crucial component for getting the operations done.
8
3. Storage – Physical material on which a computer keeps data, information, programs,
and applications for future use.
● Storage refers to the hardware component, store data for future use.
● Storage can be done on external hard disk, inbuilt hard disk, usb flash drive, micro
SD cards, compact disks or even in registers.
4. Output – Output is data that has been processed into a useful form.
● This is the final outcome and the raw data provided in the first stage is now
“processed” and the data is useful and provides information and no longer called
data.
● This can be used as it is or used for further processing along with more data.
9
Figure 1.1.1(b): The use of IPC in today’s technology
10
Self Check: Can you...
Activity 1.1
Specify the input, process, output and storage examples for each of the following systems.
Number systems are the technique to represent numbers in the computer system
architecture, every value that you are saving or getting into/from computer memory has a
defined number system.
Computers are machines that do stuff with information. They let you view, listen, create, and
edit information in documents, images, videos, sound, spreadsheets and databases.
To make computers easier to build and keep them reliable, everything is represented using
just two values. You may have seen these two values represented as 0 and 1, but on a
computer they are represented by anything that can be in two states. For example, in memory
a low or high voltage is used to store each 0 or 1.
11
Bits
A bit represents a single binary digit of 0 and 1. “bit” is short for binary digit.
In a computer program value of 1 and 0 can be used to represent true/false, yes/no, on/off.
Bit is the smallest unit of data the computer can process.
Bytes
A byte can also be used to represent a character (letter, digit or punctuation symbol) using
the ASCII coding. It can be used to represent an instruction in a machine code computer
program.
Computer memory is organised in bytes. A byte is the smallest amount of data that a computer
can read from (or write to) memory. You cannot read or write individual bits in memory.In a
similar way, files are also organised in bytes.
Early computers were designed around the decimal numbering system. This approach made
the creation of computer logic capabilities unnecessarily complex and did not make efficient
use of resources.
To deal with the basic electronic states of on and off, von Neumann suggested using the binary
numbering system. His insight has vastly simplified the way computers handle data.
When we write decimal (base 10) numbers, we use a positional notation system. Each digit is
multiplied by an appropriate power of 10 depending on its position in the number:
For example:
For whole numbers, the rightmost digit position is the one’s position (100 = 1). The numeral in
that position indicates how many ones are present in the number. The next position to the left
is ten’s, then hundred’s, thousand’s, and so on. Each digit position has a weight that is ten
times the weight of the position to its right.
12
In the decimal number system, there are ten possible values that can appear in each digit
position, and so there are ten numerals required to represent the quantity in each digit position.
The decimal numerals are the familiar zero through nine (0, 1, 2, 3, 4, 5, 6, 7, 8, 9).
In a positional notation system, the number base is called the radix. Thus, the base ten system
that we normally use has a radix of 10. The term radix and base can be used interchangeably.
When writing numbers in a radix other than ten, or where the radix isn’t clear from the context,
it is customary to specify the radix using a subscript. Thus, in a case where the radix isn’t
understood, decimal numbers would be written like this:
Generally, the radix will be understood from the context and the radix specification is left off.
Decimal number system has only ten (10) digits from 0 to 9. Every number (value)
represents with 0,1,2,3,4,5,6, 7,8 and 9 in this number system. The base of decimal
number system is 10, because it has only 10 digits.
The binary number system is also a positional notation numbering system, but in this case,
the base is not ten, but is instead two. Each digit position in a binary number represents a
power of two. So, when we write a binary number, each binary digit is multiplied by an
appropriate power of 2 based on the position in the number:
For example:
101101 = 1 x 25 + 0 x 24 + 1 x 23 + 1 x 22 + 0 x 21 + 1 x 20
= 1 x 32 + 0 x 16 + 1 x 8 + 1 x 4 + 0 x 2 + 1 x 1
= 32 + 8 + 4 + 1
In the binary number system, there are only two possible values that can appear in each digit
position rather than the ten that can appear in a decimal number. Only the numerals 0 and 1
are used in binary numbers. The term ‘bit’ is a contraction of the words ‘binary’ and ‘digit’, and
when talking about binary numbers the terms bit and digit can be used interchangeably. When
talking about binary numbers, it is often necessary to talk of the number of bits used to store
or represent the number. This merely describes the number of binary digits that would be
required to write the number.
A Binary number system has only two digits that are 0 and 1. Every number (value)
represents with 0 and 1 in this number system. The base of binary number system
is 2, because it has only two digits.
13
Conversion between Decimal and Binary
1 0 1 1 0
1 x 24 0 x 23 1 x 22 1 x 21 0 x 20
16 0 4 2 0
16 + 0 + 4 + 2 + 0 = 22
∴ 101102 = 22
1 1 0 1 1
1 x 24 1 x 23 0 x 22 1 x 21 1 x 20
16 8 0 2 1
16 + 8 + 0 + 2 + 1 = 27
∴ 110112 = 27
14
Example 2: convert 9310 to binary
Activity 1.2(a)
Hexadecimal Numbers
Perhaps the biggest drawback to using the binary numbering system for computer operations
is that programmers may have to deal with long and confusing strings of 1s and 0s. To reduce
the confusion, the hexadecimal, or base‑ 16, numbering system is used as shorthand to
display the binary contents of primary and secondary storage.
For any number base greater than ten, a problem occurs because there are more than ten
symbols needed to represent the numerals for that number base. It is customary in these
cases to use the ten decimal numerals followed by the letters of the alphabet beginning with
A to provide the needed numerals. Since the hexadecimal system is base 16, there are sixteen
numerals required. The following are the hexadecimal numerals:
0, 1, 2, 3, 4, 5, 6, 7, 8, 9, A, B, C, D, E, F
15
The following are some examples of hexadecimal numbers:
The reason for the common use of hexadecimal numbers is the relationship between the
numbers 2 and 16. Sixteen is a power of 2 (16 = 24). Because of this relationship, four digits
in a binary number can be represented with a single hexadecimal digit. This makes conversion
between binary and hexadecimal numbers very easy, and hexadecimal can be used to write
large binary numbers with much fewer digits. When working with large digital systems, such
as computers, it is common to find binary numbers with 8, 16 and even 32 digits. Writing a 16
or 32 bit binary number would be quite tedious and error prone. By using hexadecimal, the
numbers can be written with fewer digits and much less likelihood of error.
B 5
∴ 101101012 = B516
∴ 01101011100011002 = 6B8C16
16
b) Conversion hexadecimal to binary
∴ 374F16 = 00110111010011112
∴ 9AC16 = 1001101011002
Step 1: For decimal to hex conversion by successive division, divide the decimal number by
16 until the quotient reach to 0 or less than 16.
Step 2: Note down every remainder (normally decimal numbers less than or equals to 15)
for each successive division by 16.
Step 3: Arranging the remainder from bottom to into equivalent hex number for the given
decimal.
17
Solved Example:
Convert Decimal number 3509 to its Hex equivalent
∴ 3509 = DB516
Hex is a base 16 number and decimal is a base 10 number. We need to know the decimal
equivalent of every hex number digit. Here are the steps to convert hex to decimal:
Solved Example:
18
Activity 1.2(b)
3. Give the next three hexadecimal integers in ascending order after FD.
19
ASCII :
● ASCII (pronounced “ask-ee”) is most widely used coding scheme to represent data.
● ASCII uses 8 bits that represents a total of 256 (28 = 256) different characters.
● It is used in minicomputers, personal computers and computers that make information
available on the Internet.
EBCDIC:
● EBCDIC (pronounced “ ebb-see-dic”) is a coding scheme used by IBM mainframe
computers and some IBM midrange systems and high end servers.
● EBCDIC uses 8 bits and represents 256 (28 = 256) different characters.
● EBCDIC is widely considered to be an obsolete coding system, but is still used in
some equipment, mainly in order to allow for continued use of software written many
years ago that expects an EBCDIC communication environment.
Unicode:
● Today, computers make international communication and business transactions
possible, with a new coding system named Unicode.
● Unicode uses 16 bits and represent 65, 536 (216 = 65,536) different characters, and
can symbolize all the world’s written languages.
● Unicode is implemented in several operating systems including Windows, Mac OS,
and Linux.
20
Figure 1.3.2: EBCDIC Table
Step 1 Use press character on the keyboard, a chip in the keyboard convert key
electronic signal into special code called scan code
Step 2 The scan code for the character is sent to system unit
Step 3 The system unit converts the scan code for the character to its binary ASCII,
EBCDIC or UNICODE and store in memory for processing
Step 4 After processing, the binary code for the character is converted into image
and displayed on the output device
21
Example :
Calculate the total number of bits/bytes in a given word based on each coding scheme
Example :
www.google.com
1 byte = 8 bits
1 byte = 1 character
22
Activity 1.3
1. What is the advantage of using Unicode over ASCII and EBCDIC coding system?
2. How many characters exists in the following statements?
(a) Computer
(b) Computer Science (SC015)
3. How many bits and bytes used to represent following statements using different coding
schemes?
我爱饭
A logic gate is an elementary building block of a digital circuit. Most logic gates have two inputs
and one output. At any given moment, every terminal is in one of the two binary conditions low
(0) or high (1), represented by different voltage levels. Thus, we can define logic gates as
electronic circuits that are used to implement the logic expressions, or Boolean expressions.
The input to the NOT gate is inverted i.e the binary input state of 0 gives an output of 1
and the binary input state of 1 gives an output of 0.
23
is known as "NOT A" or alternatively as the complement of .
The truth table for the NOT gate appears as below
0 1
1 0
The output from the AND gate is written as (the dot can be written half way up the
line as here or on the line. Note that some textbooks omit the dot completely).
The truth table for a two-input AND gate looks like
0 0 0
0 1 0
1 0 0
1 1 1
The OR Gate
The OR gate has two or more inputs. The output from the OR gate is 1 if any of the inputs is
1. The gate output is 0 if and only if all inputs are 0. The OR gate is drawn as follows
24
The truth table for a two-input OR gate looks like
0 0 0
0 1 1
1 0 1
1 1 1
where the small circle immediately to the right of the gate on the output line is known as an
invert bubble.
The output from the NAND gate is written as (the same rules apply regarding the
placement and appearance of the dot as for the AND gate - see the section on basic logic
gates).
0 0 0 1
0 1 0 1
1 0 0 1
1 1 1 0
25
The NOR gate
The NOR gate has two or more inputs. The output from the NOR gate is 1 if and only if all of
the inputs are 0, otherwise the output is 0. This output behaviour is the NOT of A OR B. The
NOR gate is drawn as follows
The output from the NOR gate is written as which reads "A NOR B".
The truth table for a two-input NOR gate looks like
0 0 0 1
0 1 1 0
1 0 1 0
1 1 1 0
The exclusive-OR or XOR gate has two or more inputs. For a two-input XOR the output is
similar to that from the OR gate except it is 0 when both inputs are 1. This cannot be extended
to XOR gates comprising 3 or more inputs however.
In general, an XOR gate gives an output value of 1 when there are an odd number of 1's on
the inputs to the gate. The truth table for a 3-input XOR gate below illustrates this point.
The XOR gate is drawn as
The output from the XOR gate is written as which reads "A XOR B".
26
The truth table for a two-input XOR gate looks like
0 0 0
0 1 1
1 0 1
1 1 0
For a 3-input XOR gate with inputs , and the truth table is given by
0 0 0 0
0 0 1 1
0 1 0 1
0 1 1 0
1 0 0 1
1 0 1 0
1 1 0 0
1 1 1 1
The exclusive-NOR or XNOR gate has two or more inputs. The output is equivalent to inverting
the output from the exclusive-OR gate described above. Therefore an equivalent circuit would
comprise an XOR gate, the output of which feeds into the input of a NOT gate.
In general, an XNOR gate gives an output value of 1 when there are an even number of 1's
on the inputs to the gate. The truth table for a 3-input XNOR gate below illustrates this point.
The XNOR gate is drawn using the same symbol as the XOR gate with an invert bubble on
the output line as is illustrated below
The output from the XNOR gate is written as which reads "A XNOR B".
27
The truth table for a two-input XNOR gate looks like
0 0 1
0 1 0
1 0 0
1 1 1
For a 3-input XNOR gate with inputs , and the truth table is given by
0 0 0 1
0 0 1 0
0 1 0 0
0 1 1 1
1 0 0 0
1 0 1 1
1 1 0 1
1 1 1 0
One input
If there is only one input (A), then there are only two combinations (logic 0 or logic 1). So the
incomplete truth table would be drawn up as below (ignoring the results in the output column,
Z).
A Z
28
Two inputs
If there are two inputs (A and B) they can be arranged in four different combinations:
A and B both off
A off and B on
A on and B off
A and B both on.
You cannot create any other combinations. The truth table would therefore be drawn up as
below (ignoring the results in the output column, Z). You should notice that the input
columns are arranged in binary number order.
A B Z
0 0
0 1
1 0
1 1
Three inputs
If there are three inputs (A, B and C) they can be arranged in eight different combinations.
A B C Z
0 0 0
0 0 1
0 1 0
0 1 1
1 0 0
1 0 1
1 1 0
1 1 1
Summary
The pattern in the truth tables above is clear. Starting with one input giving two combinations,
you simply double the number of combinations each time an input is added.
1 input: 2 combinations
2 inputs: 4 combinations
3 inputs: 8 combinations
4 inputs: 16 combinations
and so on.
**You will never be asked to work with a system that has more than three inputs.
29
Worked example
The example below shows a logic diagram that has two logic gates. There are three inputs,
so this gives eight combinations in the truth table.
Stage 1 Stage 2
Draw up the results for point D.(This is Draw up the results for point Z. (This is
the output from the AND gate, being fed the output from the OR gate, being fed
by inputs A and B only.) by output D and input C only.)
A B C D Z A B C D Z
(A.B) (A.B) (D+C)
0 0 0 0 0 0 0 0 0
0 0 1 0 0 0 1 0 1
0 1 0 0 0 1 0 0 0
0 1 1 0 0 1 1 0 1
1 0 0 0 1 0 0 0 0
1 0 1 0 1 0 1 0 1
1 1 0 1 1 1 0 1 1
1 1 1 1 1 1 1 1 1
30
Boolean expressions
Each logic gate has a corresponding Boolean mathematical formula or expression. The use
of these expressions saves us having to draw symbol diagrams over and over again.
The name Boolean is taken from an English mathematician, George Boole, who founded
symbolic logic in the nineteenth century.
The following table gives a list of the common logic gates and their equivalent Boolean
notation. Draw the symbol for each gates.
AND A.B
OR A+B
NOT A
NAND A .B
NOR A+B
When designing systems, it is normal to design a logic diagram from a prepared truth table.
This may seem difficult to start with, but if you concentrate on the combinations which give a
logic 1 condition in the output column, solutions can be found easily.
The truth table below shows two inputs, A and B, and one output, Z.
A B Z
0 0 0
0 1 0
1 0 1
1 1 0
31
The output Z is at logic 1 in the third row down, and we can see that for this to happen A
must be at logic 1 and B must be at logic 0. In other words
This means that we need a two-input AND gate, with B being fed through a NOT gate. We
can write the statement in shorthand Boolean as
Worked example
In this problem we have three inputs, A, B and C, with one output, Z. From the truth table we
can see that there are two occasions when the output goes to logic 1.
A B C Z
0 0 0 0
0 0 1 0
0 1 0 0
0 1 1 1
1 0 0 0
1 0 1 0
1 1 0 1
1 1 1 0
This means we need a two-input OR gate being fed from two three-input AND gates as
shown below.
32
A
A
A.B.C
(A . B . C) + (A . B . C)
C
A.B.C
Worked example
A burglar alarm system is to sound if a master switch is on and either a light beam is broken
or a pressure pad is stood on.
Draw a logic diagram and a truth table for this system.
Read the specification carefully. You should notice that it has three inputs. These are:
a master switch (M)
a light sensor (L), and
a pressure pad (P).
The bell should go to logic 1 if the master switch is at 1 and either the light beam goes to logic
0 or the pressure pad goes to logic 1. This can be written in Boolean as:
Note: The alarm has to be triggered when the light beam is broken and so a NOT gate is
needed.
33
In other words, you need a two-input AND gate that is fed directly from M and also from a two-
input OR gate that is fed from L (through an inverter) and P. The logic diagram is shown below.
P B
L
L
The truth table for this system is shown below. Again, all you have to do is read the
specification carefully and then read across each row, one at a time, and decide whether the
bell should be ringing or not. There are some short cuts. For example, in the first four rows the
master switch is off; therefore the bell must be at logic 0 – even if there is a burglar in the
house.
M L P B
0 0 0 0
0 0 1 0
0 1 0 0
0 1 1 0
1 0 0 1
1 0 1 1
1 1 0 0
1 1 1 1
34
Activity 1.4 (a)
(a)
35
(b)
(c)
(d)
(e)
(f)
36
Construct truth table based on a given logic statement or scenario
Scenario One.
Ali want to print his assignment in library. He can only print the assignment when the the ink
is available and at the same time printer is NOT power off also he has granted to do so by
the library staff. Write down the boolean expression for this statement. After that, lets derive
truth table for the boolean expression and also create gates schematic correctly.
Then you can derive a boolean expression from the statement, this is the example based
on above statement.
𝑋 = 𝐴. 𝐵 . 𝐶
From boolean expression above you can separate it into these elements such as written in
the truth table below.
A B C B AB 𝐴𝐵𝐶
0 0 0 1 0 0
0 0 1 1 0 0
0 1 0 0 0 0
0 1 1 0 0 0
1 0 0 1 1 0
1 0 1 1 1 1
1 1 0 0 0 0
1 1 1 0 0 0
Scenario Two.
The archer trying to targets an arrow straight to the main middle point of the target circle in
order to the get ‘bullseye’ score point. The archer should consider the wind and angle. When,
the wind is blowing NOT too strong and the angle degree percentage is correct OR when the
wind is blowing little bit STRONG but the angle are NOT too accurate. Then the archer should
release the arrow immediately.
Then you can derive a boolean expression from the statement, this is the example based on
above statement.
𝑇 = 𝐴𝐵 + 𝐴 𝐵 can be write as A ⊕ 𝐵
From boolean expression above you can separate it into these elements such as written in
the truth table below.
37
A B A B AB AB 𝐴𝐵 + 𝐴B
0 0 1 1 0 0 0
0 1 1 0 1 0 1
1 0 0 1 0 1 1
1 1 0 0 0 0 0
Scenario Three.
Lets study the logic circuit below and write down correct boolean expression for them.
STEP 1: To start the processes try to divide the circuit into stages as shown.
STEP 2: Write down the Boolean expressions for all of the output sections of stage 1
STEP 3: Complete stage 2, to arrive at the expression for the system as 𝑄 = (𝐴 + 𝐵) + 𝐶
38
𝑄 = (𝐴 + 𝐵) + 𝐶
From this scenario you can evaluate it using truth table such as an example below.
A B C C 𝐴 + 𝐵 (A + B ) + C
0 0 0 1 0 1
0 0 1 0 0 0
0 1 0 1 1 1
0 1 1 0 1 1
1 0 0 1 1 1
1 0 1 0 1 1
1 1 0 1 1 1
1 1 1 0 1 1
39
Draw simple logic circuit for a given logic statement or scenario
First Scenario Schematic: From boolean expression above you can draw a schematic for it.
Second Scenario Schematic: From boolean expression above you can draw a schematic
for it.
𝐴 ⊕𝐵
40
Self Check: Can you...
● Identify logical operators (AND, OR, NOT) and symbols (gate) used to
represent each of the operators (AND, OR, NOT)
● Identify combination of different gates) (NAND, NOR, XOR, XNOR)
● Derive Boolean expression (and truth table) based on a given logic
statement
● Construct truth table based on a given logic statement or scenario (maximum 3 inputs)
● Draw simple logic circuit for a given logic statement or scenario (AND, OR, NOT, NAND,
NOR, XOR, XNOR)
Directions: For each of the following word problems, do the following in order:
1. Determine what your Boolean variables are and what they represent. Write what they are
in a key/legend
2. Write out the truth table that represents the word problem. Fill out the truth table according
to the scenario's constraints
3. Simplify the Boolean expression. You can verify your simplified expression with another
truth table
4. Draw the digital circuit for the simplified Boolean expression
(a) KMKt provide vending machine at the library, academic building and mini mart. The
machine can accept either coin or notes. Liza wants to buy a drink from this machine.
The machine will produce a drink if Liza insert enough coins or notes and the type of
drink that she chooses is available.
(b) Each library has a system to manage books as well as to help librarian to perform
borrowing transactions. In KMKt students are allowed to borrow not more than eight
(8) books at one time, while the librarian only manage the borrowing transaction if the
system can function (not out of service). Laila will borrow books if only the book that
she prefers is available.
(c) Three sensors are attached to a printing device, with three alarms attached to the
sensors. The first sensor, "A," detects if the device needs ink. The second sensor, "B,"
detects if the device needs repair. The third sensor, "C," detects if the device should
jam. An alarm sounds if 2 or more problems occur.
(d) A committee of three individuals decide issues for an organization. Each individual
votes either yes or no for each proposal that arises. A proposal is passed if it receives
at least two yes votes. Design a circuit that determines whether a proposal passes.
41
(e) Sometimes light fixtures are controlled by more than one switch. Circuits need to be
designed so that flipping any one of the switches for the fixture turns the light on when
it is off and turns the light off when it is on. Design circuits that accomplish this when
there are two switches and when there are three switches.
(f) Consider a lightbulb hooked to two 3-way switches. You sometimes see these near
staircases. ( Wiring a 3-Way Switch ) The light goes on if only one switch is in the "up"
position and the other switch is in the "down" position. If both are in the "up" position
or both are in the "down" position, the light is off.
PRACTICAL
1.5 Hardware
● A computer is an electronic device, operating under the control of instructions stored in its
own memory, that can accept data (input), process the data according to specified rules,
produce information (output), and store the information for future use
● What is inside a personal computer?
● The electronic components and circuitry of a personal computer usually are part of or are
connected to a motherboard.
● A motherboard, sometimes called a system board, is the main circuit board of the personal
computer.
● Many electronic components attach to the motherboard; others are built into it. Two main
components on the motherboard are the processor and memory.
● Many motherboards also integrate sound, video, and networking capabilities.
● A processor, also called a CPU (central processing unit), is the electronic component that
interprets and carries out the basic instructions that operate a computer.
● Memory consists of electronic components that store instructions waiting to be executed
and data needed by those instructions.
42
Rubric for Assemble Component
CRITERIA 1 2 3 TOTAL
TOTAL SCORE
43
PRACTICAL
1.6 Software
● Electronic components in computers process data using instructions, which are the steps
that tell the computer how to perform a particular task.
● A collection of related instructions organized for a common purpose is referred to as
software or a program.
● Using software, you can complete a variety of activities, such as search for information,
type a paper, balance a budget, create a presentation, or play a game.
CRITERIA 1 2 3 TOTAL
OS Installation flow Student did not Student did not Student submitted a
chart submit a make necessary complete and
The student submitted completed and revisions to satisfy comprehensive flow
a completed and comprehensive the OS installation chart as required.
comprehensive flow flow chart. process. The flow
chart to guide their chart is incomplete
installation process. and/or lacking areas
of importance.
Install Operating Student was Student was unable Student was able to
System Correctly unable to to successfully successfully install
install appropriate successfully install the the appropriate
Operating System on install the appropriate Operating System,
the PC. appropriate Operating System with very little
Operating on the PC without supervision and
System close guidance and guidance
assistance
Install all device Student was Student was unable Student was able to
drivers Correctly unable to locate, to successfully successfully locate,
identify and install all identify and install locate, identify and identify and install
necessary device the drivers on the install the drivers on the drivers on the
drivers PC. the PC; without PC with very little
close guidance and supervision and
assistance guidance
Install Virus Student was Student was able to Student was able to
Checking Software unable to perform 1 to 3 of the successfully
Download, install and download, install, following five tasks: download, install,
update AVG/Avast free or update the 1. Download and update
edition and run a virus virus checking AVG/Avast Free AVG/Avast Free
scan on the root drive. software. Edition. 2. Install Edition and run a
AVG/Avast Free virus scan on the
Edition on the PC. root drive of the PC,
3. Update as well their USB
AVG/Avast Free drive.
Edition on the PC.
4. Run a virus scan
on the root drive of
the PC. 5. Run a
virus scan on the
student's personal
USB drive.
44
Install 3rd party Student was Student was able to Student was able to
software Download unable to install 1 - 3 of the install all of the
and install the download and five required required
following applications install any of the applications. applications.
on the PC: 1. Adobe required
Acrobat Reader. 2. software.
Shockwave Player. 3.
Flash Player. 4. Java.
5. VLC Media player.
TOTAL SCORE
45
CHAPTER 2
Internet Technology
46
2.1 Basic Concept of Network
(a)
(b)
(c)
(h)
(g) (d)
(f) (e)
Figure 2.1.1: Communication System
Figure 2.1.1: A simplified example of a communications system. Some devices that serve as
sending and receiving devices are (a) servers, (b) desktops, (c) laptops, (d) tablets, (e)
smartphones and headsets, (f) portable media players, (g) handheld game devices, and (h)
GPS receivers in vehicles. Transmission media consist of phone and power lines, cable
television and other underground lines, microwave stations, and satellites.
Communications
The process in which two or more computers or devices transfer data, instructions, and
information is known as digital communications. Today, even the smallest computers and
devices can communicate directly with one another, with hundreds of computers on a
corporate network, or with millions of other computers around the globe — often via the
Internet.
Some communications involve cables and wires; others are sent wirelessly through the air.
For successful communications, you need the following:
● A sending device that initiates an instruction to transmit data, instructions, or
information.
● A communications device that connects the sending device to transmission media.
● A transmission media, or a communications channel, on which the data, instructions,
or information travel.
● A communications device that connects the transmission media to a receiving
device.
● A receiving device that accepts the transmission of data, instructions, or information.
47
Figure 2.1.2: Communication System Device
Communications devices
1. Modems
There are different types of modem which are used in computer networking; below explain
each one –
i. Cable Modem: In the cable modem, to use the coaxial cables those are connected
to the back edge of modem.
ii. ADSL Modem: ADSL stands for “Asymmetric Digital Subscriber Line” and these
types of modems uses the telephone line for sending and receiving all
information.
iii. DSL Modem: DSL stands for “Digital Subscriber Line“, and it is also known as
“Broadband Modem“. DSL modems offer broadband services for using of
different types of internet connections. DSL modems are comfortable for
higher internet speed.
iv. ISDN Modem: ISDN stands for “Integrated Services Digital Network“, and it
provides to make communication standards for using of digital transmission
of voice, video data over wire or optical fiber.
48
2. Wireless Access Point (WAP)
● A wireless router is a device that performs the functions of a router and also a
wireless access point.
● A broadband router is a device that performs the functions of a router and also
a broadband modem.
49
Figure 2.1.8 (b): Through a router, home and small business networks can share access to a
broadband Internet connection, such as through a cable or DSL modem.
4. Network Cards
A network card enables a computer or device that does not have built-in networking
capability to access a network. Sometimes called a network interface card (NIC pronounced
nick). The network card coordinates the transmission and receipt of data, instructions, and
information to and from the computer or device containing the network card.
A hub or switch is a device that provides a central point for cables in a network.
Hub is a networking device that allows one to connect multiple PCs to a single network.
Hubs may be based on Ethernet , Firewire, or USB connections. This device does not
manage the traffic intelligently. Unlike a network switch or router, a network hub has no
routing tables or intelligence on where to send information and broadcasts all network data
across each connection.
50
Hub Switch
Figure 2.1.10 (b) : A hub or switch is a central point that connects several devices in a
network together, as well as connects to other networks, as shown in this simplified diagram.
Transmission Media
Physical/Wired transmission media use wire, cable, and other tangible materials to send
communications signals.
51
(a) Twisted-pair cable
Twisted-pair cable consists of one or more twisted-pair wires bundled together. The
wires are twisted together to reduce noise ( electrical disturbance).
52
● Less susceptible to noise (interference) from other devices, such as a copy
machine
● Better security for signals during transmission because they are less
susceptible to noise
● Smaller size (much thinner and lighter weight)
2.1.13: A fiber-optic cable consists of hair-thin strands of glass or plastic that carry data as
pulses of light, as shown in this simplified example.
Wireless transmission media send communications signals through the air or space
example radiowave. Many users opt for wireless transmission media because it is more
convenient than installing cables. In addition to convenience, businesses use wireless
transmission media in locations where it is impossible to install cables.
Examples of wireless transmission media are infrared, broadcast radio, cellular radio,
microwaves and communications satellite.
(a) Infrared
Infrared (IR) is a wireless transmission medium that sends signals using infrared light
waves.
53
Figure 2.1.14: Remote control and other device use infrared
Cellular radio is a form of broadcast radio that is in wide use for mobile
communications, specifically wireless modems and mobile phones.
A mobile phone uses high- frequency radio waves to transmit voice and digital data
54
messages. Because only a limited number of radio frequencies exist, mobile service
providers reuse frequencies so that they can accommodate the large number of users.
Some users install an amplifier or booster to improve the signal strength.
Figure 2.1.16 : As a person with a mobile phone drives from one cell to another, the radio
signals transfer from the base station (microwave station) in one cell to a base station in
another cell.
(d) Microwaves
● Microwaves are radio waves that provide a high- speed signal transmission.
● Microwave transmission, often called fixed wireless, involves sending signals from one
microwave station to another.
● A microwave station is an earth-based reflective dish that contains the antenna,
transceivers, and other equipment necessary for microwave communications.
● As with infrared, microwaves use line-of-sight transmission. To avoid possible
obstructions, such as buildings or mountains, microwave stations often sit on the tops
of buildings, towers, or mountains.
● Microwave transmission typically is used in environments where installing physical
transmission media is difficult or impossible and where line-of-sight transmission is
available. For example, microwave transmission is used in wide-open areas, such as
deserts or lakes, between buildings in a close geographic area, or to communicate with
a satellite.
55
●
Figure 2.1.17 : A microwave station is a ground-based reflective dish that contains the
antenna, transceivers, and other equipment necessary for microwave communications.
Figure 2.1.18: Communications satellites are placed about 22,300 miles above the Earth’s
equator.
56
A network can be internal to an organization or span the world by connecting to the Internet.
Many home and business users create a network to facilitate communications, share
hardware, share data and information, share software, and transfer funds.
Help people communicate efficiently and easily via email, online social networks,
instant messageing and others.
Sharing devices such as a printer can be use by multiple users and it can save money.
Files or documents stored on a network can easily be shared between users.
Users connected to a network can access shared software on the network.
Electronic funds transfer (EFT) allows users connected to a network to transfer money
from one account to another such as online banking.
Data is easy to backup as all the data is stored on the file server.
Figure 2.1.19 :Networks facilitate communications; enable sharing of hardware, data and
information, and software; and provide a means for transferring funds.
57
Self Check: Can you...
Activity 2.1
3. 15 PCs and 2 printers need to be set up for a network in Sepakat Jaya Enterprise that
enable for collaboration such as printer and file sharing.
a. Name two (2) communication devices that enable the computers to be
connected to a network. Give the function of the devices.
b. Name one (1) communication device which would enable the network to be
connected to the Internet. Justify your answer.
c. Explain three (3) types of wired media that can be used to setup the network
in an office.
d. Identify the most suitable wireless media that can be used to make computer
connected to a network in an office. Justify your answer.
58
2.2 Network Architecture
Network Architectures
1. Client/Server
On a client/server network, one or more computers act as a server, and the other
computers on the network request services from the server.
● A server controls access to the hardware, software, and other resources on the
network and provides a centralized storage area for programs, data, and
information.
● The clients are other computers and mobile devices on the network that rely on the
server for its resources. For example, a server might store an organization’s email
messages.
● Clients on the network, which include any users’ connected computers or mobile
devices, access email messages on the server.
● Both wired and wireless networks can be configured as a client/ server network.
Although it can connect a smaller number of computers, a client/ server network
architecture typically provides an efficient means to connect 10 or more computers.
● Most client/server networks require a person to serve as a network administrator
because of the large size of the network. some servers are dedicated servers that
perform a specific task. For example, a network server manages network traffic
(activity), and a web server delivers requested web pages to computers or mobile
devices.
59
2. Peer-to-Peer
In peer-to-peer (P2P) networking, a group of computers are linked together with equal
permissions and responsibilities for processing data.
● Peer-to-peer networks allow users to share resources and files located on their computers
and to access shared resources found on other computers on the network.
● Peer-to-peer networks do not have a common file server. Instead, all computers can use
any of the resources available on other computers on the network. For example, you might
set up a P2P network between an Android tablet and a Windows laptop so that they can
share files using Bluetooth or so that you can print from the tablet to a printer accessible
to all devices on the network.
● Both wired and wireless networks can be configured as a peer-to-peer network. P2P
networks are ideal for very small businesses and home users.
● Home P2P networks does not require an Internet connection and P2P software. It can be
only two computers connected via a network cable to transfer file.
● An Internet P2P network is set up using an Internet connection and P2P software such
as Limewire and Bearshare.
● Some operating systems include a P2P networking tool that allows users to set up a peer-
to-peer network.
● Many businesses also see an advantage to using P2P. That is, companies and employees
can exchange files using P2P, freeing the company from maintaining a network server for
this purpose.
● Business-to-business e-commerce websites find that P2P easily allows buyers and sellers
to share company information such as product databases.
60
Client-Server Vs Peer-to-Peer
Client/Server Peer-to-peer
A network in which one or more computers act A network in which each computer (called peer)
as a server and the other computers software, have equal capabilities and responsibilities to
and other resources on the network, called share hardware, data or information with other
client, request services from the server. A server computers on the network
controls access to the hardware,
● Centralized control by the server can be ● Every machine (users) is taking care of
more efficient at administering the whole his/her own machine so could be difficult to
network. administer the network.
● Network professionals are normally needed ● Easy to install and configure for the
to manage and maintain the whole network. computers in the network.
● Cost to install and manage the network can ● Cost to install and maintain network is
be expensive. inexpensive.
● Only servers have high responsibilities and ● Each computer has equal responsibilities
capabilities. and capabilities.
Advantages
● All files are stored in a central location ● No need for a network operating system
● Network peripherals are controlled centrally ● Does not need server because individual
● Backups and network security is controlled workstations are used to access the files
centrally ● Much easier to set up than a client-server
● Users can access shared data which is network - does not need specialist
centrally controlled knowledge
● No need for specialist staff such as network
technicians because each user sets their
own permissions as to which files they are
willing to share.
Disadvantages
61
Illustrate types of network architecture based on the given scenario
Scenario :
You are a Network Planner, in your company and you need to draw a computer network layout.
All the devices and workstations in the network is centralised control.The network consists of
five (5) computers. The network also has two (2) unit printer. The network must be connected
to Internet.
Internet
Printer Router/modem
PC1 1
PC2 Switch/hub server
Activity 2.2
1. Network architectures are always classified into two broad categories: client-server
architectures, and peer-to-peer architectures.
(a) State one (1) difference between client-server and peer-to-peer architectures.
(b) Draw client-server architecture.
(c) Explain two (2) disadvantages of client-server architecture compared to peer-to-peer
architecture.
3. Illustrate two (2) types of peer-to-peer network architecture with proper labelling.
Home P2P
Internet P2P
62
2.3 Classification of Network
A computer network can be classified into different categories. Different criteria are used to
classify computer networks such as geographical spread (size) and ownership.
● A local area network (LAN) is a network that connects computers and devices in a
limited geographical area such as a home, school, office building or closely
positioned group of buildings.
● Examples of LAN is network in school computer lab, network in cybercafe, network
in small office
● Each computer or device on the network, called a node, often shares resources, such as
printers, large hard drives, and programs. Often, the nodes are connected via cables.
● A wireless LAN (WLAN) is a LAN that uses no physical wires.
63
Figure 2.3.3: A wired and wireless LAN
Advantages
● Easy to share devices (printers, scanners, external drives)
● Easy to share data (homework, pictures)
● Cost of LAN setup is low because of small coverage area compared to WAN
Disadvantages
● Area covered is limited
● Security-each computer and device become another point of entry for threats
● If all computers running at once, can reduce speed for each.
A wide area network (WAN) is a network that covers a large geographical area such as
a city, country, or the world using a variety of wired and wireless transmission media such
as telephone lines, cables, and radio waves. The Internet is the example of world’s largest
WAN.
A WAN can be one large network or can consist of multiple LANs connected together.
64
How Are LAN and WAN Different?
The main differentiation among these classifications is their area of coverage and network
ownership.
WAN Connects computers Public -WANs are not ● Internet (the biggest
and devices in a large owned by any one network in the world)
geographical area such organization but rather
as city, country, world. exist under collective or
distributed ownership and
management over long
distances
An Enterprise Private Network is a computer network that helps enterprise companies with a
number of different offices connect those offices to each in a secure way over a network. An
enterprise private network is mainly set up to share computer resources.
A Virtual Private Network is a private network that is built over a public infrastructure. Security
mechanisms, such as encryption, allow VPN users to securely access a network from different
locations via a public telecommunications network, most frequently the Internet.
65
Self Check: Can you...
Activity 2.3
The Internet
The Internet began in 1969 as a research project funded by the Department of Defense with
a goal of creating a means of communication beside telephone lines. The first network was
called ARPANET (Advanced Research Project Agency NETwork). In 1985, the U.S. National
Science Foundation (NSF) commissioned the development of a university network backbone
called NSFNET. The system was replaced by new networks operated by commercial internet
service providers in 1995. The focus was on communicating in the event part of the network
was disabled. This early network was the precursor to the Internet. It was limited in function
but launched the idea of a different method of communication. By 2015, approximately 3.2
billion people, or nearly half of the world’s population, were estimated to have access to the
Internet.
The Internet is a public and global communication network that provides direct connectivity to
anyone over a local area network (LAN) or Internet Service Provider (ISP). The Internet is a
public network that is connected and routed over gateways. End users are connected to local
access providers (LANs or ISPs), who are connected to the Internet access providers, to
network access providers, and eventually to the Internet backbone. Since access to the
Internet is open to all, there is a lack of control that may result in an unruly proliferation of
information.
66
Advantages of Internet
Using internet such as email, VoIP and social media make a communication more
efficient.
Provide a variety of information and help students to complete their asignment easily
and faster.
Internet provide the most common sources of entertainmet such as online games,
music, movies and dramas.
Cloud storage also provides users with the convenience of accessing and store their
files from almost anywhere.
Most of daily activity can doing thru online such as shooping, transfer money, bill
payment and others.
Disadvantages of Internet
If personal and confidential records were not protected properly, it might be stole by
inresponsible person.
A person who uses the Internet very frequently can face abusive or trolls' people and
lead to cyberbullying.
Allow easy access to pornographic or violent materials among children and teenagers
which leads to bad social and moral development of the younger generation.
Expose to theft of personal information when using internet applications such as email
and online banking.
Prolonged or improper computer use to access to the Internet can lead to injuries or
disorders of the hands, wrists, elbows, eyes, neck, and back.
Users addicted to the Internet will become socially disconnected as they will be drifted
apart from their family and friends.
The Intranet
An Intranet is a network inside an organization that uses Internet technologies (such as
web browsers and servers, TCP/IP network protocols, HTML hypermedia document
publishing and databases, and so on) to provide an Internet-like environment within the
enterprise for information sharing, communications, collaboration, and the support of
business processes. It is protected by security measures such as passwords, encryption, and
firewalls, and thus can be accessed by authorized users through the Internet.
67
The Extranet
Extranets are network links that use Internet technologies to interconnect the Intranet
of a business with the Intranets of its customers, suppliers, or other business partners.
Extranets provide secured connectivity between corporation’s intranets and the intranets of its
business partners, material suppliers, financial services, government, and customers. Access
to intranets is usually limited by agreements of the collaborating parties, is strictly controlled,
and is only available to authorized personnel.
The protected environment of the extranet allows groups to collaborate, sharing information
exclusively, and exchanging it securely. Since an extranet allows connectivity between
business through the Internet, it is an open and flexible platform suitable for supply chain
management. To increase security, many companies replicate the database they are willing
to share with their business partners and separate them physically from their regular intranets.
Figure 2.4.1 Diagrammatic Contrast of the Internet, Intranet, and Extranet (Source: Turban et
al. (2000), p. 243)
The Internet Any individual with Unlimited public; no General public, and
dial-up access or restrictions advertorial
LAN
68
Differences between Internet, Intranet and Extranet
Type Accessibility
Activity 2.4
1. Define Internet
2. Discuss the usage of Internet in our daily life.
3. List two (2) disadvantages of Internet.
4. Differentiate between Intranet and Extranet
Broadband is the common term for a very fast connection to the Internet. It allows
users to download online entertainment such as video clips and music, listen to digital radio,
send email faster and speeds up everything they do online.
A broadband service can transmit information at up to 40 times the speed of a dial-up
modem connection. As the connection is always on, like water or electricity, users don't
need to dial up every time they want to log on.
Broadband is revolutionising online activities everywhere for businesses, entertainment and
public services. Faster speeds of up to 160 times a dial-up connection will bring about new
services, including internet-TV and video on demand, across home, business and public
life.
Types of broadband
Users can connect their computers and mobile devices to the Internet through wired or
wireless technology and access its services free or fo fee.
With wired connections, a computer or device physically attaches via a cable or wire to a
69
communications device, such as the modem that transmit data or other items over
transmission media to the Internet.
For wireless connection, many mobile computers and devices include the necessary built-
in technology so that they can transmit data and other items wirelessly.
However, the type of broadband service you need and have access to will be determined
by your speed requirements, budget, and the location (city or regional) of your home or
office.
DSL: Advantages
An advantage of DSL service is that it works with existing wiring. The only
equipment needed is a modem plugged into an existing phone jack and filters for
each telephone in your home or office. Another benefit of DSL service is that each
user has a dedicated link and the speed is constant and will not diminish if more
people in your neighborhood are also using DSL. DSL provides reliable broadband
service for most residential and small business customers.
DSL: Disadvantages
A disadvantage of DSL service is the inability to deliver the service further than
18,000 feet from the central phone office or other DSLAM location. DSL cannot be
reliably delivered to homes or businesses beyond this distance. Another
disadvantage is that the upload speeds do not match download speeds. While DSL
connections are adequate for the average consumer, with technology
enhancements and innovation, the bandwidth that DSL offers may be outdated for
many due to its bandwidth constraints.
70
(ii) Cable Internet Services
Cable television companies provide broadband using the same coaxial
cables that deliver pictures and sound to your TV set. A cable modem is an
external device that normally has two connections: one to the cable wall outlet, the
other to a computer. Cable Internet is usually faster than DSL.
Subscribers can access their cable modem service by simply turning on their
computers, without dialing-up an ISP which is referred to as an “always on”
connection. You can still watch cable TV while using broadband and get telephone
service through Voice over Internet Protocol (VoIP) phone technology. Cable
provider’s market their services in bundles, which can be a cost effective way to
purchase internet services. While cable broadband is faster than DSL,
transmission speeds vary depending on the type of modem, cable network, and
how many people in the neighborhood are using a cable connection.
Cable: Advantages
A benefit of cable modem service is its availability to all cable company customers
where the cable network has been upgraded to deliver cable modem service. The
distance between your residence and the cable company will not affect your
Internet speed. Cable is also generally faster than DSL.
Cable: Disadvantages
A disadvantage of cable modem service for rural communities is the lack of cable
service beyond the edges of the larger towns. Another disadvantage is that the
connection is shared between you and other people on the network segment and
therefore speed may vary greatly at different times of the day and can slow down
significantly in a neighborhood where many residents using cable connections
access the Internet simultaneously. For example, if you live in a neighborhood
where cable modem penetration is high you may notice a significant increase in
the time it takes to upload and download information in the evening when people
return home from work and school. Another disadvantage is that upload speeds
never match download speeds.
Fiber: Advantages
There are advantages to using fiber optic cable for telecommunications; the main
advantage is the ability to provide higher bandwidth and greater distance
between terminals. Compared to conventional copper wire, fiber optic cable can
deliver more bandwidth than conventional metal wire. Because of its size, many
optical fibers can be bundled into one outer covering, or jacket, allowing for a
higher carrying capacity—more phone or cable lines going through one channel.
71
Fiber optic cable can deliver more bandwidth than other broadband technologies
at a lower cost of maintenance and allows for future expansion and opportunities
as innovative and entrepreneurial concepts evolve.
Fiber: Disadvantages
Installing fiber and lighting the fiber cable is expensive and maybe cost-
prohibitive for many providers serving rural areas. Fiber cable is fragile and also
requires equipment to convert electrical signals into light signals and then re-
convert them back into an electrical signal at the receiving end.
72
Mobile wireless services are continually being upgraded to provide data
transmission speeds considered to be broadband. The faster mobile wireless
networks are referred to as 3G or 4G.The “G” stands for “generation,” meaning 3rd
and 4th generation or the evolution of broadband cellular networks; supposedly,
each generation provides a faster more secure wireless network. A mobile wireless
service requires a base station that is connected to a high capacity landline data
transmission network to reach the Internet. In other words, it’s never wired OR
wireless; ultimately, it has to be both. Wireless broadband in common usage
means that the so-called “last mile” connection to the user is done via radio signals
from a tower to a cell phone or other wireless devices (e.g., a tablet).
Long Term Evolution (LTE) is a 4G technology provides increased peak data rates,
reduced latency, scalable bandwidth capacity than 4G predecessors. LTE can
manage multicast and broadcast streams and handle quick-moving mobile phones.
It uses an IP-based network architecture that allows for seamless handovers for
voice and data to older model cell towers.
(iii) Satellite
Satellite broadband is sometimes the only option available to users in very
rural or sparsely populated areas. Like telephone and television services,
satellites orbiting the earth provide necessary links for broadband. With satellite
service, you must have a clear view of the southern sky. Satellite service can be
disrupted by weather conditions and changes in line of sight to the orbiting satellite.
Satellite may have a higher monthly service charge than other broadband options
and the need to purchase more home or business equipment compared to the
other options. Because satellites are located a significant distance from customers,
there are issues of “latency” and therefore a noticeable time lag between sending
and receiving data by the end customer.
73
Activity 2.5
Technology Description
● The Internet relies on an addressing system much like the postal service to send data to
a computer or device at a specific destination.
● Internet Protocol (IP) address, is a sequence of numbers that uniquely identifies the
location of each computer or device connected to the Internet or any other network.
● This unique number will be assigned to each and every computer or devices connected to
a network.
● IP address is used as an address to send data and information to a specific computer or
device on the Internet.
74
Structure of the IP address
o IPv4 addresses are 32-bit IP address written as four decimal numbers (octet) from 0
to 255 separated by dots/periods.
Example :
IPv4 IPv6
Combining the four octets of an IP address Combining the eight hexadecimal string of an
IP address.
Must be a decimal value between 0 and 255 Can be any hexadecimal value between 0 and
FFFF
Provides a possible 232 or 4,294,967,296 unique Provides a possible 2128 unique values
values.
75
Domain Name
● Because lengthy IP addresses can be difficult to remember, the Internet supports
domain names.
● A domain name is the text version of an IP address.
● Domain name is a text-based name that corresponds to the IP address of a server,
such as a web server that hosts a website.
● A domain name is part of the web address that you type in a browser’s address bar to
access a website.
● Example : www.kmkt.matrik.edu.my
Figure 2.6.2: The IP address and domain name for the Google Web site.
gTLD Purpose
76
● Examples of Country Code Top-level domain (ccTLD)
ccTLD country
my Malaysia
au Australia
kr Korea
sg Singapore
th Thailand
Activity 2.6
77
CHAPTER 3
Computer Ethics & Security
“T oday, people rely on technology to create, store, and manage their critical
information. Thus, it is important that computers and mobile devices, along with the
data and programs they store, are accessible and available when needed. It also is
crucial that users take measures to protect or safeguard their computers, mobile
devices, data, and programs from loss, damage, and misuse.” (Discovering Computer
2018 p.5-2)
78
3.1 Areas of computer ethics
(a) Computer ethic is moral guidelines that govern the use of computers and
information systems.
(b) Six area of computer ethics
1. Information Accuracy
2. Green Computing
3. Software Piracy
4. Codes of Conduct
5. Information Privacy
6. Intellectual property rights
1. Information accuracy
● Information Accuracy concerned with assuring the authenticity and
fidelity of information, and identifying those responsible for
informational errors that harm people.
● No one should assume that information on the Internet is accurate, timely,
clear, and important.
Why is information accuracy become a concern today?
● It is because many users access information maintained by other
people or companies such as on the Internet.
● Do not assume that all the information on the Web page is correct.
● Users should evaluate the value of a Web page before relying on its
contents.
2. Green computing
● Involves reducing the electricity and environmental waste while using a
computer.
79
3. Software Piracy
● Software piracy is the illegal copying, distribution, or use of software.
● The time-limited or function-restricted versions of commercial software called
shareware are less likely to be pirated since they are freely available.
● Similarly, freeware , a type of software that is copyrighted but freely distributed at no
charge, also offers little incentive for piracy.
4. Codes of Conduct
● A written guideline that helps determine whether a specific computer action is
ethical or unethical.
5. Information privacy
● It refers to the right of individuals and companies to deny or restrict the collection
and use of information about them.
● Information theft occurs when someone steals personal or confidential information.
● For example, a corrupt individual may steal credit card numbers to make fraudulent
purchase.
● Techniques companies, employers, or hackers use to collect your personal data:
❖ Electronic profiles – data collected when you fill a form or register online
❖ Cookies – a small text file that web server stores on your computer
❖ Phishing – a scam using email to get personal and financial information
❖ Spyware and adware – malicious code that spread through the network
● Ways to safeguard your personal information:
❖ Limit the amount of information you provide to Web sites or forms, fill in only
necessary information.
❖ Install a personal firewall.
80
❖ Do not reply to spam for any reason.
❖ Clear your history file when you are finished browsing.
❖ Install a cookie manager to filter cookies.
❖ Purchase goods with cash, avoid unnecessary online payments.
Why IP Rights?
● Because many of these works are available digitally.
Importance of IP rights:
1. To protect any original work that created by individual person/ company
2. Preserve the features and processes that make things work and let inventors profit
from their inventions.
Types of IP rights
81
Activity 3.1
3.2 Netiquette
Netiquette is the code of acceptable behaviors users should follow while on the
Internet; that is, it is the conduct expected of individuals while online.
82
Rules of Netiquette
83
Activity 3.2
1. What is netiquette ?
2. State the rules of netiquette social interaction and communication electronically.
3. Brother Lan is sending an e-mail to his boss. Accidentally, he mistypes the subject title
with capital letter. Explain why we are not allowed to use capital letter.
4. Online chat may refer to any kind of communication over the internet that offers a real-
time transmission of text messages from sender to receiver.
(a) Explain three (3) Netiquette should use while chatting online with other users.
(b) List two ways can chatters use to express emotion while chatting online?
(c) List three (3) commonly uses abbreviation during chatting.
5. Identify the rules of netiquette should be apply for each situation below
(a) For the majority of participants, online communication is straightforward.
Sometimes unintended meanings are conveyed.
(b) Give a descriptive phrase in the subject line of the message header that tells the
topic of the messages.
(c) Halim use to express emotion while chatting online.
Computer Security Risks is any event or action that could cause a loss of or damage to
computer hardware, software, data, information, or processing capability.
1. Malicious Code
2. Unauthorized access and use
3. Hardware theft
4. Software theft
5. Information theft
6. System failure ( not in syllabus but accepted to be use in assignment)
Malicious Code
Malicious code which are program that act without a user’s knowledge and deliberately alter
the computer operation.
Computer viruses, worms, and Trojan horses are classified as malware (short for malicious
software).
84
Computer viruses are software that are designed to be spread from one computer to another.
They’re often sent as email attachments or downloaded from specific websites with the intent
to infect your computer.
Computer worms are pieces of malware programs that replicate quickly and spread from one
computer to another.
“Trojan,” is a malicious bit of attacking code or software that tricks users into running it willingly,
by hiding behind a legitimate program.
Unauthorized use - The use of a computer or its data for unapproved or possibly
illegal activities.
Hardware Theft
Software Theft
Information Theft
Occurs when someone steals personal ornconfidential information. If stolen, the loss of
information can cause as much damage as (if not more than) hardware or software theft.
85
3.4 Security Measures
1. Data backup
2. Cryptography
3. Anti-virus
Software that scan for viruses, and solves detected treats to protect computer.
This software identifying and removing any virus found in memory, storage media
and incoming file.
Antivirus must be installed and upgrade regularly.
Example:
o Kaspersky anti-virus
o Avast! anti-virus
o McAfee anti-virus
o VirusScan anti-virus
o AVG anti-Virus
4. Anti-spyware
86
5. Firewall
Security technique that can be used to regulated who or what can view or use
resources in a computing environment.
Various method for physical access control:
o Use password and username for computers
o Use smartcard as a door access system
o Use biometric identification as a security identification and
authentication device
o Use CCTV to monitor the interior and exterior of a property
o Set up an alarm system for computer lab or office
o Use cables to lock laptop or computer devices to tables or floors
87
Security Measures Computer Security Risks
Physical Access Control Unauthorized access and use, hardware theft, software theft,
information theft.
88
CHAPTER 4
Multimedia
“M ost web pages include multimedia, which refers to any application that
combines text with media. Media includes graphics, animation, audio, video, and/or
virtual reality. The sections that follow discuss how the web uses these types of
media.” (Discovering Computer 2018 p.2-30)
89
Multimedia development process
Multimedia, which refers to any application that combines text with media. Media includes
graphics, animation, audio, video, and/or virtual reality delivered by computer.
2. Development plan
Defining project goals and objectives
3. Preproduction
The process of intelligently mapping out a cohesive strategy for the entire multimedia project
4. Production
● Activities in this phase include:
● Content Research
● Interface Design
● Graphics Development
● Selection of musical background and sound recording
● Development of computer animation
● Production of digital video Authoring
5. Postproduction
In this phase, the multimedia application enters the Alpha and beta testing process
Alpha:
● Testing conducted internally by the manufacturer
● Takes a new product through a protocol of testing procedures to verify product
functionality and capability
Beta:
● The second-stage test-version, which is distributed free to a limited sample of users
so that they can subject it to daily use and report any problems to the manufacturer.
● After the "bugs" are fixed, the final version of the program is released to the general
public.
6. Documentation
User documentation is a very important feature of high-end multimedia titles.
90
Figure 5.1: Example of stage in multimedia courseware project
(source:http://www.elearninglearning.com)
CRITERIA 1 2 3 TOTAL
Technical The project does not The project runs The project runs
run satisfactorily. adequately with minor perfectly with no
There are too many technical problems. technical problems.
technical problems For example, there
to view the project. are no error
messages, all sound,
video or other
elements are found.
Content Project contents are Project contents are Project contents are
not including neither including either college including the college
college logo or logo or college motto logo, college motto.
college motto. but not both or
contents are not Project duration is
Project duration is including neither within 60 seconds.
exceeding 60 college logo or college
91
seconds time limit. motto.
Project duration is
within 60 seconds or is
not within 60 seconds
or exceeding 60
seconds time limit.
TOTAL SCORE
92
CHAPTER 5
Database
“A lthough databases and spreadsheets both store data, these programs have
different purposes and capabilities. Spreadsheet programs are ideal for calculating
results or creating charts from value in the worksheet. You should use a database
program, however, if want to collect, reorganize and filter data, and/or create reports
from the data.” (Discovering Computer 2018 p.4-14)
93
Basic Concept of Database
● Database is a collection of data organized in a manner that allows access, retrieval, and
use of that data.
● Computers process data in a database to generate information for users. A database at a
school, for example, contains data about its students and classes.
● With database software, often called a database management system (DBMS), users
create a computerized database; add, modify, and delete data in the database; sort and
retrieve data from the database; and create forms and reports from the data in the
database.
● Example of DBMS:
1. Microsoft Office Access
2. Open Office Base
3. Oracle
4. PHPMyadmin
5. DB2
94
Database Object
A: TABLE
Create a table and specify A student was A student was A student was
fields with their data types, unable to perform able to perform 2- able to perform
enter data and modify all the following 3 of the following all the following
table structure in a table tasks Create tasks : Create tasks : Create
table Specify field table Specify field table Specify field
Enter data Modify Enter data Modify Enter data Modify
table structure. table structure. table structure.
Add, modify, delete data A student was A student was A student was
and navigate records unable to perform able to perform 2- able to perform
within a table all the following 3 of the following all the following
tasks : Add data tasks : Add data tasks : Add data
Modify data Modify data Modify data
Delete data Delete data Delete data
Navigate records Navigate records Navigate records
within a table within a table within a table
B: FORM
Create, open, save, close A student was A student was A student was
and delete a form. unable to perform able to perform 2- able to perform
all the following 3 of the following all the following
tasks : Create a tasks : Create a tasks : Create a
form Open a form form Open a form form Open a form
95
Save a form Save a form Save a form
Close a form Close a form Close a form
Delete a form Delete a form Delete a form
Create and add, modify A student was A student was A student was
text in Headers, Footers in unable to perform able to perform 1- able to perform
a form and use correct all the following 2 of the following all the following
naming conventions for tasks: Create and tasks: Create and tasks: Create and
forms add text in add text in add text in
Headers, Footers Headers, Footers Headers, Footers
in a form Modify in a form Modify in a form Modify
records text in records text in records text in
Headers, Footers Headers, Footers Headers, Footers
in a form Use in a form Use in a form Use
correct naming correct naming correct naming
conventions for conventions for conventions for
forms forms forms
C: QUERY
Create, edit and save a A student was A student was A student was
query unable to perform able to perform 1- able to perform
all the following 2 of the following all the following
tasks : Create tasks : Create tasks : Create
query Edit query query Edit query query Edit query
Save query Save query Save query
96
D: REPORT
TOTAL SCORE
Activity 5.1
Can you create a simple Library Book Loan System using Microsoft Access?
1. Start Access.
2. Click the “Blank desktop database” template.
3. Type a file name for the database you're about to create.
4. Choose the folder where you want to store your database.
5. Click the big Create button (under the File Name box).
6. Create tables (Student and Book).
7. Enter your data.
8. Create query.
9. Design form.
10. Design report.
97
CHAPTER 6
SDLC
98
Information System
An information system is a collection of hardware, software, data, people, and procedures that
work together to produce information.
System development is a set of activities used to build an information system. The activities
are grouped into categories called phases. This collection of phases is called the system
development life cycle (SDLC).
P – Planning
A – Analysis
D – Design
I – Implementation
M – Maintenance
99
System Development Life Cycle (SDLC)
SDLC consists of five phases. Each phase consists of a series of activities, and the phases
form a loop.
PLANNING PHASE
100
their value to the company or organization. The steering committee approves some
projects and rejects others.
3. Allocate resources
Projects with the highest priority will be allocated with resources such as money,
people and equipment. It is likely that only a few will begin system development
immediately. While other approved projects have to wait for additional funds or
resources to become available.
Example :
ANALYSIS PHASE
101
Involves three major activities:
DESIGN PHASE
Consist of two major activities that been perform by system analyst at the same time.
102
● Database design - system analyst work with database administrator to identify
new and current data elements exist in organization
● Input and output design - system analyst design the menu, screen and report
specified for the requirement. Also develop mock-up or layout chart for each
input and output. Mock-up is a sample of the input or output that contains
actual data
● Program design - system analyst prepares the program specification
package, which identifies required programs and the relationship among each
program include input, output and database specifications
IMPLEMENTATION PHASE
The system must be tested to make sure all programs work together in the
system before deliver to user. Consists four types of tests :
a. Unit Test - verifies each individual program or object works by itself.
b. System Test - verifies that all programs in an application work together
properly.
c. Integration Test - verifies that an application works with other
applications.
d. Acceptance Test - performed by end-users and checks the new
system to ensure that it works with actual data.
103
3. Trains Users
Training involve showing users exactly how they will use the new hardware
and software in the system. Users should practise on actual system during
training and provided user manual for references. The way to train user:
a. One-on-One Session (involve only two people)
b. Classroom Style - hands-on classes
c. Web Based Training - which is self-directed, self-paced online
instruction method
d. Pilot conversion, only one location in the organization uses the new
system — so that it can be tested. After the pilot site approves the
new system, other sites convert using one of the other conversion
strategies.
104
Figure 6.4: Converting Strategies
MAINTENANCE PHASE
105
3. Evaluate System Security
Activity 6.1
P-
A-
D-
I-
M–
106
3. Discuss the task below and present to class.
Planning Phase
1. What is the factor that influence user or worker request to develop new
system?
2. Why existing system need to modified?
3. Why the requested system need to prioritize?
4. What is the factor that influence the project should be approved or rejected?
5. In your opinion, what the organization should be do if the skill of the worker is
not enough to develop a new system?
Analysis Phase
Recommend a solution
Design Phase
107
Implementation Phase
1. By using one system as an example (eg : e-matris). Explain how the system
is test by using four types of test
2. Discuss advantages and disadvantages for each ways for training users
3. Explain each of the conversion method and list down advantages and
disadvantages for each type of conversion
Maintenance Phase
(a) Determine the System Developement Life Cycle (SLDC) phase based on the following
activities:
Activities SDLC Phase
(i) Writing the actual code
Based on the scenario, describe one (1) activity for each of the phases in SDLC.
108
CHAPTER 7
Programming
Programming Language
Several hundred programming languages exist today. Each language has its own rules or
syntax, for writing the instructions.
Programming Paradigm
● Procedural
● Object oriented
● Logic
109
Procedural
Programmer identifies the major function of a program called the main module and the main
module is divided into smaller modules.
Object Oriented
An object is an item that can contain both data and the procedures that read or manipulate
that data. An object represents a real person, place, event or transaction.
Major benefit of OOP is the ability to reuse and modify existing object. For examples
system developer create an Employee object, it is available for use by any other existing or
future program. Thus, system developers repeatedly reuse existing object. For example
payroll program. And health benefit program both would use an employee object.
Programming languages that support OOP paradigm likes Java, C++ and latest version
of of Visual Basic.
Logic
Rules are written as logical clauses with a head and a body; for instance, "H is true if B1, B2,
and B3 are true." Facts are expressed similar to rules, but without a body; for instance, "H is
true."
110
Translator
Translator is a program that translate programming source code into machine language.
Consists three types of translator that is assembler, compiler and interpreter.
Assembler
Use to convert the assembly language sources program into machine language.
Assembly language is the second generation of programming languages, a programmer
writes instructions using symbolic instructions code. Symbolic instructions code are
meaningful abbreviation. For examples, A for addition, C for compare, L for Load and M for
multiply.
Compiler
A compiler is a software program that converts entire high-level source code into into
machine language. The machine language version that results from compiling the procedural
language is called the object program or object code. The compiler store the object program
on storage media for execution later.
While it is compiling the source program into the object program, the compilers checks
the source program for errors. The compilers then produces a program listing helps the
software developer make necessary changes the to the sources code and correct errors in
the program.
A compiler convert the source program into a machine language object program
111
Interpreter
Translate and executes high level source code into machine codes line by line. An
interpreter reads and instruction, convert it to one or more machine language instructions, and
then executes those machine language instructions. It does this all before moving to the next
instruction in the program. Each time the source program runs, the interpreter translates and
executes it, instruction by instruction. An interpreter does not produce an object program.
With an interpreter , one instructions of the source program at a time is converted into
machine language and then immediately executed by the computer or mobile device.
112
Activity 7.1
113