Mms 101 - Course Module
Mms 101 - Course Module
Technology
Eliezer A. Albacea
Apart from any fair use for the purpose of research or private study,
criticism or review, this publication may be reproduced, stored
or transmitted, in any form or by any means
ONLY WITH THE PERMISSION
of the author and the UP Open University.
Table of Contents
Module 1 Introduction, 1
Objectives, 1
What is Information Technology?, 1
What is a Computer and Computer Science?, 3
What is Telecommunications Technology?, 5
Evolution of Computing and Computing Machines, 5
Evolution of Digital Computers, 9
First Generation (1939-1954): Vacuum Tube, 10
Second Generation (1954-1959): Transistor, 14
Third Generation (1959-1971): Integrated Circuits, 15
Fourth Generation (1971-Present): Microprocessors, 17
Types of Computers, 20
Module 2 Computer Systems Organization, 25
Objectives, 25
Processors, 25
Execution of instruction, 29
Memories, 30
Random access memory, 31
Read-only memory, 33
Memory caches, 34
Magnetic disks, 35
Optical memories, 36
Other secondary memories, 38
Flash memory, 39
Input/Output System, 40
Switches and lights, 41
Keyboards, 41
Video displays, 45
Cursor-tracking devices, 47
Printers, 48
Other input/output devices, 52
Computer Buses, 52
Bus operation, 54
Bus addressing, 54
Example of address decoding, 55
Bus synchronization, 56
Bus contention and arbitration, 56
Module 1
Introduction
Objectives
At the end of the module, you
should be able to:
1. Define and discuss
information technology,
computer technology
and telecommunication
technology; and
2. Trace the evolution of
computers.
request of a client then sends back its reply to the ATM instructing the
ATM what to do. For example, if the client wants to withdraw some money,
then this information is sent to the main computer that debits from the
account of the client the amount he wants to withdraw. Then, the main
computer instructs the ATM to release an amount equivalent to the amount
being withdrawn by the client.
Another example is the mailing system in the Internet. Suppose one wants
to send (sender) an electronic mail to another person (receiver)
geographically located somewhere else. The system allows a user to enter
his mail through a local computer. Then, the local computer sends the
message via communication lines to the computer where the account of
the receiver resides.
Information technology, however, is a very wide area of study. It includes
but is not limited to the following:
1. Internet - World Wide Web, E-commerce technologies
2. Virtual environments - virtual reality, virtual reality technologies
3. Artificial Intelligence - artificial life, computer vision, speech recognition
and synthesis, natural language processing, fuzzy logic, neural
networks, expert systems, robotics
4. Multimedia
5. Gaming
6. Agent technologies
7. Object technologies
8. Geographic Information Systems
Activity 1-1
E-commerce or electronic commerce is the purchasing, selling, and
exchanging of goods and services over computer networks (such
as the Internet) through which transactions or terms of sale are
performed electronically.
Argue that this application is an Information Technology
application by illustrating that this involves the creation, storage,
exchange, and use of information.
UP Open University
Module 1
UP Open University
compute the
99
Activity 1-2
Which of the following involved computers?
a.
b.
c.
d.
e.
f.
Cell phone
A programmable washing machine
Transistor radio
PlayStation 2
Airplane Black Box
Airline reservation system
UP Open University
Module 1
Activity 1-3
Which of the following involved telecommunication technology?
a.
b.
c.
d.
e.
Cell phone
A programmable washing machine
PlayStation 2
Airplane Black Box
Airline reservation system
UP Open University
The oldest surviving counting board, though, is the Salamis tablet, used in
Babylonia circa 300 BC., discovered in 1899 on the island of Salamis. It is
a slab of marble marked with 2 sets of eleven vertical lines (10 columns), a
blank space between them, a horizontal line crossing each set of lines and
Greek symbols along the top and bottom.
The abacus as we know it today, appeared circa 1200 A.D. in China. In
Chinese, it is called suan-pan. Beginning in about 1600 A.D., use and
evolution of the Chinese abacus was begun by the Japanese via Korea. In
Japanese, the abacus is called soroban. It is thought that early Christians
brought the abacus to the East.
Activity 1-4
The first computing device was _____.
a.
b.
c.
d.
Chinese abacus
Japanese abacus
Salamis tablet
Korean abacus
The Numeral Zero (650 AD). The Hindus invented the written zero that
led to the development of written decimal arithmetic. The Hindu people
in India invented a written symbol for zero, an essential step to doing
written calculations. The concept of zero and place values was integral to
the use of the abacus (a zero value was represented by a bead in the down
position), but, before a symbol zero was introduced by the Hindus there
could be no real decimal arithmetic calculation in writing.
The First Standard Mathematics Textbook (830 AD). The Indian
mathematics spread to the Arabs. In 830 AD a Persian scholar named
Mohammed Ibn Musa Abu Djefar wrote a standard textbook on the subject
mathematics. He was known as Al Khwarismi and the subject of his book
was Al Gebr Wel Mukabala or Algebra for short. An example calculation
from the Algebra book is:
6X2 + 60 + 12 = 2X2 + 36x
4X2 + 72 = 36x
which is clearly an algebraic equation.
UP Open University
Module 1
Activity 1-5
Match:
__ 1. The numerical zero was
invented in ____
__ 2. The book on algebra was
invented in ____
a.
b.
c.
d.
Persian
830 AD
650 AD
Hindus
Activity 1-6
True or False.
______ When using Napiers Bones, one needs to memorize
something.
UP Open University
The Slide Rule (1621 AD). The slide rule was invented by William Oughtred
in about 1621. The slide rule is based on Napiers ideas about logarithms it has logarithmic scales that can be slid past each other to allow
approximations to multiplication to be carried out quickly and easily. It
consists of at least two divided rules or scales, namely: a fixed outer pair
and a movable inner one. It has a movable sliding window cutting across
the rules. The slide rule is primarily used for multiplication, division and
scientific functions like taking the roots and logarithms. It does not
generally perform addition and subtraction.
The Calculating Clock (1623 AD). The calculating clock is the first real
machine that was designed by Wilhelm Schickard in Germany. It is
considered a real machine because it is gear driven. It was called the
calculating clock and was based on Napiers logarithms but this time they
were etched on rotating cylinders with gears in a large machine housing.
The machine could add, subtract, multiply and divide.
The Pascaline (1642 AD). The Pascaline was invented by Blaise Pascal in
1642. This device is a gear-driven one-function calculator. The device is
able to add two decimal numbers. Using tens complement it is also possible
to subtract. Example: 65 - 27 can be computed as 65 + 73 without carry,
where 73 is the complement of 27.
The Leibniz Wheel (1673). The Leibniz Wheel is the first general-purpose
calculating machine invented by Gotfried von Leibniz in Germany. Leibniz
improved the Pascals design by operating using a cylinder of stepped
teeth instead of using interconnected gears. The Leibniz wheel is a fourfunction (addition, subtraction, multiplication and division) calculator.
Activity 1-7
Which of the following is the first real machine for computation?
a.
b.
c.
d.
Slide rule
Calculating clock
Leibniz wheel
Pascaline
The Jacquard Loom (1801). The industrial revolution (mid 1700s) brought
about advances in the weavers loom that allowed it to use a system of
punched cards to program patterns of colors in woven fabric. Joseph Marie
Jacquard invented a power loom with an automatic card reader.
UP Open University
Module 1
Activity 1-8
True or False.
______ The analytical engine of Charles Babbage is a machine
based on the concept of stored information.
UP Open University
UP Open University
Module 1
11
Activity 1-9
Match
___ 1. Invented the light bulb
a. Lee de Forest
b. Thomas Edison
___ 2. Produced the first rectifier to c. John Ambrose Fleming
Edison effect
___ 3. Invented the Audion
Using vacuum tubes, John V. Atanasoff in 1937 designed the first digital
electronic computer and in 1939, Atanasoff and Clifford Berry
demonstrated the Atanasoff-Berry Computer (ABC) prototype.
The ABC was the worlds first electronic digital computer. The ABC was
built by John Vincent Atanasoff and Clifford Berry of Iowa State University
during 1937-42. It incorporated several major innovations in computing
including the use of binary arithmetic, regenerative memory, parallel
processing, and separation of memory and computing functions.
Konrad Zuse in Germany and in 1941 developed in secret the Z3. The
Z3s architect was a German engineer called Konrad Zuse, who developed
his first machine, the Z1, in his parents living room in Berlin in 1938.
Although based on relays, the Z3 was very sophisticated for its time; for
example, it utilized the binary number system and could perform floatingpoint arithmetic.
Across the Atlantic a major need for supporting the war effort was to
decrypt the intercepted messages of the German forces. Encrypted in the
early years using the US designed ENIGMA (The Enigma is a complex
mechanical encoder used by the Germans and they believe it to be
unbreakable), a team at Bletchley Park halfway between Oxford and
Cambridge Universities, including Alan Turing, built a series of machines
culminating in 1943 with Colossus.
UP Open University
Activity 1-10
The first electronic digital computer is ___.
a.
b.
c.
d.
Z1
Z3
Atanasoff- Berry Computer
Colussus
Activity 1-11
True or False.
____ Howard Aiken is the developer of Harvard Mark I and III.
UP Open University
Module 1
13
Activity 1-12
Match
__
__
__
__
1.
2.
3.
4.
Developer
Developer
Developer
Developer
of Atlas
of MESM
of UNIVAC
of SSEM
a.
b.
c.
d.
Remington Rand
SA Lebedev
William Norris
University of Manchester
In 1953, the first 23 SAGE (Semi-Automatic Ground Environment) aircraftwarning stations were built, each with two 55,000-tube computers built
by IBM, MIT and Bell Labs. The stations were connected to form a network
and SAGE during the 1950s pioneered the development of the modem
and graphics display. The SAGE system is a semi-automatic surveillance
and early-warning air defense network, involving military personnel
stationed at air, sea, and land radar stations, computer-based information
processing centers, aircraft and missile bases, weather stations, and air
route traffic control centers. Its task is to detect, track, identify, intercept,
and destroy enemy aircraftfunctions not unlike tracking, intercepting,
and hitting a tennis ball.
UP Open University
Activity 1-13
True or False.
_____ The SAGE system is a semi-automatic surveillance of extra
terrestrial objects.
Activity 1-14
Which of the following is not involved in the discovery of
transistors?
a.
b.
c.
d.
William Shockley
John Brattain
John Bardeen
Walter Brattain
UP Open University
Module 1
15
Tom Watson, Jr. led in 1953 IBM to introduce the model 604 computer, its
first with transistors, that became the basis of 608 model in 1957, the first
solid-state computer for the commercial market.
IBM introduced in 1955 the IBM 702 business computer.
In 1956, Bendix G-15A small business computer sold for only $45,000,
designed by of NBS.
General Electric Corporation in 1959 delivered its first Electronic Recording
Machine Accounting (ERMA) computing system to Bank of America in
California, the ERMA system employed Magnetic Ink Character
Recognition (MICR) as the means to capture data from the checks and
introduced automation in banking that continued with ATM machines in
1974.
Activity 1-15
Match
__ 1.
__ 2.
__ 3.
__ 4.
a. National Bureau
of Standards
b. General Electric
Corporation
c. IBM
d. Bank of America
UP Open University
Activity 1-16
True of False.
______ Jack Kilby used silicon for the semiconductor material in
his chip.
The first commercial product using IC was the hearing aid and this was
done in 1963.
IBM announced in 1964 the System/360 all-purpose computer, using 8bit character word length (called byte).
DEC in 1968 introduced the first mini-computer, the PDP 8; named after
the mini-skirt.
In 1971, Intel produced the large-scale integrated (LSI) circuits (100+
components in one chip).
Activity 1-17
True or False.
____ The first commercial product using IC was the hearing aid.
UP Open University
Module 1
17
Activity 1-18
The first to apply for a patent for microprocessor is ____.
a.
b.
c.
d.
Hoff
Mazor
Faggin
Hyatt
UP Open University
Year
1971
1972
1974
Microprocessor
Number of
Transistors
2,300
3,500
6,000
1978
1982
134,000
275,000
1.2 million
3.1 million
7.5 million
1985
1989
1993
1997
UP Open University
Module 1
19
continuation
Year
Microprocessor
Number of
Transistors
1999
1999
9.5 million
42 million
2000
initial version
has 7.5 million
transistors but
the latest
version has
44 million
transistors
Activity 1-19
Match
1. Intended for the value PC market
2. Allows the creation of professional-quality
movies
3. First commercially available micro-processor
4. Can run all the software written for its
predecessor
5. Incorporates Intel MMX
6. Used in the personal computer Altair
7. Also known as Intel 586
a.
b.
b.
c.
d.
e.
f.
g.
4004
80286
80286
Pentium
Celeron
Pentium II
Pentium 4
8080
UP Open University
Activity 1-20
In the evolution of computers, one will notice that the technology
goes from big components to small components. In Pentium 4, for
example, packed in one microprocessor chip are 42 million
components or transistors. Will this trend of making the
components smaller and smaller ever end? When will it end?
Types of Computers
Up until the late 1980s, computers were classified as a mainframe, a
minicomputer or a microcomputer. The classification is actually based on
the number of users using the computer at a time.
A mainframe computer is a centralized computer capable of serving large
numbers of users at the same time. In the 1970s, the large number users
simply submit their jobs to the mainframe computer for processing. That
is, the system is not interactive. However, later users can interact with the
computer through dumb terminals. The number of users is large and may
number to more than 200 users at a time. Mainframe computers are large
computers that usually fill a room. Examples of applications running in
this type of machines are Automatic Teller Machines (ATMs) and airline
reservation systems.
A minicomputer, on the other hand, is a smaller less powerful version of
a mainframe. The lower processing power and storage capacity means
that minicomputers cannot handle more users. Hence, the capacity of
minicomputers is good only from 4 to 200 users at a time. They are
obviously less powerful than a mainframe but more powerful than
microcomputers. The size of a minicomputer is smaller that it can take up
one or few cabinets. Typical applications are office systems with at most
200 employees.
UP Open University
Module 1
21
Activity 1-21
A type of computer that can be accessed by one user at a time is
___.
a.
b.
c.
d.
Mainframe
Minicomputer
Microcomputer
Supercomputer
UP Open University
Activity 1-22
True or False.
____ A mainframe can also served as a server.
Activity 1-23
What are the characteristics of laptops that make them suitable to
be called mobile computers?
UP Open University
Module 1
23
smartphone
PDA
cell phone
handheld game console.
Activity 1-24
Match
___ 1. Will fit in your desk.
a.
___ 2. A small mobile computer
b.
capable of the same tasks
c.
as desktops
d.
___ 3. Pocket-size mobile computing
device
___ 4. Small portable computer
designed for wearing on the body
wearable computer
handheld device
laptop
desktop
UP Open University
Module 2
Computer Systems
Organization
Processors
Objectives
At the end of this module,
you should be able to:
1. Explain the fetchdecode-execute cycle of
instruction execution;
2. Identify the different
components of the CPU
and describe their
functions;
3. Explain the roles of the
different types of
memories, input/output
systems and buses that
may be present in a
computer system; and
4. Identify the other
peripheral devices that
may be used in a
computer system.
Activity 2-1
It is desirable to have a large set of registers in a computer. Why?
What is the advantage of a computer with a large set of registers
over that of a computer with a small set of registers?
Module 2
27
Activity 2-2
Match
____ 1. The register that holds the address
of the next instruction to be executed
____ 2. The resister that holds the instruction
Currently being executed
a.
b.
c.
d.
MAR
MDR
IR
PC
UP Open University
code bits are often called the condition-code register; this takes the place
of the individual status bits.
Finally, let us look at the control unit. While the CPU is executing the
current instruction, the PC points to the next instruction to be executed.
The job of the control unit is to control the machine cycle (fetch-decodeexecute cycle), which in a very simple computer can be summarized as:
1. Fetch from memory the next instruction to be executed, place this in
the IR, modify the PC to point to the next instruction to be executed.
2. Decode and execute the instruction just fetched.
As mentioned, only the simplest computer operates in this manner. In
reality, the machine cycle is more complicated than this.
The control unit generates the control signals that regulate the computer.
Normally, the control unit may send microorders, individual signals sent
over dedicated control lines, to control individual components and devices.
An example is the control signal that sets or clears the status flags (or
condition-code register). Such signal may be needed, for example, to carry
out a CLEAR CARRY instruction.
There are basically two types of control units: microprogrammed and
conventional (hardwired). In microprogrammed control, the sets of control
signals for each step of each instruction are stored in an internal memory
called the control store. An address within the control store is computed
from the instruction and the step counter. The appropriate set of control
signals is then read from the control store into the various lines of the
processor. This leads to a very flexible arrangement. This is because the
instruction set of the processor is changed by changing the contents of the
control store. In a conventional control, on the other hand, the control
mechanism is a combinational circuit which simply decodes its inputs
and produces the appropriate set of control signals for each step.
Activity 2-3
True or False.
_____ The control units controls the operations of the whole
computer system including the operations of the CPU, the
memory and the I/O systems.
UP Open University
Module 2
29
Execution of instruction
Earlier, we have shown the machine cycle of a simple computer. Basically,
it is composed of three major steps: fetch, decode and execute. The cycle
starts with an instruction being fetched from memory. The fetch part can
actually be decomposed into several steps:
1. Initiate the reading of the memory location pointed to by the PC. Then,
feed the PC into the ALU and the ALU sets it up so that the PC points
to the next instruction to be executed. When the instruction does not
involve a jump, then the PC is simply incremented by the size of the
instruction; otherwise the location of the jump will be used to set the
PC.
2. The modified value of the PC is transferred back to the PC register.
3. Initiate a data read of the instruction from memory. The processor
then waits for the memory read to finish. The data read from memory
is transferred to the IR.
Once the instruction is in IR, the decode step starts. Here, the decoding
circuitry attached to the IR sets the sequence of events for the execution of
the instruction. That is, the instruction is translated into a sequence of
microinstructions that can be handled by the control unit and the ALU.
For example, suppose we have the instruction: ADD R1, R0 (add the
contents of the memory location whose address is in R0 to register R1).
This will be translated to the following:
1. Transfer the value of R0 to MAR. Then, read using the address in
MAR.
2. Transfer the value of R1 to the ALU input register. Wait for the memory
read in (1) to finish.
3. Take the value in the MDR. Add this to the contents of the ALU input
register.
4. Take the result from the ALU output register and then place it in R1.
After this sequence of instructions has been set by the decoding circuitry,
the CPU is instructed to start executing these microinstructions. It should
be made clear that the decoding circuitry will usually produce a unique
sequence of instruction for each instruction in the instruction set of the
computer. Hence, we can see that a computer with many instructions
will usually have a more complex circuitry than a computer with very
few instructions.
UP Open University
Activity 2-4
A computer with more instructions is more expensive to construct
than a computer with less instructions. Explain why?
Memories
The memory is that part of the computer system where programs and
data are stored. In fact, in our discussion of the processor, we mentioned
that instructions are fetched from the memory. Hence, in our picture of a
program in execution, the program is actually found in the memory and
only the current instruction being executed is in the CPU.
The basic unit of memory is the binary digit called the bit. As we discussed
earlier, a bit may contain a 0 or a 1. Although a bit is the basic unit,
memories are composed of a number of cells (or locations) each of which
can hold an information. If a memory has m cells then they will have an
address 0 to m-1. All the cells of the memory have the same number of
bits. In most computers, the size of a cell is either equal to a byte or equal
to a word. If the cell size is equal to a byte, then the memory is said to be
byte-addressable; while if the size is equal to a word, then the memory is
said to be word-addressable.
Activity 2-5
When a location in memory that is associated with an address
contains 8 bits, then the memory is ____.
a.
b.
c.
d.
e.
Bit-addressable
Cell-addressable
Byte-addressable
Word-addressable
None of the above
UP Open University
Module 2
31
Activity 2-6
What is the size of the main memory of a computer that generates
32-bit addresses?
UP Open University
Activity 2-7
What is dynamic in dynamic RAM?
UP Open University
Module 2
33
Activity 2-8
Match
____ 1. RAM type where once information
are written it does not need to be
further addressed
____ 2. RAM type where a refresh circuit
Is required
a. video RAM
b. dynamic
RAM
c. static RAM
Read-only memory
Information in a writable memory is destroyed when the computer is
switched off. It is useful also to have read-only memory where the contents
are permanently fixed, and remain valid even with no power. Of course,
the information in ROM has to be written there at some stage. In a true
ROM, the content is built in at the time of manufacture. The data in a
ROM are inserted during manufacture, essentially by exposing a
photosensitive material through a mask containing the desired bit pattern
and then etching away the exposed (or unexposed) surface. In a
programmable ROM (PROM), it can be written under computer control,
but only once, and only under special conditions. An EPROM (E for
erasable) is a PROM whose contents, once written, can be erased and
written again. Erasure is usually done with ultra-violet light.
Whatever kind of memory is used, the bits are organized within the circuit
chip so that an address value can be fed in, and the value of the
corresponding word or byte then read or (if not ROM) written. An attempt
to write into read-only memory has no effect.
UP Open University
Activity 2-9
Information in ROM is considered permanent but not in EPROM.
Why is it impossible to change the information in a ROM?
Memory caches
The time required to access memory is the main limitation on the speed of
a processor. A technique sometimes used for making access to memory
faster is the use of a memory cache. This is a set of fast memory registers
into which are copied, in advance, those locations in main memory most
likely to be accessed in the near future. Most computers use a memory
cache, and it is estimated that 95% of memory accesses are found in the
cache. The rest must actually access main memory. A write into an address
held in the cache must also write through into the main memory, but not
necessarily immediately.
Normally, the memory is accessed by transferring data using the registers
MDR and the MAR through the bus. In a cache, this access mechanism is
replaced by a register-to-register transfer which is usually about 5 to 10
times faster.
When the CPU requests for data, it will request it as if the data is in memory.
In reality, however, the cache will be checked first if such data is there.
The memory will be accessed only after a CPU request when the requested
data is not buffered in the cache.
Activity 2-10
What makes a cache faster than an ordinary main memory?
UP Open University
Module 2
35
Magnetic disks
The magnetic disk is the most popular high-capacity secondary storage.
Magnetic disk technology essentially uses magnetic spots on a magnetized
disk. The presence of a magnetic spot represents a 1 and the absence of a
spot represents a 0. Information is recorded on a surface of a disk where
each surface is divided into a number of concentric circles, called tracks.
Typically a disk has several tracks per surface. The number of tracks/
surface of the disk may go up to a few hundreds. Tracks are further divided
into sectors, normally between 8 to 100 sectors. In a floppy disk for example,
single density disks have 8 sectors/track and double density disks have 9
sectors/track. However, the current floppy disks have 36 sectors/track.
To read the magnetic disks, computers are provided with a disk drive.
Each disk drive has a small special-purpose computer associated with it
called the disk controller. The controller helps to transfer information
between the main memory and the disk. To specify a transfer, the program
must provide information on the disk and surface numbers, the track
number, the sector number, the number of bytes to be transmitted, the
main memory address where the information comes from or goes to, and
whether the information is to be written or read.
Activity 2-11
True or False.
_____ Magnets are used to read magnetic disks.
Examples of magnetic disks are diskettes and hard disks are given. A
diskette is made up of a thin mylar plastic housed in a hard plastic case.
The most popular is the 3.5" diskette. A hard disk is a metal platter. Several
disks stacked together with space in between form a disk pack. The disk
pack is mounted on a disk drive mechanism that reads the constantly
rotating disk. An access arm accesses the data on the tracks. The access
arms fit in between each of the disk spaces and have read/write heads
that read the magnetic spots on the disk. The read/write head never
actually touch the disk. They float at a very very small distance from the
surface of the disk. Some hard disks are removable. Example of this is the
Zip drive. Zip drive is a drive that reads a removable hard disk. Removable
disk cartridges have faster access time than diskettes, but are slower than
hard disks. Finally, there is the redundant array of inexpensive disks
UP Open University
Activity 2-12
A hard disk access is faster than a floppy disk access. Why?
Optical memories
Optical memories uses laser technology to create tiny microscopic spots
on the disk surface and use this laser to read from the disk. By reflecting
light off of the disks surface the system can read the binary digit. If there
is no reflection from the light, meaning that the light was shone on a spot
(sometimes called the pit), it is read as 0, if there is a reflection, meaning
that the light was shone on area without a spot (sometimes called the
land), it is read as 1.
Optical disks started mostly as read-only. They are recorded on the disks
by the vendor and cannot be altered or erased. This type of disks are
popularly called write once and read many (WORM) media. One very
popular example of WORM media is the CD-ROM (Compact Disk - Read
Only Memory). A CD-ROM drive is needed to read a CD-ROM. The
technology used for CD-ROM is similar to the technology used in audio
CD. This is the reason why one can listen to an audio CD in a CD-ROM
drive.
Activity 2-13
True or False.
_____ Infrared light is used in reading an optical disk.
UP Open University
Module 2
37
Activity 2-14
Which optical disk storage is not writable?
a. CD-ROM
b. CD-R
c. CD-RW
d. CD-W
e. None of the above
UP Open University
Finally, there is the Digital Video Disk (DVD) ROM. A DVD-ROM disk is
very similar to CD-ROM disk with much more capacity. The capacity is
up to seven times more than the CD-ROM capacity. DVD-ROM was
originally used to store digital video data. But recently, it has been used to
store data manipulated by computers. This is the reason why DVD is
sometimes called Digital Versatile Disk.
A DVD-ROM is of the same diameter and thickness as a CD-ROM, and it
is made using some of the same materials and manufacturing methods.
Like a CD-ROM, the data on a DVD-ROM is encoded in the form of small
pits and lands in the track of the disk. A DVD-ROM can store more data
because the pits and the lands are much closer than in a CD-ROM and
the spiral track is much closer too. Besides a DVD-ROM may have multiple
layer storage. As in CD, there is also a DVD-Recordable disk and a DVDReWritable disk.
Activity 2-15
Why do DVD-ROMs have more capacity than CD-ROMs?
UP Open University
Module 2
39
heads. Each head can read/write on one track. Hence, we can see that
the tracks are circles running on the outside surface of the drum. The
tracks, therefore, are of the same radius all throughout.
Activity 2-16
Magnetic tapes are highly unreliable. Why?
Flash memory
Most secondary memory storage devices like magnetic disks, optical
memories, magnetic drums and magnetic tapes all operates with moving
parts. Hence, these secondary memory devices operate mechanically and
are very slow when it comes to accessing information from them. On the
other hand, random access memory is implemented using integrated
circuitry hence they operate without moving parts or access of information
is done fully electronically. Hence, accessing information from random
access memory is much faster. The only problem with random access
memory is that information is stored only while power is applied to it.
Once power is gone, all information stored in it is also gone.
A flash memory (also popularly known as a memory stick) combines the
advantages of these two memory storage devices. A flash memory operates
in fully electronic fashion but its content is not erased when power is
gone. In particular, a flash memory is actually a type of erasable
programmable read only memory (EPROM). Thus, it is not only read only
but it can be rewritten as many times as you like for a duration of usually
ten years. Normally an EPROM allows erasure or rewriting in one location
at a time. This is speeded up by flash memory by allowing the device to
read or write at different locations at the same time. Hence, the use of the
word flash in flash memory.
UP Open University
Activity 2-17
True or False.
______ A flash memory is type of erasable programmable read
only memory.
Flash memories just like magnetic disks may be inserted and taken out of
the computer by the user as he wishes. Normally, a flash memory is inserted
in the Universal Serial Bus (USB) port of your computer.
Before their use as secondary memories for computers, flash memories
were popularly used in battery-powered devices like mobile phones,
personal digital assistants (PDAs), MP3 players and digital cameras.
Activity 2-18
Explain how the flash memory got the adjective flash before its
name.
Input/Output System
A vital component of the computer system is the I/O system. This is the
set of I/O devices in the system, including both physical I/O devices and
I/O interface devices. Physical I/O devices are those that actually perform
I/O such as keyboards, line printers, and video displays. These parts of
the system are necessary as it is through these devices that humans
communicate with the computer and for computers to communicate its
responses to humans.
UP Open University
Module 2
41
Keyboards
The keyboard is an input device that is used mainly for providing computers
with textual input. A typical keyboard has four types of keys, namely:
typing keys, numeric keypad, function keys and control keys.
The typing keys section of the keyboard is where the letter keys are found.
The normal layout of the letter keys is adopted from the layout used by
typewriters. This layout of letter keys is known as the QWERTY layout.
The arrangement of the keys in the QWERTY layout was deliberately made
awkward in order to slow down fast typist. The reason that typewriter
manufacturers did this was because the mechanical arms that imprinted
each character on the paper could jam together if the keys were pressed
too rapidly. Jamming of the mechanical arms, however, is not an issue
anymore in computers. That is why, critics of the QWERTY layout pushed
forward another layout called the Dvorak layout. In this layout, the most
commonly used letters are placed in the most convenient position.
UP Open University
Num
Lock
Home
PgUp
End
PgDn
0
Ins
Enter
.
Del
UP Open University
Module 2
43
The function keys, arranged in a line across the top of the keyboard, could
be assigned specific commands by the current application or the operating
system. Control keys provided cursor and screen control.
F1 F2 F3 F4 F5 F6 F7 F8
Home
End
Insert
Delete
Page Up
Page Down
Insert
Home
Page
Up
Delete
End
Page
Down
Control (Ctrl)
Alternate (Alt)
Escape (Esc)
UP Open University
Activity 2-19
The part of the keyboard where the letter keys are found.
a.
b.
c.
d.
e.
Typing keys
Function keys
Numeric keypad
Control keys
None of the above
How does the keyboard work? Underneath the keys is a key matrix that is
basically a grid of circuits. Each circuit is broken at the point just below a
specific key. When you press a key, the broken point below is connected
to each other allowing a tiny amount of current to flow through. A small
processor is provided each keyboard and the job of this processor is to
monitor the key matrix for signs of continuity at any point on the grid.
When the processor finds a circuit that is closed, it simply compares the
position of this with the corresponding position in the character map. The
corresponding position in the character map will produce the code for
the character. The character map usually resides in the Read Only Memory
of the processor. Note that the user may press more than one key, e.g.
Shift key plus the letter A. The keyboard still behaves the same way, i.e. it
detects which points in the grid are closed and check this with the character
map.
Activity 2-20
Why does the key map usually reside in the Read Only Memory of
your computer?
UP Open University
Module 2
45
Video displays
The most common output device used for communicating from computer
to human beings is a display screen. There are two important types of
display in terms of how the information to be displayed is represented.
1. a character display, where a stream of character codes is sent to the
display, and is transformed by the device into patterns making up the
shape of the characters on the screen. This form of display is inflexible,
but is suitable for use when the display is remote from the computer,
because a comparatively small amount of information needs to be
transferred.
2. a bit-map graphics display, where a large section of memory is
dedicated to representing the display. The display is broken up into
dots or pixels with one bit representing each dot. Changing memory
automatically changes what is on the display. The display of characters
requires that the bit patterns making up the shape of the character be
put into the appropriate memory.
Activity 2-21
True or False.
______ A character display can display all patterns that can be
displayed by a bit-map graphics display.
In terms of technology used, video display falls into two categories: Cathode
Ray Tubes (CRTs) and Liquid Crystal Displays (LCDs).
1. The CRT is probably the most ubiquitous electronic display device
because it is at the heart of every television set. Beams of electrons
(cathode rays) from three electron guns are fired through a shadow
mask. This shadow mask is a sheet of metal with regular apertures
which focus the beam to strike phosphor dots on the screen surface.
There are three types of phosphor, as there are three electron guns,
one for each primary color - red, green and blue. When phosphor is
struck by the electron beam from its gun, it emits its characteristic
color. The strength of the emission (luminance of the phosphor) is
proportional to the power of the beam and the combination of the
three phosphors at their different intensities produces the color of the
UP Open University
Activity 2-22
Explain further how color LCDs operate.
UP Open University
Module 2
47
Cursor-tracking devices
These provide for the input of 2-dimensional positional information. There
are many varieties, e.g. joysticks, light pens, mice, trackballs, touch pads
and graphics tablets.
The most popular of these cursor-tracking devices is the mouse. The main
objective of the mouse is to translate the motion of your hand into signals
that can be used by the computer in order to move the cursor to a desired
position. At present, there are two types of mouse in existence, namely:
the optomechanical mouse and the optical mouse.
The optomechanical mouse uses a ball inside the mouse that touches the
surface of a desktop and that rolls when the mouse moves. Inside the
mouse are two rollers that touch the ball. One of the rollers is oriented to
detect motion in the horizontal direction and the other roller detects motion
in the vertical direction. Each roller is connected to a shaft that spins a
wheel with holes near the outer circumference. When the roller rolls, the
shaft and the wheel spin. On one side of each wheel there is an infrared
light emitting diode (LED) and on the other side of each wheel there is an
infrared sensor. The holes in the wheel break the beam of light coming
from the LED so that the infrared sensor sees pulses of light. The rate of
the pulsing is directly related to the speed of the mouse and the distance it
travels. An on-board processor chip is found in the mouse that is
responsible for catching the rate of pulsing and converts this to speeds
and distances. The chip catches the pulses and converts these to binary
data that is understood by the computer. The chip then sends the binary
data using the mouse cord.
Activity 2-23
Which light emitting diode is used by optomecahnical mouse?
a.
b.
c.
d.
e.
UP Open University
The optical mouse, on the other hand, uses a camera that takes 1,500
pictures per second. The mouse has a red light emitting diode (LED) that
emits light and bounces this on the surface of a desktop to a complimentary
metal oxide semiconductor (CMOS) sensor. The CMOS sensor sends each
image to a digital signal processor (DSP) for analysis. The DSP, operating
at 18 MIPS (million instructions per second), is able to detect patterns in
the images and see how those patterns have moved since the previous
image. Based on the change in patterns over a sequence of images, the
DSP determines how far the mouse has moved and sends the
corresponding coordinates to the computer.
Activity 2-24
An optomechanical mouse is prone to malfunction due to the
accumulation of dirt while an optical mouse is not. Explain why.
Printers
Printers are used for hard-copy output of text and graphics. Methods for
the production of the printed image vary. There are several categories:
1. Movable type - A drum, chain or wheel of type is moved so that each
character can appear over the print position. At the appropriate time,
a hammer strikes the paper against the type, and an ink ribbon prints
the required symbol.
2. Dot matrix - The symbols are built up as they are printed from patterns
of dots. The printing itself may be done mechanically with an ink ribbon,
by charging the paper electrostatically for later development, or by
propelling ink droplets under the control of electrostatic fields.
UP Open University
Module 2
49
Activity 2-25
Dot matrix printers are sometimes called noisy printers. How is
this noise generated by dot matrix printers?
UP Open University
Each nozzle or jet is smaller in size than a human hair. Each nozzle is
provided with a heater or resistor that heats and cools the ink inside
the cartridge. When the ink is heated, a bubble forms. When the heat
source is removed, the bubble bursts sending dots of ink on the page
through the 48 nozzles. These dots form the print characters on the
page.
Such devices are capable of producing good quality, low-cost color prints
quickly and quietly, and at a very low cost. The main disadvantage is that
colors can look muddy or washed out because of inks mixing at dot
edges.
Activity 2-26
The documents produced by inkjets can look muddy or washed
out. Why is this so?
4. Thermal wax - This technology uses a thermal print head to melt wax
from a possibly multicolored ribbon on to the paper. Due to the
elimination of the flow of ink over dot edges, the picture produced is
sometimes grainy but the color quality is superb.
5. Die sublimation - Die sublimation printers also use colored ribbons
and thermal print heads. However, instead of melting the ink on to
the paper the print head vaporizes the ink which then condenses on
to special paper very close to the ribbon. In this method, the size of the
dots can be controlled and the primary colors can be blended together
better.
6. Laser printers - This works by using a laser and a photosensitive or
photoconductive drum to place electrostatic charges on the paper
corresponding to the printing positions: when the paper is taken
through a toner reservoir the magnetically-charged toner is attracted
to the paper as dust and is later head-bonded to fix it. The results are
images that are indistinguishable from photographs.
UP Open University
Module 2
51
Activity 2-27
Laser printers are using technology very similar to photocopying
machines that use toners. Explain the similarity.
7. Plotters - These devices are usually used for graphical output. A plotter
may be using a pen or electrostatic. This is often used for very large
printouts of few texts and with very limited color range.
UP Open University
Activity 2-28
Match
___ 1. A hammer containing the
pattern of the character strikes on
the paper with the ribbon in
between
___ 2. The pattern to be printed are built
from pattern of dots
a. inkjet
b. laser printer
c. plotters
d. dot matrix
e. die sublimation
f. thermal wax
g. movable type
Computer Buses
Most computers are built around a bus that is simply a set of wires or lines
to which the components of the computer (processor, memory, I/O devices,
etc.) are connected. In this section, we discuss the different types of buses
UP Open University
Module 2
53
and how the size of the bus can affect the size of the address space. Also,
the size of the bus is one of the factors that affect the speed of I/O operation
in the system. Hence, it is important to look at how information is being
handled in the bus.
The bus lines can be divided into four groups:
1. The data bus carries items of data from one component to another.
The number of lines is usually equal to the number of bits in a word.
2. The address bus carries addresses. Its size determines the size of the
address space of the computer. The address space is the total number
of memory locations defined in the memory. In a byte-addressable
memory, this is the total number of bytes in the memory, while in a
word-addressable memory it is the total number of words. Small
computers usually have a 16-line address bus, giving a 64K address
space.
3. The control bus carries signals which coordinate the components of
the computer. On small systems about 12 lines are required.
4. The power bus carries power at various voltages to the components of
the computer.
Each line in the data, address and control buses represents a bit, and can
be in either the low or high logic state. Normally, only one device at a
time may determine the state of a line, but any number of devices at a
time can sense it.
Activity 2-29
The bus that carries signals which coordinates the components of
the computer is the ____.
a.
b.
c.
d.
e.
Data bus
Address bus
Control bus
Memory bus
None of the above
UP Open University
Bus operation
One of the devices attached to the bus, usually the processor, is the bus
master. It is the only device that can initiate activity on the bus. The other
devices are slaves.
For each transfer of information on the bus, the bus master is responsible
for identifying the transmitter (the device that will put the information on
the data bus) and the receiver (the device that will read the information
from the data bus). The bus master itself will be one of these, and the
other will be identified by its address being put on the address bus. The
direction of transmission (master slave or slave master) is determined
by the read/write control line.
For example, if the processor is reading from memory, then it is the master
and receiver, and the memory device is the slave and the transmitter. To
read the data stored at address A, the processor places the number A on
the address bus, and activates the read control signal (send signal using a
control bus); the memory responds by placing the contents of address A
on the data bus. To write a value V at address A, the processor places A
on the address bus and V on the data bus and activates the write control
signal (similarly, send signal using a control bus); the memory immediately
writes the value V in the specified location. Subsequent reading of address
A will now return the value V.
Activity 2-30
True or False.
____
Bus addressing
Devices attached to the bus are identified by addresses. By continually
monitoring the address lines, a slave can recognize its own address when
the bus master puts it in the bus. The slave must then act as either the
transmitter or receiver in a bus transfer, as determined by the read/write
control line.
UP Open University
Module 2
55
Some devices (e.g. memory units) have a range of addresses, and must
recognize any address in the range. The offset within the range identifies
a location within the device. The interpretation of bus addresses is called
address decoding.
Value of Lines
14
0
1
0
1
15
0
0
1
1
Position of Chip
First
Second
Third
Fourth
Activity 2-31
True or False.
____ Devices attached to the bus are identified by addresses.
UP Open University
Bus synchronization
The operations on the bus must be synchronized. For example, the slave
devices must respond to the address bus only when it contains a valid
address, not when it is in the process of changing. A receiving device
must not read the data bus until the transmitter has put the data there.
There are a number of approaches to this problem. The simplest is to
have a synchronous bus. In a synchronous bus, timing is controlled by a
clock control line carrying a signal from a common clock to all the devices.
Devices only look at the bus when the clock is high, leaving the low clock
periods for changes to the bus. Devices must be fast enough to make
changes to the bus within a low period and to respond to the bus within
a high period.
An asynchronous bus has no common clock, and devices can take their
own time for operations. There are various schemes or protocols for
providing synchronization, which is still necessary. The protocol for an
asynchronous bus with fully-interlocked transmission (also called
handshaking) is usually taken in more advanced courses in computer
organization.
Activity 2-32
Why is there a need to synchronize the operations of a bus?
UP Open University
Module 2
57
Activity 2-33
True or False.
The memory is the usual bus master.
UP Open University
Module 3
Systems Software
Activity 3-1
Differentiate systems software from applications software.
Activity 3-2
What are the advantages of having an operating system over a
system without an operating system?
UP Open University
Module 3
61
Activity 3-3
An operating system can be viewed as _____.
a.
b.
c.
d.
e.
Ordinary program
Resource manager
Program manager
Set of programs that executes in the system
None of the above
Activity 3-4
Why is it important that most of the operating system code is
memory resident?
UP Open University
Module 3
63
UP Open University
Activity 3-5
Match
____ 1. A service of an OS where
a.
the CPU is made to busy
b.
most of the time
c.
____ 2. A service of an OS where
d.
an interface between the
user and the computer is
provided
____ 3. A service of an OS where
processes are kept from
interfering with each other
____ 4. A service of an OS where
memory is managed primarily
to maximize the use of the CPU
memory management
protection and security
CPU management
command interpreter
UP Open University
Module 3
65
Activity 3-6
True or False.
Although, first generation operating systems are single-user, they
can be used by more than one programmer simultaneously.
3. Load the binary object of the program and initiate its execution.
With high-level languages, a considerable amount of time is clearly spent
setting up the job.
Attempts were made to reduce the job set-up time. Some of these attempts
were done by:
1. Hiring professional operators
2. Batching together similar jobs.
In the first solution, since a considerable amount of time is spent on loading
assemblers and loaders, less time is spent if the one doing this has experience
rather than leaving the said activities to programmers themselves. On the
other hand, by batching similar jobs, the loading of a particular compiler
can be minimized. For example, given a job request like
COBOL, FORTRAN, COBOL, FORTRAN, COBOL
will require the loading of the COBOL compiler three times and the
FORTRAN compiler twice. Rearranging the sequence to:
COBOL, COBOL, COBOL, FORTRAN, FORTRAN
will only need the loading of COBOL and FORTRAN compilers once each.
Later, automatic job sequencing and program loading were introduced.
These were achieved by creating a small program, called a supervisor,
whose function is to automatically load and transfer control from one
program to another. The supervisor program understood a certain
language called the job control language. This language contains
instructions like where to read the compilers, linkers, and loaders which
are needed by a particular user program. With this supervisor program,
together with the idea of waiting for a number of jobs (batch), form the
core of the early batch operating systems.
A variation of the early batch systems is a system where input and output
operations are done off-line. In this system, an inexpensive processor is
used to do input by transferring data and programs from card readers to
magnetic tapes. These input tapes are then transferred to the main
computer where processing occurs. Outputs of the processing are similarly
placed in an output tape, which as in the input operation are printed on
the line printer using another inexpensive processor. Throughput is
obviously improved since doing the input directly from a card reader and
the output to a line printer are much slower than doing it using magnetic
tapes.
UP Open University
Module 3
67
Activity 3-7
Batch processing is basically introduced to ___.
a.
b.
c.
d.
e.
UP Open University
Activity 3-8
By allowing time sharing, the response time of the system also
improves. Explain.
Module 3
69
viewed as one. Hence, a user sees just one system but in reality it is composed
of several computer systems. The facility that makes this single view of all
systems connected to the network is the distributed operating systems.
Only recently, global computing has become possible. The Internet has
essentially made each individual computer a component in a single global
computer system. We have now moved to a situation where each user
uses multiple computers at a time. In this set-up communication, rather
than CPU cycles, is the dominant cost.
Activity 3-9
Define the following operating systems:
1. Batch operating system
2. Multiprogramming operating system
3. Time-sharing operating system
4. Distributed operating systems
Current Trends
At present, there are two types of operating systems that dominate. These
operating systems are the UNIX systems and Windows System.
UNIX
UNIX was developed in the late 1960s by Ken Thompson and Dennis
Ritchie at AT&T Bell Labs.
UNIX is an operating system provided with facilities unique to itself only
during its introduction. It features multiuser and multitasking capabilities,
device independence, and what is known as a tools approach, and
portability.
UP Open University
Module 3
1.
2.
3.
4.
5.
6.
7.
71
Debian GNU/Linux
Fedora Legacy Linux
Gentoo Linux
Mandrake Linux
Red Hat Linux
Slackware Linux
SuSE Linux
Activity 3-10
Which of the following is not a feature of UNIX ?
a.
b.
c.
d.
e.
Windows
The Windows operating system was first developed by Microsoft in 1981.
It was then called Interface Manager. It was officially released in 1983.
The first version is Windows 1.0. Its major features are the following:
1. graphical user interface with drop-down menus;
2. cooperative multitasking of applications; and
3. device independent screen and printer graphics.
This was later extended to include overlapping windows. This went
through several modifications until Windows 95 and 98 were released.
These versions feature full pre-emptive multitasking, advanced file systems,
threading and networking.
The multiuser version of Windows is Windows NT. This was designed to
be used in network servers, workstations and software development.
Although the user interface of Windows 95/98 is similar to Windows NT,
the inner working of Windows NT is totally different. It features
1.
2.
3.
4.
Windows 2000 was released in 2000. The Windows 2000 server builds on
the strengths of Windows NT technology, integrating standards-based
directory, Web, application, communications, file and print services with
high reliability, efficient management, and support for the latest advances
in networking hardware. Windows 2000 features
1. Plug-n-Play: similar to Windows 98;
2 AGP Support: Accelerated Graphics Port, a new initiative by Intel;
3. USB & FireWire Support: Universal Serial Bus and 1394 IEEE highspeed interfaces;
4. DVD: Digital Video/Versatile Disk support, the successor to CD-ROMs;
5. Easier Migration: an upgrade path from Windows 95 to Windows
2000 included;
6. Disk Volume Management: An updated Disk Administrator tool; and
ATM Support: Native ATM support will be included with Windows
2000.
Lately, Windows XP was released. Windows XP, Microsofts first OS to
combine the Windows 9x code with the NT code, finally removing the
MS-DOS layer from under Windows 9x, was released October 25, 2001.
UP Open University
Module 3
73
Activity 3-11
Match
____ 1. The first version of Windows
____ 2. The multiuser version of
Windows
____ 3. Feature full pre-emptive multitasking, advanced file system,
threading and networking
a.
b.
c.
d.
e.
Windows XP
Windows 2000
Windows 95/98
Windows 1.0
Windows NT
95/98 with the
NT code
Compilers or Translators
A compiler is a program that reads a program in one language, the source
language and translates it into an equivalent program in another language,
the target language. The target language is usually the machine language
of the computer where the program is to be executed and the source
language is any of the available high-level programming languages.
A compiler simply translates a high-level programming language to
machine language, so basically it accepts a high-level programming
language input and outputs the machine language equivalent of the
program.
UP Open University
compiler
machine language
compiler
machine language
procedure in machine
language found in the
library
linker
executable program
UP Open University
Module 3
high-level programming
language
high-level programming
language
high-level programming
language
compiler
compiler
compiler
machine language
procedure in machine
language found in the
library
machine language
machine language
75
linker
executable program
Activity 3-12
Why is there a need to translate a high-level programming
language to machine language before execution can occur?
Assemblers
Some compilers do not directly produce machine languages, but rather
they produce the assembly language equivalent of the high-level
programming language program. In this case, there is a need for another
software called the assembler. The assembler is a software that translates
assembly language programs to their machine language equivalents.
UP Open University
high-level programming
language
high-level programming
language
compiler
compiler
compiler
assembly language
assembly language
assembly language
assembler
assembler
machine language
procedure in machine
language found in the
library
machine language
machine language
assembler
linker
executable program
Activity 3-13
Why do most compilers do not directly produce machine languages
but rather they produce assembly languages instead?
UP Open University
Module 3
77
Device Drivers
A software that controls a device. Every device, whether it be a printer,
disk drive, CDROM drive, screen or keyboard, must have a driver program.
Many drivers, such as the keyboard and screen drivers, come with the
operating system. For other devices, you may need to load a new driver
when you connect the device to your computer. For example, when
connecting a new printer into your computer or connecting a flash disk
into your system will need a separate device driver for each. A device
driver essentially converts the more general input/output instructions of
the operating system to messages that the device type can understand.
Activity 3-14
Why are device drivers for new hardware usually not included in
the operating systems?
Utilities
Utilities are tools provided for housekeeping services that are not readily
available in the operating system. There are so many of these utilities but
some examples are given below.
Anti-virus software - is a class of programs that searches your hard drive
and floppy disks for any known or potential viruses. It protects a computer
against viruses by identifying and removing any computer viruses found
in memory, on storage media, or on incoming files.
Zip/Unzip software - is a software that compress and uncompress files.
UP Open University
UP Open University
Module 3
79
Activity 3-15
Which of the following are utilities?
a.
b.
c.
d.
e.
f.
g.
Web browsers
Mail client
Payroll program
Airline reservation system
Count the number of characters in a file
Find the difference between two files
Database management system
UP Open University
Module 4
Applications Software
Database Management
Systems
A database is an organized collection of
related information or data. An office worker
may probably encounter several databases in
the office. For example, an office usually
keeps track of the addresses and phone
numbers of its clients and an inventory of its
supplies.
Objectives
At the end of the module, you
should be able to:
1. Survey the different
applications of
computers; and
2. Differentiate one
computer application
from another.
Activity 4-1
Explain how a DBMS is able to speed up the process of accessing
data from the database compared to a manual database system.
Database concepts
Given below are some of the basic concepts in database. We only give
those concepts necessary for designing a database.
1. Entity a thing that exist and distinguishable. An entity is the subject
that we gather data on. For example, a person or a school is an entity.
A collection of similar entities forms an entity set. For example, the set
of all persons in a school is an entity set.
2. Attributes an entity has properties or characteristics called its
attributes. For example, a person entity can have the following
attributes: name, age, height, weight, educational attainment, etc.
3. Key an attribute or attributes that uniquely identifies an entity is an
attribute key. For example, the student number attribute of a student
entity or the name and address attributes of a person entity.
UP Open University
Module 4
83
4. Database File a file containing the values for the attributes of the
entities. A database file can be viewed as a matrix of data, where the
columns indicate the attribute fields (or just fields) and the rows
indicate the entities but more commonly called the records. For
example, a database file of students may look like the following:
Name
J.M. de la Cruz
R.B. San Pedro
E.F. Corpuz
H.J. Rodriguez
Age
20
17
18
21
Sex
M
F
M
F
Course
BSCS
BSMath
BSAgri
BSHumEco
Address
12 Rizal St, Calamba City
32 Rizal St., Bacolod City
56 Ipil St., San Pablo City
43 Blue St., Quezon City
Activity 4-2
Match
____ 1. A thing that exist and
distinguishable
____ 2. Properties of an entity
a.
b.
c.
d.
relationship
attributes
key
entity
UP Open University
UP Open University
STAT 1
CMSC 56
ECON 1
MATH 17
STAT 1
Module 4
85
Activity 4-3
A phase in database design where attribute are decomposed into
parts.
a.
b.
c.
d.
e.
Entity identification
Data definition
Data refinement
Establishing relationships
None of the above
Implementing a database
Normally, there is a database management system (DBMS) that is used to
implement a database. The procedure is that all the database files and
relationship files identified will be entered into the DBMS. The DBMS
include a query language that can be used by the user to query the entered
database. For example, one may want to list all male students. A typical
query for this in the query language of a DBMS is:
LIST sex = M.
The query language of a DBMS is usually command driven like the
command given above.
UP Open University
Activity 4-4
True or False.
A database management system is a hardware used for
implementing databases.
Word processing
Word processing software usually allows the creation, editing, formatting,
storing, and printing of a text document. A text document is anything
that can be keyed in, such as a letter and a report. Although originally
intended for text document, current word processing software allows
graphics to be embedded into a text document.
Most word processing software allows:
Module 4
87
the text. The cut and paste facility provided in most operating systems
(like Windows and MacOS) made possible the transfer of non-text data
from other software to the word processor. In fact, most word processors
can be linked with existing database systems to produce exactly the same
document for different entries in the database. This is often referred to as
mail merging. Online spelling checker, grammar checker and thesaurus
are now included in most word processors. Hence, it is now unacceptable
to have a document with misspellings in them. This manual, for example,
was prepared using a word processor.
Word processing programs, as mentioned above, help people create, edit,
format, store and print documents at a speed several times faster and
several times higher in quality than when using typewriters. Word
processing program packages are the most widely used of personal
computer applications. Many personal computer owners and users even
use their machines solely for word processing. Also, there are probably
more word processing packages in the market than any other type of
software. In the next section, a description of the word processing software
called Microsoft Word will be discussed.
Activity 4-5
Enumerate the things that can be done by a word processor that
cannot be done by a typewriter.
Desktop publishing
If the objective is to come up with well-designed pages that combine
elaborate charts and graphics with text and headlines in a variety of
typefaces, then what one need is a desktop publishing software. You can
use a desktop publishing software to design sophisticated pages and, with
a high-quality printer, print professional looking final document. Before
desktop publishing came about, people had two alternatives when they
wanted to publish: the traditional publishing process (through the printing
press) or through word processing. However, both had their significant
disadvantages. For example, the quality of the word processors output
UP Open University
was not so high and facilities like printing text diagonally are not available
in word processors. On the other hand, the service of a printing press was
expensive, and some functions cannot simply be done.
Desktop publishing is one step beyond word processing. It refers to the
preparation of printed output whose quality is very near that produced
by a typesetter. A desktop publishing setup is usually composed of a highresolution screen, a laser printer, an optical character recognizer such as
your scanner, and the desktop publishing software. The high-resolution
screen will obviously allow the user to view the image of the document in
the form that is almost as clear and sharp as it will be printed in the laser
printer. In desktop publishing, what you see (on screen) is what you get
(on paper). Desktop publishing can be used to solve administrative tasks
like the preparation of documents for such internal use as correspondence,
and the preparation of reports and newsletters. It can also be used for
technical tasks like the preparation of slides, overhead transparencies,
and even manuals. Finally, it can be used for tasks involving graphics like
advertisements, brochures, and flyers which are used outside the office.
Activity 4-6
What are the facilities available in a desktop publisher that are not
provided by word processors?
Graphics software
Graphics software, also called business-quality graphics software, are
programs that lets you produce charts, graphs, and other visual aids that
look as if they were prepared by a professional graphics artist. While you
can produce graphics faster and make last-minute changes if necessary,
you cannot usually control the appearance of the product when you do it
yourself. Most presentation graphics programs allow you to do the
following:
UP Open University
Module 4
89
Activity 4-7
Differentiate graphics software from a desktop publisher.
Activity 4-8
Give examples of presentation software that are sold in the market.
UP Open University
Electronic spreadsheets
An accountants spreadsheet is a piece of paper with horizontal and
vertical lines dividing it into rows and columns The spreadsheet program
allows the user to simulate a spreadsheet on screen. Working with a
spreadsheet on a computer eliminates much of the toil of setting up a
manual spreadsheet. In general, it works like this: you enter the data you
want in your spreadsheet and then key in the types of calculations you
need. The electronic spreadsheet program automatically does all the
calculations for you and produces the results. The program does not make
any calculation errors, and if you want a printed copy of the spreadsheet,
it can be done quickly. Also, you can store your electronic spreadsheet on
your disk so that it can be used again. But the greatest labor saving
contribution of the electronic spreadsheet is that when you change one
value or formula in your worksheet, all the rest of the values on the
spreadsheet are recalculated automatically to reflect the change.
Activity 4-9
Get access to any electronic spreadsheet available in your office.
Using the spreadsheet enter the following data
Q1
10
13
16
Q2
15
19
18
Q3
12
15
11
Q2
15
19
18
Q3
12
15
11
Row Average
12.33
15.66
15.00
UP Open University
Module 4
91
Communications Systems
A lot of work that takes place in an office involves multiple participants.
Message handling systems are usually designed to support this type of
collaborative work. The earliest system was to simply send the document
to the intended receiver. Then, the use of telephones together with the
printed document on paper gained popularity and served this purpose.
This was further improved by the use of fax machines. Now, computers
are used to basically add more functionality and to integrate what the
telephone and fax machines have been providing. Some examples of
communications systems are the electronic mail, bulletin board system,
voice mail, teleconferencing and groupware.
Electronic mails
Electronic mails are messages, usually text, sent from one person to another
via computer. E-mail, as it is commonly called, can also be sent
automatically to a large number of addresses (mailing list). With e-mails,
the bulk of the source-to-destination (and vice versa) correspondence can
be implemented via mailing lists. Information from managers to other
office workers and the responses of the office workers to their manager
are delivered whether they want it or not. With e-mails, no arrangements
as to the schedule of sending and receiving of messages are needed.
Activity 4-10
Obtain an email address from Yahoo.com. Using this email address
send an email to [email protected]. If you get a reply, then
you must have successfully used an email system.
UP Open University
There are many thousands (millions?) of BBSs around the world, most
are very small, running on a single IBM clone PC with 1 or 2 phone lines.
Some are so large that the line between a BBS and a system like CompuServe
gets crossed at some point and is not clearly drawn.
In an office, a BBS may be used for posting specific inquiries on any topic
related to the work in the office and for the others to place their responses.
Although an inquiry-response transaction can be handled by e-mail,
implementing it as a bulletin board allows for a kind of interaction wherein
inquiries are visible to all the office workers concerned and who may
perhaps have the same inquiry.
Activity 4-11
In the Internet, there is a bulletin board system on the topic Quit
Smoking. You can access this bulletin board using the address
http://www.quitsmoking.com/bbs.htm. Your job is to read some
of the messages in this bulletin board and reply to one of the
messages. If you can see your reply, then you must have successfully
participated in the discussion in the bulleting board.
Voice mails
Voice mails are basically an automation of the telephone. It is exactly
similar to e-mails except that you send messages by speaking them on
your telephone rather than typing them on your keyboard. Also, you have
to use your telephone for retrieving messages. In this technology, one can
still hear the voice of the sender of the information. However, unlike in a
telephone system where both the sender and receiver have to be on the
phone at the same time, voice mails just like e-mails, can be sent anytime
and played back anytime. Hence, this can be very useful to offices whose
employees are spread across time zones. That means you wouldnt have
to get up at two in the morning just to report to your boss in the United
States anymore.
UP Open University
Module 4
93
Activity 4-12
What can you do in voice mails that cannot be done by an ordinary
telephone?
Teleconferencing
Teleconferencing applications usually include audio conferencing, video
conferencing, and computer conferencing. This is a technology that uses
electronic transmission to permit two or more people to virtually meet
and discuss an idea or issue.
Audio conferencing requires the use of voice communications equipment
to establish an audio link to geographically dispersed persons for the
purpose of conducting a conference. The conference call that allows more
than two persons to participate in a telephone conversation was the first
form of audio conferencing and can still be used today. This application
does not usually require the use of a computer. All you need are two-way
audio communication facilities like the PABX phone system.
In video conferencing, the audio signal is supplemented with a video
signal. As in audio conferencing, this does not require the use of computers.
Television equipment are usually used to send and receive audio and video
signals. Persons in one location can both see and hear persons in other
locations as the conference is conducted.
Computer conferencing involves the use of networked computers to allow
persons to exchange information during the conference. This application
is very similar to e-mails and in fact the same hardware and software are
used. The conference can be asynchronous where all participants do not
have to be on line at the same time. Or it could be synchronous where
everybody have to be there at the same time just like in the audio and
video conferencing.
UP Open University
Activity 4-13
What are the hardware requirements of a computer conferencing
set up?
Groupware
Groupware is a software designed to enable people to collaborate on real
work. It is a new and somewhat unshaped category of commercial
products that help groups and teams worked together by sharing
information and by controlling work flows within the group. The term
groupware has attained wide recognition because of a combination of the
need for groups to work together more effectively and the technical
progress in networks and group support products. Groupware is still new
that its long-term direction is unclear. What is clear, however, is that the
downsizing and rapid organizational change of the 1990s makes the
effective operation of work groups an even more important competitive
issue.
Many groupware products are related to specific group-related tasks like
project management, scheduling meetings, and retrieving data from shared
databases. The most popular commercial groupware package is the Lotus
Notes. Essentially, Lotus Notes is the facility that integrates e-mails, flexible
bulletin boards, and database facilities. This provides users with a variety
of communication facilities and with a way of creating systems that do
real work. Other types of groupware systems include the brainstorming
support systems and negotiating support systems. Mosaic is a good example
of the basic database facilities that could be used as part of a groupware
system.
UP Open University
Module 4
95
Activity 4-14
When teams work together by sharing information, there is a
possibility that team members will attempt to access (worst modify)
the same set of information. How does groupware ensure the
correctness of the job being worked by the team?
Activity 4-15
In the chess playing program that was pitted against Gary
Kasparov, where is the intelligence in the program?
UP Open University
UP Open University
Module 4
97
Activity 4-16
Which of the following is not example of an AI ssytem?
a.
b.
c.
d.
e.
Mycin
NASAs Pathfinder
SONYs AIBO
Automatic Teller Machine
None of the above
These are but a few examples of AI systems that has been built. The
following are some more examples of systems that uses AI:
Now, you see that this thing called AI has a very large potential of being
applied to anything where human intelligence is required. Can you
imagine a future where everything is run by machines? At this point,
UP Open University
many questions may ring through your mind. But we have to answer the
most basic one first: What is artificial intelligence?
Computer systems that possess intelligence are said to have artificial
intelligence. Just like the term intelligence, the term artificial intelligence is
defined by many experts in different ways. But all of them have these
two general ideas: (1) it relates to the study of the processes of human
thinking, and (2) it is concerned with the representation of these processes
so that machines, (e.g. computers, robots, etc.) can exhibit an intelligent
behavior. We say an intelligent behavior is present if there is the ability to:
UP Open University
Module 4
99
Activity 4-17
True or False.
____
AI Technologies
Although AI found its applications in many areas, there are several
technologies by which these applications can be classified.
Activity 4-18
What is difficult in translating one natural language to another?
Activity 4-19
An application of NLP where it attempt to automatically translate
text from one language to another.
a.
b.
c.
d.
e.
Textual analysis
Machine translation
Providing interface to users
Speech synthesis
None of the above
UP Open University
Module 4
101
UP Open University
Activity 4-20
Aside from accessing databases and other information in remote
locations through telephones, what other applications of speech
recognition and synthesis can you identify?
Robotics
Robotics is the area of AI concerned the study of robots. It aims to simulate
human motor abilities in machines.
If you think robots are mainly the stuff of space movies, think again. Right
now, all over the world, robots are on the move. They are painting cars at
Ford plants, assembling Milano cookies for Pepperidge Farms, walking
into active volcanoes, driving trains in Paris, and defusing bombs in
Northern Ireland. As they grow tougher, nimbler, and smarter, todays
robots are doing more and more things humans cantor dont want
todo.
Robots wouldnt become possible until the 1950s and 1960s, with the
invention of transistors and integrated circuits. Compact, reliable
electronics and a growing computer industry added brains to the brawn
of already existing machines. In 1959, researchers demonstrated the
possibility of robotic manufacturing when they unveiled a computercontrolled milling machine that made ashtrays.
Today, robots are enjoying a resurgence. Faster and cheaper computer
processors make robots smarter and less expensive. Meanwhile, researchers
are working on ways to make robots move and think more efficiently.
Although most robots in use today are designed for specific tasks, the goal
is to make universal robots, robots flexible enough to do just about anything
a human can do.
UP Open University
Module 4
103
Activity 4-21
Which of the following are not robots?
a.
b.
c.
d.
e.
Traffic light
Microwave oven
Photocopier
Bicycle
Car
UP Open University
Computer vision
Computer vision aims to provide machines with the ability to analyze
sensor data and recognize objects in the physical world. The visual images
are used to control the operations or to instruct computers and other
devices, such as robots.
Fuzzy logic
Uncertainty is the key idea in fuzzy logic. Most often, things arent always
right or wrong, true or false. In making decisions, answers are always
clouded by maybes. In fuzzy logic, everything has a degree of certainty.
This degree of certainty is a value from 0 to 10 for false and 1 for definitely
true. The numbers between 0 and 1 are used to indicate to what extent an
answer is uncertain. These numbers are very important in arriving at a
good solution to the problem. I will not elaborate more on how fuzzy
logic really works because Im sure that if I do it here, youll just get bored
and fall asleep. You may read on this topic later if you are really interested.
Neural networks
Although expert systems have been successfully applied to many business
problems, there are some difficulties that have severely hampered their
development, namely (1) the enormous time and effort required to extract
the experts knowledge and translate it into rules; and (2) the inability of
an expert system to use inductive learning and inference to adapt to
changing relationships in the decision environment. A new technology
called neural network provides solutions to these problems. After it has
been given an initial training set, the system can learn and adapt to new
configurations of the problem.
Neural networks simulate the biological processes of the human brain
(composed of neurons) and nervous system in general. Neural nets, as
they are commonly called, attempt to tease out meaningful patterns from
vast amounts of data. Neural nets can recognize patterns too obscure for
humans to detect, and they adapt as new information is received. It has
been used in digitizing hand-written text, proofreading, remote sensing,
medical imaging, target tracking and classification, and other patternrecognition tasks. Here are some actual systems used in the US. Bank of
America uses a neural network to evaluate commercial loan applications.
American Express uses a neural system to read handwriting on credit
card slips. The state of Wyoming in US uses a neural system to read handprinted numbers on tax forms. The oil giants Arco and Texaco are using
UP Open University
Module 4
105
neural networks to help pinpoint oil and gas deposits below the earths
surface.
Many major businesses around the world are currently devoting significant
resources to investigate ways in which expert systems, neural networks,
and other AI technologies in general can be used to help them cope with
problem situations and make better and more consistent decisions fast.
Activity 4-22
Which of the following are possible applications of neural network?
a. Real Estate Appraiser predicts the sale price of residential
house and lot.
b. Stock Price Predictor predicts the price of certain stocks in
the stock market.
c. Building Height Meter measures the height of a building.
Intelligent agents
An agent is defined as a software and/or hardware component capable
to fulfill various tasks on behalf of its user. Essentially, the agent must
manifest personalization to adapt to its user, authorization to act in the
name of the user and specialization to have knowledge in a certain field.
Agents are one of the most important and exciting areas of research and
development in computer science today. Agents are currently being applied
in domains as diverse as computer games and interactive cinema,
information retrieval and filtering, user interface design, and industrial
process control.
There are various classifications of agents. First, agents may be classified
by their mobility, i.e. by their ability to move around some network. This
yields the classes of static or mobile agents. Secondly, they may be classed
as either deliberative or reactive. Deliberative agents derive from the
deliberative thinking paradigm: the agents possess an internal symbolic,
reasoning model and they engage in planning and negotiation in order to
achieve coordination with other agents. Third, agents may be classified
along several ideal and primary attributes which agents should exhibit.
UP Open University
Collaborative
Learning Agents
Learn
Cooperate
Autonomous
Collaborative
Agents
Interface
Agents
UP Open University
Module 4
107
Activity 4-23
Which of the following are possible applications of intelligent
agents?
a. Location detector a mobile device (like a cell phone) will inform
a central server of the location of the device.
b. Medical information search search the Internet for medical
information.
c. Map drawer draws the map of certain city or town.
Expert systems
Among the intelligent systems, expert systems (also called knowledgebased systems) are the most common since they emerged early and were
in fact the first applications of AI. These systems imitate the abilities of a
human expert in solving problems. Expert systems function as consultants.
MYCIN and MACSYMA, the systems I mentioned to you earlier, are
examples of expert systems. (Note: We will discuss the other intelligent
systems on the list in the last section of this module.)
The first expert system installed for business use was built by General
Electric to capture the knowledge of a senior locomotive repair expert
who was approaching retirement. The system was built to help
repairpersons diagnose mechanical problems. Once the problem is found,
a video tape instructs the repairperson in making the needed repairs.
Each expert system has the ability to make inferences, explain its actions
or decisions, give solutions to complex problems given uncertain
information, and acquire new knowledge.
To avoid confusion, I think its necessary to point out the difference
between an expert system and a decision support system. An expert system
is very similar to a DSS since both intend to provide a high level of problemsolving support to their users. But they differ significantly in that an ES
has the ability to explain its line of reasoning in reaching a particular
solution. This is deemed significant because very often, the explanation
on how a solution is reached is more valuable than the solution itself.
UP Open University
UP Open University
Module 4
User
User Interface
109
Inference Interface
Search Module
Explanation
Subsystem
Control Module
Knowledge Base
Working Memory
Facts
Rules
Knowledge
Acquisition
Subsystem
Expert and
Knowledge
Engineer
Activity 4-24
Match
____ 1. contains the pertinent
knowledge so the problem
will be understood and
solved
____ 2. the brain of the system
a. knowledge acquisition
b. user interface
c. explanation
subsystem
d. inference engine
e. knowledge base
UP Open University
After knowing the parts of the system, its good if you see the interaction
of these parts. You will see the relationship of these parts in the following
diagram.
You will notice that in the diagram, the inference engine has two modules.
The search module contains a searching algorithm for finding facts and
rules. The control module, of course, controls the process of inference.
The working memory is a kind of database which contains descriptions of
the current problem, the input information, and for storing intermediate
results.
Activity 4-25
Which of the following are possible applications of expert systems?
a. Orchid specie identifier identifies the specie of a described
orchid.
b. Furniture builder accepts raw materials for furniture then
provides a design of the furniture required by the user.
c. Green House Temperature Control maintains the temperature
of a green house at a fixed level.
d. Matrix multiplier multiplies two compatible matrices.
Multimedia Systems
Multimedia has a very simple definition. It involves any combination of
two or more of the following elements: text, image, animation, sound,
speech, video, and computer programs. These media are digitally controlled
and processed by a computer. In order to get information across, one can
use multimedia to convey their message. Multimedia enhances the
information for better communication and understanding.
With this definition of multimedia, we can easily identify several existing
multimedia systems and applications. The World Wide Web is therefore a
form of multimedia system since you can view web pages that combine
text with graphics, animation, sound and even video. Any presentation
software is also a multimedia system since you may combine text, image,
UP Open University
Module 4
111
Activity 4-26
Which of the following are possible multimedia applications?
a.
b.
c.
d.
e.
Transistor radio
Television
Electronic mail
Voice mail
Bulletin Board System
UP Open University
Module 5
Networks
Objectives
IMPs
Hosts or Nodes
Subnet
Activity 5-1
For what purpose are the IMPs in the network?
Activity 5-2
UPLB has a diameter of about 8 kilometers. The buildings (at least
45 of them) are connected to each other using fiber optic cables.
Obviously, we cannot consider the buildings in UPLB as
geographically close to each other. But, why do we still consider
the network of UPLB as a local area network?
UP Open University
Module 5
115
Networks may also be classified based on how messages are sent from the
sender to the receiver. There are two main categories of networks based
on this, namely, point-to-point networks and broadcast networks.
In point-to-point networks (Figure 5-2), the transmission lines (wires, radio
links, telephone lines, etc.) connect pairs of nodes. Messages move from
one host to another until they reaches their destination. The main issues
with the design of this type of networks are the topology of the network
(which nodes are connected to each other) and the routing of information
from one node to another.
Satellite
Earth Station
UP Open University
Activity 5-3
What the advantages and disadvantages of point-to-point networks
over broadcast networks?
Network Topologies
There are three popular physical topologies that are used in networks.
These topologies are the bus, star and ring topologies.
The bus topology consists of a main run of cable with a terminator at each
end. All nodes (file server, workstations and peripherals) are connected
to the linear cable. See Figure 5-4 for an illustration of a bus topology.
UP Open University
Module 5
117
nodes
terminators
hub or concentrator
not the correct destination, the message is re-transmitted to the next node
in the ring. Figure 5-6 illustrates a ring topology.
nodes
ring
Activity 5-4
Why is the star topology more reliable (more fault-tolerant) than
bus and ring topologies?
Networking Protocols
A protocol is a set of rules that governs the communications between
nodes in a network. These rules includes guidelines that regulate the
following characteristics of a network: access method, allowed physical
topologies, types of cabling and speed of data transfer.
There are five very popular protocols: ethernet, fast ethernet, token ring,
token bus and Fiber Distributed Data Interface (FDDI).
UP Open University
Module 5
119
Ethernet
Ethernet was invented at Xerox Palo Alto Research Center in the 1970s.
The first Ethernet system ran at approximately 3 Mbps and was known
as the experimental Ethernet. The formal specification of Ethernet were
published in 1980 by a multi-vendor consortium that created the DECIntel-Xerox (DIX) standard. This effort turned the experimental Ethernet
into an open production-quality Ethernet system that operates at 10 Mbps.
Ethernet was then adopted for standardization by LAN standards
committee of the Institute of Electrical and Electronics Engineers (IEEE
802).
The IEEE standard was first published in 1985, with the formal title of
IEEE 802.3 Carrier Sense Multiple Access with Collision Detection (CSMA/
CD) Access Method and Physical Layer Specifications. The IEEE standard
has since been adopted by the International Standards Organization (ISO),
which made it a worldwide standard.
A newer version of Ethernet, called 100Base-T (or Fast Ethernet) supports
data transfer rates of 100 Mbps. The newest version, Gigabit Ethernet
supports data transfer rates of 1 gigabits per second (1000 Mbps).
Activity 5-5
Match
____ 1. Data transfer rates of 3 mbps
____ 2. Data transfer rates of 10 mbps
____ 3. Data transfer rates of 100 mbps
a.
b.
c.
d.
Gigabit Ethernet
Fast Ethernet
First Ethernet
Ethernet
UP Open University
UP Open University
Module 5
121
Activity 5-6
Why does a host wait a random amount of time in Ethernet before
re-sending after a collision has occurred?
Fast ethernet
For Ethernet networks that need higher transmission speeds, the Fast
Ethernet standard (IEEE 802.3u) was established. Fast Ethernet raises the
speed limit from 10 Mbps to 100 Mbps with only minimal changes to the
existing cable structure. There are three types of Fast Ethernet:
1. 100Base-TX for use with level 5 UTP cable;
2. 100Base-FX for use with fiber optic cables;
3. 100Base-T4 which uses an extra two wires for use with level 3 UTP
cable.
Most Fast Ethernet networks use the star topology, in which access is
controlled by a central interface. Two types of star topologies are possible:
broadcast star and switched. In a broadcast start, the central interface is a
hub that sends the messages to all the hosts; while in a switched type, the
central interface is a hub (or switch) that sends messages to their destination
hosts.
Activity 5-7
What is the basic difference of Fast Ethernet from ordinary
Ethernet?
UP Open University
Token ring
Token ring networks consist of stations directly linked to each other by a
single communication line. Messages travel from host to host around the
ring until it reaches its correct destination. As with the bus network, each
interface must be capable of recognizing its own address to receive a
message. If a message is passed to a host, which is not the correct
destination, the message is re-transmitted to the next host in the ring. To
avoid collision, a method called token passing is usually used.
A token is a frame of bits, which is passed from one host to the next. A
token may be empty or it may contain a message. If an empty token is
received and the station wishes to transmit data, it holds the token and
writes into it: the destination address, its own address and the message.
The token is then passed to the next host. As the token is no longer marked
empty, it means that no other host can transmit a message until this token
becomes empty again. When the token finally reached its destination, the
destination host reads the message and then marked the message as read.
Then it passes this token to the next host. The passing continues until it
reaches the sender. The sender then marks the token empty. The same
token was used to send a message and at the same time it served as an
acknowledgement that the message was received.
At the implementation level, the token may be a special 8-bit pattern, for
example, 11111111. With 11111111, this means that the token is empty.
Bit stuffing is used to prevent this pattern to appear in the data being
passed. When a station wants to transmit a packet, it is required to seize
the token and remove it from the ring before transmitting. To remove the
token, the ring interface, which connects the host to the ring, must monitor
all bits that pass by. As the last bit of the token passes by, the ring interface
inverts it, changing the pattern to 11111110 known as the connector. With
the pattern 11111110, this will be interpreted as what follows is a message.
Those monitoring the channel will never seize the token. Immediately
after the token has been so transformed, the host making the
transformation is permitted to begin transmitting.
Activity 5-8
Why is there no collision in token rings?
UP Open University
Module 5
123
Token bus
Token-bus systems provides a horizontal channel (bus), yet provide access
to this bus channel as if it were a ring. The protocol eliminates the collisions
found in carrier sense channels and allows the use of a non-ring channel.
The protocol uses a control frame called an access token or access right.
Once held by a host, this token gives the hosts exclusive use of the bus.
The token-holding host uses the bus for a period of time to send and receive
data, then passes the token to the next designated host. In the bus topology,
all hosts listen and receive the access token, but only the host allowed to
seize the channel is the host designated in the access token. All other
hosts must wait their turn to receive the token.
The hosts receive the token through a cyclic sequence (Figure 5-7), which
forms a logical ring on the physical bus. This form of token passing is
called explicit token system, because the bus topology causes the ordering
of the hosts use of the channel.
Activity 5-9
The hosts receive the token in cyclic sequence. How is this achieved
in a token bus?
UP Open University
single-attached
hosts
M-port host
double-attached
hosts
UP Open University
Module 5
125
Lost
Channel
Single-attached
hosts
M-port host
Double-attached
hosts
Activity 5-10
How is fault-tolerance achieved in FDDI?
Networking Hardware
Networking hardware includes all the computers, peripherals, interface
cards and other equipment needed to perform communication and
processing within the network.
File servers
The file server is the most powerful computer in the network. It is usually
a very fast computer with very large RAM and storage space along with
a very fast interface card. The operating system of the network together
with the software applications that is shared by the different users of the
network usually resides in the file server. The file server is also responsible
with the communication between nodes in the network.
UP Open University
Activity 5-11
A file server is usually provided with a large RAM and a fast CPU.
Why?
Workstations
All the other computers connected to the network and that use the
resources in the file server are called workstations. Hence, a workstation
does not really need a separate storage (like hard disk space and floppy
disk space). All a workstation need is a network interface card, networking
software and appropriate cables to be able to operate.
UP Open University
Module 5
127
Hubs or concentrators
A hub is a device that provides a central connection point for cables from
the nodes (workstations, file servers, and peripherals) in the network. In a
star topology, for example, twisted-pair cables are used to connect each
node to the central hub. A hub is actually a multislot concentrator into
which one can plug a number of multi-port cards to provide additional
access as the network grows. Some hubs are passive. In which case, the
hub simply allows the signal to go from one node to another. However,
there are active hubs. An active hub electrically amplifies the signals that
pass through it. Hence, this type of hubs acts as repeaters to extend the
length of the network.
Activity 5-12
What are the advantages of active hubs over passive hubs?
Repeaters
When a signal travels along a cable, naturally it slowly losses strength. A
repeater is a device that is used to catch signals on the cable and retransmit
them at a strength equal to the original strength. This obviously is used to
extend the length of the network.
Activity 5-13
Why are repeaters needed in networks where the nodes are far
apart?
UP Open University
Bridges
A bridge is a device that allows to segment a large network into two local
area networks or to connect two local area networks into one. The
requirement is that both networks must be using the same protocol. A
bridge manages the traffic of information to maintain optimum
performance on both sides of the networks. The bridge examines the traffic
of information passing those known to be in one local area network and
forwarding those for the other network.
Activity 5-14
What is the difference of a bridge from repeater?
Routers
A router is like a bridge except that it selects the best path to route a
message based on its source and destination addresses. The difference
between a bridge and a router is that a bridge simply forward messages
from one local area network to another, whereas a router determines an
optimal route for the messages before forwarding them. Obviously, a router
may have more than one outgoing connection because it selects which
path a message should go, while a bridge has only one outgoing connection
and that is to the other local area network.
Activity 5-15
When do we use a router and when do we use a bridge instead?
UP Open University
Module 5
129
Gateway
A gateway connects two local area networks with totally different
protocols. Hence, a gateway serves to translate messages coming from a
network with a certain protocol to another network with a totally different
protocol.
Activity 5-16
Can a router be the gateway? Can a bridge be the gateway?
Activity 5-17
Match
____ 1. Most powerful computer
a. router
in the network
b. gateway
____2. Computers that use the
c. network interface
resources in the file server
card
____ 3. Provides the physical
d. file server
connection between the
e. workstation
network and the computers
f. bridge
____ 4. Provides a central connection
g. repeater
point for cables from the
h. hub
nodes in the network
____ 5. Used to catch signals on the
cable and retransmit them at a
strength equal to the original strength
____ 6. Allows to segment a large
network into two local area
networks
____ 7. Selects the best path to route
a message
____ 8. Translates messages coming
from a network with a certain
protocol to another network
with a totally different protocol
UP Open University
Network Cabling
The cable is the medium through which information usually moves from
one node to another. The cables used in a network usually depend on the
topology, protocol and size of the network.
UP Open University
Module 5
131
Since a UTP is composed four pairs of wires, one pair is used for outgoing
data and another pair is used for incoming data. The other two pairs are
reserved for telephone use.
Activity 5-18
UTP are not usually used for outdoor wiring. Why?
UP Open University
Activity 5-19
What is the purpose of the metal mesh wire in STP?
Coaxial cable
Coaxial cable is called coaxial because it includes one physical channel
that carries the signal surrounded (after a layer of insulation) by another
concentric physical channel, both running along the same axis. The outer
channel serves as a ground. The inner physical channel in a coaxial cable
is in the form of a copper conductor that runs at its center. A plastic layer
provides insulation between the center conductor and a braided metal
shield. The metal shield serves as the outer channel. Aside form being
used as a ground, the metal shield is used to block any outside interference
from lights, motors, radio signals and other signals that will interfere with
the signal on the copper wire. Thus, the shield makes coaxial cable highly
resistant to signal interference.
UP Open University
Module 5
133
Activity 5-20
Coaxial cables are less prone to interference than UTP. Why?
UP Open University
Activity 5-21
Fiber optic cables are much faster than UTP and coaxial cables.
Why?
Microwave communication
Microwave communication is the transmission of signals by sending
microwaves, either directly (terrestrial microwave) or via a satellite (satellite
communication). Electromagnetic waves with a wavelength on the order
of a few inches are used. Microwaves are longer than infrared radiation
and shorter than radio waves. Microwaves are used extensively for
communication, both in satellite television and for the transmission of
long-distance telephone signals. The receivers for microwave signals are
usually disc-shaped antennae from a foot to a few feet across and are
often seen installed in business locations or near private homes.
Microwave communication products operate typically in the frequency
range of 1-58GHz. Such products have higher bandwidth and can be
operated at lower cost than wired communication links. The allocation of
frequencies is usually controlled and distributed by governments.
UP Open University
Module 5
135
Terrestrial microwave
Terrestrial microwave communication employs earth-based transmitters
and receivers. Usually terrestrial microwave communication is point-topoint. The microwave frequencies used are in the low-GHz range, which
limits all communications to line-of-sight. Microwave transmissions
typically use a parabolic antenna that produces a narrow, highly
directional signal. A similar antenna at the receiving site is sensitive to
signals only within a narrow focus. Because the transmitter and receiver
are highly focused, they must be adjusted carefully so that the transmitted
signal is aligned with the receiver.
Activity 5-22
True or False.
Terrestrial microwave requires that antennas to have line of sight.
Satellite communication
Satellite communication is almost similar to terrestrial microwave. The
only difference is that signals are sent from an earth station to a satellite
station (orbiting the earth) that beams back the signal to earth stations.
Usually, however, it beams this back to several earth stations (point to
multipoint) instead of just one station just like in terrestrial microwave.
This requires that the sending and receiving antennas be locked onto each
others location at all times. The satellite must move at the same speed as
the earth so that it seems to remain fixed above a specific spot. These
satellites are said to be in geo-synchronous orbits.
UP Open University
Activity 5-23
What is the basic difference of terrestrial microwave from satellite
communication?
UP Open University
Module 5
137
Activity 5-24
Why is line of sight not required in broadcast radio communication?
Infrared communication
Infrared communication is suitable for short-range wireless
communication. It cannot penetrate through walls and therefore line of
sight is required. The same infrared frequencies can be reused as many
times as you like, so that infrared frequencies, unlike microwave and radio
frequencies, are not regulated by the government. The most popular
examples of this are the remote controls of home equipment.
UP Open University
Activity 5-25
True or False.
The remote control of your television set uses infrared
communication.
Data Communication
Data communication refers to the electronic transmission of data. Data
communication is the term used in reference to data that is manipulated
by computers. This should not be confused with telecommunication which
refers to the electronic transmission of any kind of electronic information,
including telephone calls, television signals, data, facsimile and telemetry
from spacecraft. The most common data communication system takes the
form of people at terminals or computers communicating with distant
computers.
What connect the computers and terminals to distant computers are
communication channels. The purpose of a data communication channel
is to take a bit stream from a processing machine at one location and
transmit the bit stream without error to another processing machine at a
distant location. When bit streams are transmitted through the
communication channel, electrical properties like capacitance, resistance
and inductance may cause transmitted data to be distorted. In addition,
outside factors like magnetic fields, considered as noises may affect the
transmitted data. Hence, communication channels are usually provided
with bit repeaters (a device that detects the bits that are being sent and
then retransmits them with their original strength and sharpness) at
frequent intervals along the line to make sure that transmitted data reached
their destination undistorted.
Module 5
139
The sound waves caused by speech make the paper cone move. The paper
cones movement is directly proportional to the strength of the air waves
caused by speech. As the cone moves, the coil of wire also moves, being
attached to the cone. Inside is an iron bar which helps to increase the
effect. A corresponding electrical signal is created in the coil, which can
then be sent along a pair of wires to a receiving device that would convert
the electrical signal back into sound waves (vibration of the air).
Paper Cone
Iron Bar
Coil
UP Open University
Two years after the invention of the telephone, i.e., in 1878, Bell set up the
first telephone exchange in New Haven, Connecticut, and in 1884, long
distance connections were made between Boston, Massachusetts and New
York City.
As the telephone became popular, more and more people wanted to
communicate with each other, so a switching center (telephone exchange)
evolved. Each customer was connected to the telephone exchange via a
pair of wires, which carried the signal from their telephone.
As the need to inter-connect telephone customers grew, they were
connected via overhead wires to a central switching center, where the
physical wires from each customer was connected to the physical wires
of another customer via a manual operator.
Module 5
141
Activity 5-26
How does a party line work?
UP Open University
Telephone Exchange
UP Open University
Module 5
143
1234567
Telephone Exchange
7654321
UP Open University
1234567
(02) 9876543
Laguna Exchange
(049)
Manila Exchange
(02)
Negros Occidental
Exchange (034)
Activity 5-27
Differentiate how a telephone local call is connected compared to
how a telephone long distance call is connected.
UP Open University
Module 5
145
UP Open University
Once MTSO identified which cell site you can be contacted to, the MTSO
picks a frequency pair that your cell phone will use in that cell site to take
the call.
The MTSO communicates with your cell phone over the control channel
to tell it which frequencies to use, and once your phone and the cell site
switch on those frequencies, the call is connected. You are talking by twoway radio to the caller.
What happens when you travel outside the range of the cell site where
you are in? As you move toward the edge of your cell site, your cell site
base station notes that your signal strength is diminishing. Meanwhile,
the base station in the cell site you are moving toward (which is listening
and measuring signal strength on all frequencies, not just its own) sees
your phones signal strength increasing. The two base stations coordinate
with each other through the MTSO, and at some point, your phone gets a
signal on a control channel telling it to change frequencies. This hand off
switches your phone to the new cell site.
Activity 5-28
Which of the following is not necessary for the operation of a cell
phone?
a.
b.
c.
d.
e.
Cell site
Mobile Telephone Switching Office
Cell phone
Land line
None of the above
Transmission modes
There are three modes of transmission namely: simplex, half-duplex and
full-duplex.
Data in a simplex transmission mode is sent one way from the sender to
the receiver. It is not often used because it is impossible to send back error
signals when errors are detected during data transmission. Examples of
communication channels that use simplex transmission are the
communication channel used by television and radio. Note that television
UP Open University
Module 5
147
and radio stations simply send their signals to the receiver and the receiver
is unable to send back signals to the television and radio stations.
Activity 5-29
Give other examples of communication system that uses the simplex
transmission.
UP Open University
Activity 5-30
Give other examples of communication system that uses the halfduplex transmission.
BOTH WAY AT
THE SAME TIME
UP Open University
Module 5
149
Activity 5-31
Give other examples of communication system that uses the fullduplex transmission.
Activity 5-32
Match
____ 1. Data is sent one way from
the sender to the receiver
a. half-duplex
b. full-duplex
c. simplex
Channel capacity
The capacity of a communication channel is the maximum rate at which
information can be transmitted through it without error. For data
communication purposes, it is often measured in bits per second (bps). It
should, however, be differentiated from the term baud that has also been
used as a channel capacity measure by some authors. The term baud refers
to the signaling speed of a line. Signaling speed, or baud, refers to the
number of times in each second the line condition changes. If the line
condition is either the presence or absence of a 1 bit, then the lines signaling
speed in baud is the same as the lines capacity in bits per second (bps).
However, some lines can be in one of four states, which means one line
condition can be used to represent 2 data bits and 1 baud equals 2 bits per
second. If the signals are coded into 8 possible states, then one line
condition represents 3 bits and 1 baud is equal to 3 bits per second. Hence,
we should note that baud rate is not always the same with bits per second.
UP Open University
There are, however, communication channels that transmit data that are
not digital. For example, telephone lines are used to transmit non-digital
data. In this case, the signals that are sent through this type of
communication channels are described in terms of frequencies. What
happens is that the amplitude of a signal at a given point oscillates rapidly.
The rate of oscillation is referred to as the frequency of the signal and is
described in terms of cycles per second, or hertz (Hz). One thousand cycles
per second is one kilohertz (KHz) and one million cycles per second is one
megahertz (MHz).
Analog lines are designed to carry specific ranges of frequencies. The
capacity of an analog line is measured by the range of frequencies that the
line is designed to carry. This is called its bandwidth. Telephone channels
are designed to transmit approximately in the range 300 to 3100 Hz. The
difference of 3100 and 300 is 2800 Hz or approximately 3 KHz is the
bandwidth of a normal telephone line. The number of bits per second that
an analog line can carry is related closely to the lines bandwidth
Activity 5-33
If a channel is able to transmit in the range 4500 to 10000 Hz.
What is the bandwidth of this channel?
The transmission speeds vary from just a few bits to millions of bits per
second. First there are the sub-voice-grade lines that transmit at rates 45
to 600 bps. These are lines that are not sufficient to carry telephone calls.
Telegraph circuits are example of these. Then, there is the voice-grade
lines which are generally normal telephone channels. The voice-grade
lines are used to carry telephone voice signals but can be used to carry
computer data at speeds from 300 to 19,200 bps. Finally, there are the
wideband lines. These lines can go at speeds of 48,000, 56,000, 64,000, 1.5
millions and even 44.7 million bps. Some of the long distance
communication channels in used today belongs to the wideband channels.
UP Open University
Module 5
151
Activity 5-34
The number of bits per second that an analog line can carry is
related closely to the lines bandwidth. Explain why?
UP Open University
Activity 5-35
How does a modem works?
UP Open University
Module 5
153
Modulation methods
Modulation methods refer to how the digital signal is altered so that it can
be sent via the analogue communication line. There are a number of
different methods. The more complex methods allow much higher
transmission rates (bits per second) than the simpler methods. The methods
are: amplitude, frequency and phase modulations.
Amplitude modulation uses a single carrier frequency, on for high, off for
low. Note that there is no carrier signal being sent for approximately half
the time. This amplitude modulation method is suitable only for low speed
transmission.
digital signal
carrier signal
modulated signal
Activity 5-36
The amplitude modulation method is suitable only for low speed
transmission. Why?
UP Open University
The frequency modulation uses two carrier signals, one for high one for
low. The higher frequency is associated with binary 1, the lower frequency
with binary 0. Also called frequency shift keying, this frequency
modulation method is used for 1200 bps modems or slower speeds. This
modulation is usually used to broadcast music and speech compared to
amplitude modulation that is usually used for broadcasting voice data.
Activity 5-37
Frequency modulation usually uses higher frequencies than that
of amplitude modulation. Why?
Phase modulation uses a single carrier frequency and alters the phase of
the carrier. Normally, a change from binary 1 to binary 0 is represented as
a phase shift of 180 degrees. This modulation is the rate at which the
signal changes its relationship to time, expressed as degrees. One complete
cycle of a wave begins at a certain point, and continues till the same point
is reached again. Phase shift occurs when the cycle does not complete,
and a new cycle begins before the previous one has fully completed.
UP Open University
Module 5
155
PHASE SHIFT
Activity 5-38
Phase modulation and frequency modulation are similar. What is
the similarity between the two?
Activity 5-39
Match
___ 1. Modulation that uses a single
carrier frequency, on for high,
off for low
___ 2. Modulation that uses two
carrier signals, one for high
one for low
a. phase modulation
b. frequency
modulation
c. amplitude
modulation
UP Open University
Activity 5-40
Leased lines are more expensive than switched lines. Why?
UP Open University
Module 6
Objectives
In 1990, the ARPANET was retired and transferred to the National Science
Foundation Network (NSFNET). The NSFNET was soon connected to the
Computer Science Network (CSNET), which linked universities around
North America, and then to the European Network (EUnet), which
connected research facilities in Europe. Fueled by the popularity of the
world wide web, the use of the Internet exploded after 1990, causing the
US Government to transfer management to independent organizations
starting in 1995.
As they say, the rest is history.
Synonymous with the Internet is TCP/IP. TCP/IP is an entire package of
data communication protocols. It gets its name from two of the many
protocols that belong to the package: the Transmission Control Protocol
(TCP) and the Internet Protocol (IP). TCP/IP was developed after
ARPANET was operational, but this was later adopted as Military
Standards in 1983. Since then, networks connected to the ARPANET were
required to convert to TCP/IP. Now, the Internet is a worldwide collection
of interconnected networks that uses TCP/IP to connect various physical
networks into single logical network. In short, TCP/IP is required for
Internet connection.
TCP/IP is very popular because of the following features:
1. It adopts open protocol standards. TCP/IP is freely available and
developed independently from any specific computer hardware or
operating system.
2. It is independent from specific physical network hardware. TCP/IP
can be used to integrate many different kinds of networks like Ethernet,
token ring, dial-up line, X.25 net and virtually any other kind of physical
transmission media.
The Internet is the most wide spread network in the world. It connects
large and small networks together and even connects individual computer
from the lowly PCs to the large server computers. Once connected to the
Internet a computer can communicate with other computers in the
network.
No one is in charge of the Internet. There are organizations which develop
technical aspects of this network and set standards for creating
applications on it, but no governing body is in control. The Internet
backbone, through which Internet traffic flows, is owned by private
companies.
UP Open University
Module 6
159
Activity 6-1
The Internet is the most wide spread network in the world. Why is
this so?
Internet
UP Open University
UP Open University
Module 6
161
The first is called the user agent (client), which is the program that the
user interacts with to compose outgoing mail, read incoming mail, and
perform all the housekeeping chores necessary to deal with mail messages
(such as deleting old mails and arranging the order of the e-mails, etc.).
The user agent can appear in various forms but the most popular are:
1. Application-based - these are installed onto users machines which
includes Microsoft Outlook and the freely available Outlook Express
and Eudora. These user agents runs in Microsoft Windows Operating
Systems. In UNIX system, there is the user agent called Pine.
UP Open University
UP Open University
Module 6
User Agent
163
Mail Delivery
Program
Internet
Mail Delivery
Program
User Agent
Activity 6-2
Programs responsible for taking a mail message from the user and
delivering the mail messages to the destination hosts is called ___.
a.
b.
c.
d.
e.
User agent
Mail delivery programs
Mail sending programs
User account
None of the above
UP Open University
Activity 6-3
Create a short letter using any word processor available to you.
Using the your Yahoo account created earlier, send this letter as
an attachment to the address [email protected].
Remote login
A facility called telnet is usually provided to allow remote login to another
computer in the Internet. This facility allows a user to execute commands
(use online databases, library catalogs, chat services, and more) on a remote
host as though you were logged in locally. Hence, you can use your own
computer as a terminal to a remote host.
UP Open University
Module 6
165
Activity 6-4
Explain the basic difference of remote login from file transfer
protocol.
Activity 6-5
Visit the web page of Yahoo Groups in http://groups.yahoo.com/.
Create your own group using your email address and the email
addresses of three to four of your friends. Then, send an email to this
group. If you receive your email then you have successfully created
an email discussion group.
UP Open University
Usenet news
Usenet is short for Users Network. Usenet is a collection of machines that
receive network news. The idea is that a user can post a message to one of
the news server and this posting is propagated to other news servers in
the network. In other words, the network news is a mechanism for
broadcasting messages, form a local host to large number of hosts across
the world. The mechanism used is called store and forward, which means
that each host that receives a net news article stores it locally and then
forwards or feeds it to other host that is part of the Usenet. People who
have access to the news groups can read messages, post messages and
reply to a particular posting from a local news server.
Usenet News is a global electronic bulletin board system in which millions
of computer users exchange information on a vast range of topics. The
major difference between Usenet News and e-mail discussion groups is
the fact that Usenet messages are stored on central computers, and users
must connect to these computers to read or download the messages posted
to these groups. This is distinct from e-mail distribution, in which messages
arrive in the electronic mailboxes of each list member.
Usenet itself is a set of machines that exchanges messages, or articles,
from Usenet discussion forums, called newsgroups. Usenet administrators
control their own sites, and decide which (if any) newsgroups to sponsor
and which remote newsgroups to allow into the system.
There are thousands of Usenet newsgroups in existence. While many are
academic in nature, numerous newsgroups are organized around
recreational topics. Much serious computer-related work takes place in
Usenet discussions. A small number of e-mail discussion groups also exist
as Usenet newsgroups.
Activity 6-6
Some newsgroups are moderated. What is meant by a moderated
newsgroup?
UP Open University
Module 6
167
MUD/MUSH/MOO/MUCK/DUM/MUSE
MUD stands for Multi User Dimension. MUDs, and their variations listed
above, are multi-user virtual reality games based on simulated worlds.
Traditionally text based, graphical MUDs now exist. There are MUDs of
all kinds on the Internet, and many can be joined free of charge.
UP Open University
Activity 6-7
Match
____ 1. Allows a user to
interactively examine
files, directories and
exchange files
____ 2. Allows a user to login
to another computer
in the Internet
a.
b.
c.
d.
e.
chat program
email discussion groups
usenet news
file transfer protocol
remote login
UP Open University
Module 6
169
Activity 6-8
The World Wide Web is a collection of computer servers. What
does this mean?
UP Open University
router
UP Open University
Module 6
171
Activity 6-9
Aside from servers and workstations, what other hardware can
be connected to the Internet?
UP Open University
Activity 6-10
Describe the roles of ISPs in the Internet.
Activity 6-11
Why is there a need to use two methods of identifying hosts in the
Internet? For what is the domain name and for what is the IP
address?
UP Open University
Module 6
173
Abbreviation
ac
co
com
edu
gov
govt
mil
net
org
Meaning
Academic
Company
Commercial
Educational
Government
Government
Military
large ISP
non-profit organization
Activity 6-12
Why is it important that a domain name of a computer is unique?
UP Open University
Activity 6-13
Is it possible for another person to have the same account name
say for example eaa in another mail server?
UP Open University
Module 6
175
Activity 6-14
True or False.
The only protocol that runs on the WWW is the HTTP.
UP Open University
Module 6
177
Activity 6-15
Aside from Netscape Navigator, Internet Explorer and Lynx, name
other Internet browser softwares that are being used today.
Plug-ins
Software programs may be configured to a Web browser in order to
enhance its capabilities. When the browser encounters a sound, image or
video file, it hands off the data to other programs, called plug-ins, to run
or display the file. Working in conjunction with plug-ins, browsers can
offer a seamless multimedia experience. Many plug-ins are available for
free.
File formats requiring plug-ins are known as MIME types. MIME stands
for Multimedia Internet Mail Extension, and was originally developed to
help e-mail software handle a variety of binary (non-ASCII) file
attachments. The use of MIME has expanded to the Web. For example,
the basic MIME type handled by Web browsers is text/html associated
with the file extension .html.
A common plug-in utilized on the Web is the Adobe Acrobat Reader. The
Acrobat Reader allows you to view documents created in Adobes Portable
Document Format (PDF). These documents are the MIME type
application/pdf and are associated with the file extension .pdf. When the
Acrobat Reader has been configured to your browser, the program will
open and display the file requested when you click on a hyperlinked file
name with the suffix .pdf. The latest versions of the Acrobat Reader allow
for the viewing of documents within the browser window.
UP Open University
Activity 6-16
Which of the following file formats have existing plug-ins?
a.
b.
c.
d.
e.
UP Open University
Module 6
179
UP Open University
Activity 6-17
Match
____ 1. Scripts that run on servers
rather than on web browser
____ 2. Platform independent
object-oriented programming
language
a.
b.
c.
d.
XML
Java
VRML
Active Server Pages
UP Open University
Module 6
Web Server
181
Activity 6-18
Trace the events that occur from the time you click a hyperlink in
a web page to the time the new web page is displayed on your
screen.
What is a Hyperlink?
A hyperlink is a clickable link to another document or resource. It is
normally shown in blue underline. When a user clicks on a hyperlink, the
client will retrieve the document associated with that link, by requesting
the document from the designated server upon which the document
resides.
UP Open University
What is a URL?
A Uniform Resource Locator (URL) is a means of specifying the pathname
for any resource on the Internet. It consists of three parts: a protocol part,
a host part and a document name. For instance, the following URL
http://www.uplb.edu.ph/institutes.html
specifies the protocol as http, the WWW server as www.uplb.edu.ph and
the document institutes.html.
Every file on the Internet, no matter what its access protocol, has a unique
URL. Web software programs use the URL to retrieve the file from the
host computer and the directory in which it resides. This file is then
displayed on the monitor connected to the users local machine.
URLs are translated into numeric IP addresses using the Internet Domain
Name System (DNS). The numeric address is actually the real URL.
Since numeric strings are difficult for humans to use, alphanumeric
addresses are employed by end users. Once the translation is made, the
Web server can send the requested page to the users Web browser.
Activity 6-19
Aside from http, what other protocols can be used in the URL?
Module 6
183
UP Open University
</td>
</tr></table>
</BODY>
</HTML>
The above HTML source when interpreted by the browser will look like
the following:
Activity 6-20
Search the Internet for web pages that have sound and video on
the page. View the source files and identify the part that defines
the sound and video.
UP Open University
Module 6
185
What is HTML?
HTML is short for HyperText Mark-Up Language. It is a series of tags
enclosed in < and > brackets. For instance, <HEAD> is an HTML tag that
defines a head section of an HTML document. Certain characters are
reserved, such as & < > which are interpreted as HTML codes.
HTML documents are plain-text (also known as ASCII) files that can be
created using any text editor (e.g., Emacs or vi on UNIX machines;
SimpleText on a Macintosh; Notepad on a Windows machine). You can
also use word-processing software if you remember to save your document
as text only with line breaks.
Each HTML page adheres to a basic structure. This looks like
<html>
<head>
<title>Title of Document</title>
</head>
<body>
Textual Information to be displayed
</body>
</html>
When viewed in the browser, the page given in the previously looks like
the one given below.
Activity 6-21
Enumerate as many as you can and give the meanings of tags
used in HTML.
UP Open University
UP Open University
Module 6
187
FAST Search: All the Web, All the Time - returns results quickly from
an extremely large database; responsible for the Lycos MP3 engine
Google - ranks pages by the number of links from pages ranked high
by the service; offers the option to view sites quickly if they are in the
services cache. See also the Google Directory which integrates results
with Google-ranked sites in the Open Directory Project. Also try Google
Search: Unclesam, a searchable database of U.S. government Web sites
(.gov and .mil) ranked by linking popularity.
GovBot - extensive database of U.S. Government Web pages
HotBot - very large database with easy form-based Boolean, field, and
media search options; includes its channel content with the results for
searches on broad or popular terms; clusters results by presenting one
hit per site
Infoseek - accurate search engine of Web sites, Usenet newsgroups,
Reuters news, and companies with field search options; clusters results
by presenting one hit per site; offers recommended and/or reviewed
Web sites for certain topics. Also try GO Translator, the Infoseek
translation service.
Lycos - small database offering the bonus of proximity searching and
the option to control factors in the relevancy ranking of results;
emphasizes search results from the Open Directory
Northern Light - results are organized into concept or location folders;
Special Collection articles available for a small fee; Alerts service tracks
search topics for new documents. Also try usgovsearch to search U.S.
government Web sites (.gov and .mil).
Oingo - meaning-based engine that constructs meanings and
relationships from your search terms to return results, from which
you can choose your desired concept to refine your search; derives
results from the Open Directory and AltaVista
RealNames - search for companies, products, brands, and services on
the Internet; RealNames associated with URLs are registered with the
service for quick lookup of the associated Web site
SearchEdu.com - service that limits results to the .edu, .gov and .mil
top-level domains; also offers to search well-known dictionaries,
encyclopedias, almanacs, etc.
Snap - primarily a directory; choose All Web Pages to supplement
search results from a large database
of Web pages compiled by the
Inktomi search engine; if no directory results are found, Web pages
are automatically searched
Thunderstone Website Index - search thousands of sites (vs. Web pages)
from a continuously updated database; adds 25,000 sites per week
TopClick: The Internets Private Search Engine - service that pledges
to abstain from cookies, banner ads, or disclosure of personal data;
uses Google search technology
Web Crawler - search two million pages from the Excite search engine
index
UP Open University
Activity 6-22
There is a classification of search engines called a metasearch engine.
What is a metasearch engine?
UP Open University
Module 6
189
Electronic Commerce
The term electronic commerce or e-commerce is used to describe carrying
out buying and selling of products and services over the Internet, utilizing
technologies such as the Web, electronic data interchange, email, electronic
fund transfers, and smart cards.
At its best, e-commerce incorporates automated, real-time, seller-to-buyer
transactions. E-commerce thus means advertising, selling and supporting
goods and services using a web shop 24 hours a day for customers
worldwide. The web shop should be a business that works while you are
occupied elsewhere (sleeping, for example) and which is not geographically
restricted.
From a customers perspective, the purpose of an electronic-commerce
system is to enable that customer to locate and purchase a desired good or
service over the Internet when the customer is interested in making the
purchase. Its function is no more or less than providing a virtual store.
From a merchants perspective, the key function of an electronic-commerce
system is to generate higher revenues than the merchant would achieve
without the system. All of the same processes that the merchant must
have in place to support an in-store or catalog purchase must also be in
place for an electronic purchase: product information, inventory systems,
customer service, transaction capabilities (including credit authorization,
tax computation, financial settlement, and shipping), and delivery
infrastructure.
UP Open University
There two models of e-commerce, namely: B2C and B2B. B2C is short for
Business-to-Consumer model of e-commerce. These are businesses that
sell products or provide services to end-user consumers. While B2B is short
for Business-to-Business model of e-commerce. These are businesses that
sell products or provide services to other businesses.
Examples of e-commerce are:
1. buying a book from amazom.com and paying for it by providing credit
card information online.
2. downloading a piece of software like Webshots desktops and paying
for it online.
3. checking the weather, news and movie reviews and paying for them
by your attention to online advertisements.
4. checking eBay auction web site, to find a car part.
5. paying $20 a month to AOL so you can maintain your US Internet
account.
To illustrate how e-commerce is done, consider the e-commerce site of
Pizza Hut below.
UP Open University
Module 6
191
UP Open University
Figure 6-14. Provide personal information so that the pizza can be delivered.
Activity 6-23
Search the Internet for e-commerce applications. What are the
common characteristics of these applications?
UP Open University
Module 7
Computer Ethics
Objectives
At the end of this module,
you should be able to:
1. Discuss the different
issues related to computer ethics; and
2. Differentiate what is an
ethical act and what is
not.
Activity 7-1
It is normal to consider an act ethical in one society and unethical
in another. Why is this so?
Denial of service
A denial-of-service attack is characterized by an explicit attempt by
attackers to prevent legitimate users of a service from using that service.
Use of a computer, access to an account and access to search engines are
examples of services. Examples denial-of-service attacks are the following:
1. attempts to flood a network, thereby preventing legitimate network
traffic from arriving to their intended destination;
2. attempts to disrupt connections between machines in a network,
thereby preventing access to a service found in one of the machines in
the network;
3. attempts to prevent a particular individual from accessing a service,
e.g., stealing the password of another person and then changing the
password of his account so that he will be prevented from using his
own account;
4. attempts to disrupt a service to a specific system, e.g., changing the
content of a web page so that the original web page will not be
accessible anymore.
UP Open University
Module 7
195
Activity 7-2
Which of the following are denial-of-service attacks?
a.
b.
Hacking
Hacking involves unauthorized access to a computer, its files and
programs. The keyword in the definition is unauthorized access. Some
hackers do unauthorized access by stealing passwords from legitimate
users and getting access to the account of a legitimate user. In some cases,
a hacker may get to access files via openings or bugs in the operating
systems whereby a hacker is allowed to access files even though they do
not own them.
There are many reasons why hackers hacked computers. Some of these
reasons are given below.
1. The first reason is theft of service, if a system offers some type of service
and a hacker has a use for it, they will hack the system. For example,
hacking into a system to use the CPU for free or hacking a system to
use it for sending emails for free.
2. The second reason a hacker may hack into a system is to take valuable
files, e.g., credit-card numbers and list of customers. The information
may be sold by a hacker to rival companies.
UP Open University
Module 7
197
Activity 7-3
Discuss whether the following is a case of hacking or not. Argue
for the position you take.
A person accidentally found an account name together with the
password. He log in using the account and then left a message
inside the account giving advise to the owner to take good care of
his account name and password.
UP Open University
Flaming
Flaming is the sending of abusive email or messages to other people or
newsgroups. You flame people when you disrespect their opinion and
become abusive, attacking them personally, calling them names or
questioning their parentage. Flaming is considered bad online conduct
and is not tolerated well in chat rooms or newsgroups. Individuals can
quickly be turned on by other people in the chat room or newsgroup. It is
best to practice good online conduct and avoid getting into personal
confrontations with other people.
To illustrate flaming, consider the following email message to a group of
users or it could be posted in newsgroups.
UP Open University
Module 7
199
Activity 7-4
What is a flame war?
Spamming
Spam, or sometimes called unsolicited commercial email, is the Internet
version of junk mail. It is an attempt to deliver a message, over the Internet,
to someone who would not otherwise choose to receive it. Almost all spam
is commercial advertising. Potential target lists are created by scanning
Usenet postings, stealing Internet mailing lists, or searching the web for
addresses. Such information is gathered with automated searches to
retrieve e-mail addresses for spamming. The low cost of e-mail spamming
engines offered for sale with millions of email addresses, coupled with the
fact that the sender does not pay extra to send email, has resulted in the
current explosive growth of junk email. Currently, unless the spammer
offers to sell illegal items, there is no legal remedy to use to stop the e-mail
spammers.
Spamming is not acceptable conduct since you may be sending emails to
people who do not want to receive them. Many ISPs now have policies
on spamming, which will involve the disabling of the offenders account.
In some countries, this practice is illegal.
To illustrate spamming, consider the following spam which was once
circulated in the Internet.
FROM: [email protected]
TO: Eliezer A. Albacea ([email protected])
SUBJECT: Used tractors for sale!
Eli!
Our company is disposing several used tractors to selected clients. Each
tractor costs P500,000 only. If you buy three tractors, you get one free.
It is very cheap so hurry and order one now.
UP Open University
ABC Company
777 Rizal Street
Calamba City
Laguna
Activity 7-5
There are spam filters available now for use by email servers.
Outline a method used by these spam filters in order to detect a
spam.
UP Open University
Module 7
201
Activity 7-6
What is the difference of a worm from a virus?
Internet hoaxes
Interspersed among the junk mail and spam that fills our Internet e-mail
boxes are dire warnings about devastating new viruses, Trojans that eat
the heart out of your system, and malicious software that will destroy
everything you have in your hard disk. Added to that are messages about
free money, children in trouble, and other items designed to grab you and
get you to forward the message to everyone you know. Most all of these
messages are hoaxes or chain letters. While hoaxes do not automatically
infect systems like a virus or Trojan, they are still time consuming and
costly to remove from all the systems where they exist.
UP Open University
UP Open University
Module 7
203
Activity 7-7
Internet hoaxes are also sometimes called spams. Why?
Activity 7-8
Match
____ 1. Explicit attempt by attackers
to prevent legitimate users
of a service from using the
service
____ 2. Unauthorized access to a
computer
____ 3. Sending of abusive email
to other people
____ 4. Unsolicited commercial email
____ 5. Program that reproduces
itself with you knowledge
a.
b.
c.
d.
e.
spam
virus
denial of service
hacking
flame
UP Open University
Privacy Issues
There are many reasons why there is a need to hide your real identity
when you use the Internet. You might want to protect yourself against an
oppressive government, or trying to simply hide yourself from advertisers
in the net.
Although everyone takes privacy in normal life for granted, trying to get
the same level of privacy on the Internet (or even on your own computer)
is a little less accepted, and sometimes a bit more complicated. While the
general attitude is hard to change, many ways exist to enhance your
privacy online. One example of enhancing privacy online is the use of
encryption in every transaction you make in the Internet.
Several examples where privacy is an issue are:
1. Database privacy - the information you supplied to databases should
only be used for their intended purpose. They should not be distributed
openly thus compromising your privacy. For example, it is unethical
of banks to sell clients account information to other banks?
2. Email privacy - what you write in your emails should only be seen by
you and the intended recipients and nobody else. This should be the
ideal situation. It is therefore unethical for systems administrators who
have access to your accounts to read your mail sent folders and
mailboxes.
3. Privacy on the web - the web sites you visited should only be known
to you and nobody else. Because of access logs, the web sites you visited
may be known especially to system administrators who have access to
these logs.
Activity 7-9
Privacy is an issue in the following, except ____.
a.
b.
c.
d.
e.
email privacy
database privacy
privacy on the web
personal privacy
none of the above
UP Open University
Module 7
205
Activity 7-10
When you post a message in a public bulletin board with your
email address included in the message, they say you are giving up
your privacy. Argue for and against this?
UP Open University
office. The question is, is this ethical? In some countries this is ethical and
legal while in others they are considered unethical and illegal. Are repetitive
injuries an issue? Repetitive strain injuries are almost synonymous to
back injuries. This is the injury you get if you continuously sit in front of
your computer during office hours. The issue is, are you entitled to
compensation for this? Finally, electromagnetic radiation is an old issue.
There is a belief that radiation emitted by your computer monitor is harmful
to your health. But this has not been proven medically yet. The issue again
is, are you entitled to compensation for this?
Activity 7-11
The rich will always have an advantage over the poor when it
comes to access to technology. Since there will always be rich and
poor people, this inequity is permanent. Can you identify some
more examples of permanent inequity?
Module 7
207
Union filed suit in Philadelphia on the ground that the statute banned
speech protected by the First Amendment and subjected the Internet to
restrictions that were out of line with regulations faced by other mediums.
After an injunction suspending the enactment of the law was passed in
the US District Court, the case of Reno v. ACLU proceeded to the US
Supreme Court. On June 26, 1997, the Court voted unanimously that the
act was a violation of the First Amendment. This is the reason why you
can find a lot of indecent US-based materials in the Internet.
Is it okay to write a hate speech on Islamic Fundamentalist and disseminate
the same in the Internet. Or, it is okay to write hate speech on a certain
person and then disseminate this on the Internet. Another is the setting
up of web sites for hate materials or for racist propaganda. Again, this
issue must be settled on whether this activity is ethical or not. Some
countries in Europe are in fact thinking of outlawing hate speech online,
although in Great Britain it is already illegal to publish material likely to
incite racial hatred. The British law, however, is silent when the servers
where the materials are published are found outside of Great Britain.
Finally, some networks employ the use of Internet filters to block access to
sites considered pornographic, for example. Some people consider this as
censorship. Is this an ethical behavior on the side of organizations blocking
access to sites considered by them as harmful.
Again, let look at the US case in this issue. The US passed in December
2000 the Childrens Internet Protection Act (CIPA) that requires all schools
and libraries receiving e-rate discounts or other federal assistance for
Internet access to install filters on all computers used by adults as well as
minors. The Clinton Administration encouraged filtering as a response to
the Supreme Courts 1997 decision striking down the Communications
Decency Act (CDA), which, is an attempt to block minors from Internet
pornography, criminalized virtually all indecent or patently offensive
communications online.
Activity 7-12
In the Philippines, what law are you violating when you put up
servers with pornographic content?
UP Open University
Software piracy
Software piracy is an act of using a software without paying the appropriate
license. Every time we do this, is the same as stealing from the software
developer. The ethical implication is of course quite obvious. Since stealing
is bad, piracy is also bad.
Software is one of the most valuable technologies of the Information Age,
running everything from PCs to the Internet. Unfortunately, because
software is so valuable, and because computers make it easy to create an
exact copy of a program in seconds, software piracy is widespread. From
individual computer users to professionals who deal wholesale in stolen
software, piracy exists in homes, schools, businesses and government.
Software pirates not only steal from the companies that make the software,
but with less money for research and development of new software, all
users are hurt. Thats why all software piracy - even one copy you make
for a friend - is illegal.
UP Open University
Module 7
209
There are several types of software piracy. Three of them are as follows:
1. End user piracy - Using multiple copies of a single software package
on several different systems or distributing copies of software to others.
2. Reseller piracy - Reseller piracy occurs when an unscrupulous reseller
distributes multiple copies of a single software package to different
customers; this includes preloading systems with software without
providing original manuals , CDs, or diskettes. Reseller piracy also
occurs when resellers knowingly sell counterfeit versions of software
to unsuspecting customers. Indications of reseller piracy are multiple
users with the same serial number, lack of original documentation or
an incomplete set, and non-matching documentation.
3. BBS/Internet piracy - BBS/ Internet piracy occurs when there is an
electronic transfer of copyrighted software. If system operators and/
or users upload or download copyrighted software and materials onto
or from bulletin boards or the Internet for others to copy and use
without the proper license.
Activity 7-13
Which of the following is piracy?
a. You borrowed from a friend a copy of the software that you
used for a limited time (one week) only.
b. You sold to a friend a software which you bought legally, but
you kept a copy of it.
c. You sold to a friend a software which you bought legally, but
you did not keep a copy of it.
d. You let your friend use the software which is installed in your
own computer.
UP Open University
Plagiarism
Another recent issue is plagiarism. Plagiarism is a difficult concept to
define. Plagiarism is considered a form of fraud and/or theft. Plagiarism
occurs anytime that a person copies any written work and claims it as
his/her own. It includes a range of actions from failure to use proper
citation to wholesale cheating. A student who plagiarizes may do so
unintentionally or with planned deliberation. With the advent of the
Internet, plagiarism has become very rampant. The most common type of
plagiarism is the cut-and-paste plagiarism. Students when preparing term
papers simply cut from the Internet text relevant to their topic and paste
this in their term papers. Of course, it is considered cheating and therefore
unethical. The worst type of plagiarism is when the student simply
downloads a term paper from the Internet and submit this as his/her
own. There are many sites in the Internet where term papers are
downloadable for free.
Activity 7-14
Which of the following is plagiarism?
a. You submit a report which basically is a report downloaded
from the Internet. However, you explicitly stated in the report
where it came from.
b. You made a report where one paragraph come comes from one
document, another paragraph from another document, and
another comes from another document and so on.
c. You downloaded a graphics picture from the Internet and use
it in your report.
UP Open University
Module 7
211
UP Open University
Lotus sued Paperback Software and Mosaic Software, who had produced
spreadsheets that had the same interface as 1-2-3. There is no copying of
code, but Lotus claimed that copying the interface itself is copyright
infringement. Lotus won the case and Paperback and Mosaic went out of
business.
Lotus then sued Borland over Quattro. Even though Quattros user
interface is different from Lotus 1-2-3, Quattro followed the Lotus menu
hierarchy and Lotus claimed this is copyright infringement. Lotus won at
the District court, but Borland appealed and won in the US First Circuit
court. This case was elevated to the US Supreme court, but the highest
court was split and thus no decision was made on this case.
Activity 7-15
Suppose I write an operating system from scratch but the look and
feel of my operating system is very much like Microsoft Vista. Is
this a copyright infringement case or not?
Computer Crimes
When a country has instituted laws against computer abuses, a computer
abuse becomes a computer crime. But not all abuses constitute a crime.
For example, consider a hacker who breaks into someones computer
system without permission. If the hacker steals confidential data from the
system this is considered a crime in some countries. While a hacker who
simply gets into the system explore the system to see how it works and
what files it contains, though breaching privacy may not be considered a
crime in some countries. But both acts are unethical. Below we show actual
examples of computer crimes. These cases happened in the US where
computer crime laws are well established. Most of these cases resulted to
a conviction of the crime committed.
Module 7
213
UP Open University
Hacking
A Boston man was charged with using his home computer to illegally
gain access to a number of computers, including those controlled by NASA
and an agency of the U.S. Department of Defense, where, among other
things, he intercepted login names and passwords, and intentionally
caused delays and damage in communications.
In April 1999, the hacker obtained unauthorized access to a corporate
internet account which he then used to illegally access a computer
controlled and operated by the U.S. Defense Logistics Agency. He then
concealed his actual computer address through a service known as telnet
proxy which created the appearance that his address was that of the
governments computer. Once hidden, he accessed, without
authorization, the web site of internet service provider, ZMOS, and
recklessly caused damage to the ZMOS computer located in the State of
Washington. As a result, ZMOS, which hosts corporate web pages and
provides internet service for corporate customers, suffered a significant
loss of business.
UP Open University
Module 7
215
Beginning in May 1999 and continuing until August, 1999, the hacker
obtained unauthorized access to the same corporate internet account this
time using it to access the NASA computer research project web server
located in Maryland. He seized control of the NASA computer, allowing
him to read, delete or modify any files on the system. He then installed a
sniffer program onto the system to intercept and save login names and
passwords of users that were transferred over the NASA system for his
own later use. The compromised NASA web server did not contain
classified or sensitive information and was not involved in any way with
satellite command or control.
The hacker also used the NASA computer as a platform to launch attacks
on other computer systems, such as an attack on the U.S. Department of
the Interiors web server where he defaced its web page with hacker graphics.
The information also alleges that the hacker accessed various computers
operated by Northeastern University from which he illegally copied a file
containing the names, dates of birth, addresses and social security numbers
of numerous men and women affiliated with the University, either as
students, faculty, administration or alumni. Investigators are not aware
of any use or dissemination of this information. Northeastern University
cooperated fully with investigators on this matter.
If convicted, the hacker faces a maximum penalty of 10 years incarceration
and a fine of $250,000.
Stock fraud
Two former Cisco Systems, Inc., accountants were each sentenced to 34
months in prison for exceeding their authorized access to the computer
systems of Cisco Systems in order to illegally issue almost $8 million in
Cisco stock to themselves.
In pleading guilty, both accountants admitted that between October 2000
and March 27, 2001, they participated together in a scheme to defraud
Cisco Systems in order to obtain Cisco stock that they were not authorized
to obtain. As part of the scheme, they exceeded their authorized access to
computer systems at Cisco in order to access a computer system is used by
the company to manage stock option disbursals, used that access to identify
control numbers to track authorized stock option disbursals, created forged
forms purporting to authorize disbursals of stock, faxed the forged requests
to the company responsible for controlling and issuing shares of Cisco
Systems stock, and directed that stock be placed in their personal brokerage
accounts. The two defendants admitted that the first time that they did
this, in December 2000, they caused 97,750 shares of Cisco stock to be
UP Open University
placed in two separate Merrill Lynch accounts, with 58,250 of the shares
deposited in an account set up by by one of them and 39,500 shares
deposited in an account set up by the other accountant. In February 2001,
they caused two additional transfers of stock, in amounts of 67,500 shares
and 65,300 shares, to be transferred to brokerage accounts in their names.
The total value of the Cisco stock that they took on these three occasions
(at the time that they transferred the stock) was approximately $7,868,637.
Spamming
In a 1998 lawsuit brought by America Online against an unsolicited
commercial e-mail sender, the judge awarded AOL compensatory and
punitive damages, and permanently barred the commercial e-mail sender
from sending bulk unsolicited commercial e-mail to AOL members or
through AOL services.
In another lawsuit, Hotmail sued a company for allegedly providing false
e-mail header information in unsolicited commercial e-mail which made
it appear that the messages originated from Hotmail accounts. In that
lawsuit, a federal court in California found that Hotmail established a
likelihood of success of establishing false designation or origin, unfair
competition, dilution, violations of the Computer Fraud and Abuse Act,
breach of contract, fraud, misrepresentation and trespass to chattel and
issued a preliminarily injunction enjoining the defendant company from
falsely designating Hotmail addresses as the point of origin of their
commercial e-mail messages.
Module 7
217
Activity 7-16
Which of the following is not a computer crime in the US?
a.
b.
c.
d.
e.
hacking
spamming
virus creation and unleashing
sending of hate email to another person
none of the above
UP Open University
ORIGINAL WORKS
SEC. 172. Literary and Artistic Works
172.1 Literary and artistic works, hereinafter referred to as
works, are original intellectual creations in the literary and artistic
domain protected from the moment of their creation and shall include
in particular
(a)
(n) Computer programs;
172.2. Works are protected by the sole fact of their creation,
irrespective of their mode or form of expression, as well as of their
content, quality and purpose.
The law also clearly states what is legal in terms of reproducing computer
programs.
UP Open University
Module 7
219
Activity 7-17
True or False.
It is perfectly legal to have one backup copy of a software even
without the permission of the owner of the copyright.
Finally, included in the law are the penalties for infringement of the
Copyright Law.
UP Open University
This law was tested in the case Microsoft, Corp. vs. Harold Chua. The
case is the first win of Microsoft, Corp. in local courts when it comes to
Intellectual Property Rights violation. A summary of this case is published
in Poblaw Newletter and is given at the next page.
UP Open University
Module 7
221
UP Open University
Activity 7-18
Computer programs are copyrightable but not patentable. What
is the difference of a patent from a copyright?
UP Open University
Module 7
223
UP Open University
UP Open University
Module 7
225
Activity 7-19
True or False.
An electronic signature is equivalent to an ordinary signature under
the E-Commerce Law of the Philippines.
Finally, the law stipulates penalties for certain violations covered by this
law.
UP Open University
UP Open University
Module 7
227
The landmark case was filed in Pasig, a city south of Manila, since
Garcia supposedly used the telephone number of her residence in a
subdivision located in the city to hack into Thames.
The school, an international college affiliated with universities in the
United Kingdom, is owned and operated by Vivienne Tan, daughter
of beer and tobacco magnate Lucio Tan. It is located in a building in
San Juan, a municipality next to Pasig.
During the trial, Robert Lim, counsel for the accused, filed a motion
to dismiss the case. The presiding judge rejected the move saying
the case was only on its first day of trial.
Lim questioned the documents presented by the plaintiffs and
demanded that the contending party issue a list of evidences allegedly
used by Garcia to commit the unauthorized access.
The schools lawyer, Charlton Jules-Romero, argued that the
evidences have already been presented in the pre-trial stage. Im
afraid this will become a fishing expedition because we have submitted
all the documents.
In her counter-affidavit filed in court, Garcia said she did not commit
the crime unauthorized access since the password to the Thames
account was freely given to her by Maalac.
He also told me to that it was common practice for other employees
to sometimes access and use the account, as long as the school
was not using it, she claimed.
On this basis, she said the one of the elements of hacking unauthorized access -is not present. Garcia added the complaint
was unfounded and was only filed to harass and destroy her
reputation.
She bewailed the fact that Thames failed to file an administrative
case against her although she was still working for the school when
the alleged crime happened. She said she was never subpoenaed
by the NBI regarding the investigation and only read her name in the
newspapers.
UP Open University
The second hearing has been set for June 19, wherein the prosecution
is expected to present its two principal witnesses. They are Martin
Salazar of Net Gen IT, the Internet service provider of Thames which
was purportedly able to record the phone number used by Garcia,
and Jaime Noel Santos, co-founder of Thames.
UP Open University
Module 7
229
Privacy issues are addressed in the law. One section says that access
to an electronic file, signature or document shall be limited only to
those that are authorized to possess and use it. Electronic keys used
for identity and integrity may only be made available to another upon
consent of the individual in lawful possession of the key. Another
section obliges those who obtain access to an electronic key, signature
or document not to convey or share the same with another. These two
sections are important in that it recognizes that these files are property
of an individual and can be possessed only by another upon the consent
of its owner. It further recognizes the privacy and personal nature of
the key by obliging those who gets to possess it not to share it with
others.
Security issues are addressed also in the law. While the law deals with
penalties, its net effect is to help create a more secure environment for
electronic transactions. This law specifically punishes hacking or
cracking which has been defined as either unauthorized access or
interference in a computer system or any other type of accessauthorized or not- with the intention to destroy, corrupt, alter, or steal
data. Included in this definition is the introduction of viruses. Penalty
is rather steep by contemporary Philippines standards: a minimum
fine of P100,000 and mandatory imprisonment of from six months to
three years.
Piracy or the unauthorized copying, reproduction, dissemination,
distribution, importation, as well as broadcast of protected works is
also punishable by penalties ranging from a minimum fine of P100,000
and mandatory imprisonment of from six months to three years.
The extent of liability of service providers is tackled in law. Under this
law no person or party shall be held liable for any data message to
which the party - acting as a service provider- merely provides access,
subject to certain requirements. Service providers who have no
knowledge that the materials passing through them are unlawful and
those who do not financially benefit directly from such unlawful
activity, or do not commit an unlawful act need not be penalized. This
refers to materials that pass through a provider that may either be
libelous, seditious, or is a pirated material, etc. The service provider is
not tasked with monitoring every material that passes through his
facilities as that may either be impossible or an undue invasion of the
privacy interests of others.
All existing laws such as the Consumer Act of the Philippines also
applies to e-commerce transactions.
UP Open University
Activity 7-20
What computer crimes are covered by the E-Commerce Law of
the Philippines?
References
Trends in IT Research, http://www.ccic.gov/ac/report/
Information Technology Impacts, http://www.anu.edu.au/people/
Roger.Clarke/SOS/ITImpacts.html
Evolution of Computers, http://history.acusd.edu/gen/recording/
computer1.html
History of Computers http://www.scri.fsu.edu/~odyssey/cyberkids/
computers/history/ and http://www.digitalcentury.com/encyclo/
update/comp_hd.html
Wikipedia Page, The free encyclopedia, http://en.wikipedia.org/wiki/
Main_Page
Intel Consumer Desktop PC Microprocessor History Timeline available in
http://www.intel.com/pressroom/archive/backgrnd/
30thann_timeline.pdf.
Boyce, J.C., Digital Logic: Operation and Analysis, Prentice-Hall, 1982.
Hayes, J.P., Digital Logic Design, Addison-Wesley, 1993.
IBM PC Assembly Language Programming, Prentice-Hall, 1991.
Hamacher, V.C. and others, Computer organization, McGraw Hill, 1984.
Hayes, J.P., Computer Architecture and Organization, McGraw Hill, 1988.
Scanlon, L.J. 8086/8088/80286 Assembly Language, Brady, 1990
(Philippine Reprint).
Tanenbaum, A.S. Structured Computer Organization, Prentice-Hall, 1984.
Thorne, M., Computer Organization and Assembly Language
Programming, Benjamin/Cummings, 1991.
UP Open University
Module 7
231
Module 7
233
UP Open University
Index
4004 Microprocessor, 27
8008 Microprocessor, 27
80286 Microprocessor, 27
80386 Microprocessor, 27
80486 Microprocessor, 27
8080 Microprocessor, 27
8086-8088 Microprocessor, 27
abacus, 6, 7
Abacus, 6, 7
access control, 129, 130
Active Server Pages, 189
Adobe Acrobat Reader, 188
Advanced Micro Devices, 28
agent, 114, 115, 116, 171, 173
AI, 104, 106, 107, 108, 109, 111, 114, 117
AIBO, 105, 106
Al Gebr Wel Mukabala, 7, 8
Al Khwarismi, 7
Alexander Graham Bell, 148
algorithm, 119
ALU, 35, 36, 38, 39
AMD, 28
amplitude modulation, 163
Analytical Engine, 13, 14
Anti-Virus, 252
Arithmetic Logic Unit, 35
ARPANET, 168
Artificial Intelligence, 2, 90, 104, 107, 250
artificial life, 2
ASCII, 174, 188, 196
assembler, 76
Atlas, 20
ATM, 1, 2, 24, 29, 82
audio conferencing, 102
Audion, 16
automatic job sequencing, 76
Automatic Teller Machine, 1
automation, 24, 101
B, 251
batch operating system, 77
batch system, 77
Bendix G-15A, 24
bit, 25, 26, 36, 39, 40, 41, 42, 50, 57, 65, 66, 67, 129, 132, 143, 148, 160,
UP Open University
Module 7
235
161, 218
bit-map graphics display, 57
bits per second, 143, 160, 161, 163
Blaise Pascal, 11
Bridges, 138
broadcast, 124, 131
Broadcast Radio Communication, 146
bulletin board system, 100, 176
bus, 35, 40, 43, 64, 65, 66, 67, 68, 125, 126, 127, 128, 129, 132, 133
bus topology, 126
byte, 25, 39, 40, 43, 50, 65
calculating clock, 10
card reader, 75, 76, 77
Cathode Ray Tubes, 57
CD-R, 48
CD-ROM, 46, 49
Celeron, 28
cell phone, 32, 33, 147
Census Calculators, 15
Central Processing Unit, 34, 71, 72, 73, 77, 79
character display, 56
Charles Babbage, 13
Chat, 178
Clifford Berry, 17
clock, 32, 68
Coaxial Cable, 142, 143
COBOL, 75, 76
Colossus, 18, 19
compiler, 75, 76
Computer vision, 113
computer conferencing, 102
Computer Crimes, 227
Computer Ethics, 206
computer network, 122
computer system, 34, 35, 39, 52, 71, 72, 78, 79, 170, 227, 231, 242, 243
computer technology, 1
computer vision, 2
Concentrators, 137
control keys, 53, 55
control unit, 19, 35, 37, 38
counter, 37, 134, 244
CPU, 31, 34, 35, 37, 39, 40, 41, 43, 69, 71, 73, 77, 78, 208, 210
CPU scheduler, 73
CRT, 20, 57, 58, 98
Cryptography, 252
CSMA/CD, 129, 130
UP Open University
Cursor-Tracking Devices, 59
Cyrix, 28
Data Communication, 122, 148, 252
database, 32, 90, 91, 92, 93, 94, 96, 103, 119, 197, 198, 199, 233
Database privacy, 219
Deep Blue, 104
Denial of Service, 207, 252
desknote, 32
desktop computer, 31
desktop publishing, 32, 96, 97
device driver, 72, 73, 75
Difference Engine, 13, 14
disk, 71
disk controller, 44
Disk Operating System, 71
diskettes, 45, 224
display screen, 56
distributed operating system, 79
DIX, 129
domain name, 183, 184, 185
Dot matrix, 61
DRAM, 41
DVD-ROM, 49
Dvorak layout, 53
dynamic RAM, 41
E-commerce, 2, 201
Edison effect, 16
Edward H. Shortliffe, 104
electronic mail, 2, 100, 169, 185
Electronic Recording Machine Accounting, 24
E-mail, 100, 170, 171, 174, 175
Email Addresses, 185
Email privacy, 219
Encryption, 223
ENIAC, 20
Enigma, 18
EPROM, 42
ERMA, 24
Ethernet, 128, 129, 130, 131
Eudora, 171, 174
expert systems, 2, 104, 113, 114, 117
eXtensible Markup Language, 190
Faggin, 26
FAQ, 177
Fast Ethernet, 129, 131
FDDI, 134, 135
UP Open University
Module 7
237
Module 7
239
memory-address register, 36
memory-data register, 36
MESM, 20, 21
microcomputer, 29, 30, 31
microorders, 37
microprocessor, 16, 25, 27, 31, 72
Microprocessors, 25
Microsoft Outlook Express, 174
Microsoft Word, 96, 174, 228
Microwave Communication, 144
minicomputer, 29, 30
modulation, 16, 161, 163, 164, 165
Mohammed Ibn Musa Abu Djefar, 7, 8
monitor, 132
mouse, 59, 60, 110, 144, 187, 190
Multi User Dimension, 178
multiprocessor, 72
multiprogramming, 77, 78
Mycin, 104
Napiers Bones, 9
natural language processing, 2, 108, 109
Natural language processing, 108
Netscape Messenger, 174
network, 78, 122, 123, 124, 125, 127, 129, 130, 132, 134, 135
Network Cabling, 139
Network Interface Cards, 136
network operating system, 78
Network Topologies, 126
Networking Hardware, 135
Networking Protocols, 128
neural networks, 2, 114
nodes, 122, 124, 135
notebook, 31, 32
numeric keypad, 53, 54, 55
operating system, 55, 70, 71, 72, 73, 74, 75, 78, 79, 80, 81, 135, 168
optical character reader, 64
optical mark reader, 64
Optical memories, 46
overflow, 35, 36
packet switcher, 122
Pascaline, 11
Pathfinder, 105
PDA, 32, 33
Pentium, 27, 28
Personal Computer, 71, 78
Personal Computers, 26, 78
UP Open University
Module 7
241
UP Open University
UP Open University