0% found this document useful (0 votes)
71 views

Employment and Industrial Law: JANUARY 2019 CBCT2203

This document provides an introduction to basic concepts of information technology. It discusses the differentiation between the web and the Internet, explaining that the Internet is a worldwide collection of computer networks that connects devices, while the web is an information space of hyperlinked documents accessible via the Internet. It also explains the purpose of a browser as a software that enables users to view web pages, a search engine as a software that finds websites and other information related to search topics, and an online social network as a platform for users to connect with others and share information.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
71 views

Employment and Industrial Law: JANUARY 2019 CBCT2203

This document provides an introduction to basic concepts of information technology. It discusses the differentiation between the web and the Internet, explaining that the Internet is a worldwide collection of computer networks that connects devices, while the web is an information space of hyperlinked documents accessible via the Internet. It also explains the purpose of a browser as a software that enables users to view web pages, a search engine as a software that finds websites and other information related to search topics, and an online social network as a platform for users to connect with others and share information.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 14

EMPLOYMENT AND INDUSTRIAL LAW

JANUARY 2019

CBCT2203

BASIC CONCEPTS OF INFORMATION TECHNOLOGY

LECTURER : FATHIN FAKHRIAH BINTI ABDUL AZIZ

NAME : MUHAMMAD NORMIZI BIN GHAZALLI

STUDENT ID : 730623035223001

NRIC/Passport No : 730923-03-5223

TELEFONE : 013-9280073

E-MAIL : [email protected]

LEARNING CENTRE : KOTA BHARU


CONTENTS PAGE

1.0 INTRODUCTION 1

2.0 Differentiation between the web and the Internet 2

3.0 Explanation about the purpose of a browser, a search engine,


an online social network 4

4.0 Explanation about the digital security risks associated with ,


viruses and other malware, privacy, health , environment 6

5.0 Differentiation between an operating system and applications 7

6.0 Differentiation between wired and wireless network technologies,


Discussion about the reasons individuals and businesses use networks. 8

7.0 Conclusion 11

8.0 References 12
1.0 Introduction

The mastery of information technology has its benefits to the community, in particular, to
make the society of this nation a society that is always aware of the world's development and
upheaval. Through advancement in the field of information dissemination, the people of this
country will not be left behind to keep up with the flow of development all over the world.
This is evident when all the information passed will be accepted faster by the global
community. Just by having a personal computer connected to internet service, people can get
information from around the world by simply moving the mouse to get the latest information
in any field.Websites have many functions and can be used in various fashions; a website can
be a personal website, a commercial website, a government website or a non-profit
organization website. Websites can be the work of an individual, a business or other
organization, and are typically dedicated to a particular topic or purpose. Any website can
contain a hyperlink to any other website, so the distinction between individual sites, as
perceived by the user, can be blurred. Websites are written in, or converted to, HTML (Hyper
Text Markup Language) and are accessed using a software interface classified as a user
agent. Web pages can be viewed or otherwise accessed from a range of computer-based and
Internet-enabled devices of various sizes, including desktop computers, laptops, tablet
computers and smartphones. A website is hosted on a computer system known as a web
server, also called an HTTP (Hyper Text Transfer Protocol) server. In this case, the "Global
Village" theory developed by Marshall McLuhan that says the world is not restricted to any
boundary but only the digital divide that separates some places to access the Internet is very
precise. For example, the Malaysian community will easily follow the political upheavals in
the East Central and Russia through their computer screen with the mastery of this
technology. In short, the mastery of information technology can make Malaysians a society
that informs the latest global information.

1
2.0 Differentiation between the web and the Internet

Nowadays, technology changes so many times and it keep changing to make our life a little
bit easier. We must keep up with the changes to remain digitally literate. Digital literacy
means someone having a current knowledge and understanding of computers, mobile
devices, the web, internet and related technologies.

There are many points that we can differentiate between the Web and the Internet. Many
people think that these two technologies are same but are they really the same. Peoples use
the terms World Wide Web (aka. the Web) and Internet interchangeably, but in fact these two
terms are not the same. The Web and the Internet are two separate things but it can relate in
certain situations.

Firstly, let me explain the meaning of Internet which is a worldwide collection of computer
networks that connects millions of businesses, government agencies, educational institutions
such as schools or universities, NGOs, bodies and individuals. The internet is decentralized.
Each internet computer is independent. There are a variety of ways to access the internet.
There are more than 3.5 billion internet users in the world.

The Internet is a contraction  of  interconnected network which is the global system of


interconnected computer networks that use the Internet protocol suite to link devices to whole
world. It is a network of networks that contains of private, public, academic, business, and
government networks of local to global scope, linked by a broad array of electronic, wireless,
and optical networking technologies. The Internet carries a vast range of information
resources and services, such as the inter-linked  hypertext documents and applications of
the World Wide Web (WWW), electronic mail, telephony, and file sharing.

Next is the meaning of The World Wide Web or commonly known as the WWW as short
form or the Web, is an information space where documents and other web resources are
identified by Uniform Resource Locators (URLs, such as https://www.example.com/), which
may be interlinked by hypertext, and are accessible via the Internet. to anyone connected to
the Internet The World Wide Web (or web, for short) is a global library of information
available. The resources of the Web may be accessed by users via a software
application called a web browser.
2
Another way to look at this difference is the Internet is infrastructure while the Web is service
on top of that infrastructure. Alternatively, the Internet can be viewed as a big book-store
while the Web can be viewed as collection of books on that store. At a high level, we can
even think of the Internet as hardware and the Web as software. The internet is a
massive network of networks, a networking infrastructure. It connects millions of computers
together globally, forming a network in which any computer can communicate with any other
computer as long as they are both connected to the internet. Information that travels over the
internet does so via a variety of languages known as protocols.

2.1 The relationship among the web, webpages, websites, and web services.

The resources of the WWW may be accessed by users via a software application called a web
browser. English scientist Tim Berners-Lee invented the World Wide Web in 1989. He wrote
the first web browser in 1990 while employed at CERN near Geneva, Switzerland. Web
resources can be in any type of downloadable media, but web pages are hypertext media
which have been formatted in Hypertext Markup Language or (HTML). Such formatting
allows for embedded hyperlinks which contain URLs and permit users to easily navigate to
other web resources. In addition to text, web pages involves in images, video, audio, and
software components that are rendered in the user's web browser as coherent pages
of multimedia content.

Wide Web, or simply web, is a way of accessing information over the medium of the
internet. It is an information-sharing model that is built on top of the internet. The web uses
the HTTP protocol, only one of the languages spoken over the internet, to transmit data. Web
services, which use HTTP to allow applications to communicate in order to exchange
business logic, use the the web to share information. The web also utilizes browsers, such
as Internet Explorer or Firefox, to access Web documents called webpages that are linked to
each other via hyperlinks. Web documents also contain graphics, sounds, text and video.
The Web is a Portion of The Internet. The web is just one of the ways that information can be
disseminated over the internet. The internet, not the web, is also used for email, which relies
on SMTP, Usenet news groups, instant messaging and FTP. So the web is just a portion of
the Internet, albeit a large portion, but the two terms are not synonymous and should not be
confused.   

3
3.0 Explanation about the purpose of a browser, a search engine, an online social
network.

Now, i will explain the purpose of a browser, a search engine, and an online social network.
Browser is a software that enables users with an Internet connection to surf and view web
pages on a computer or mobile device. Browser is the application which is used for retrieving
the information on the World Wide Web. there are many web browsers which are provided
for accessing the information sush as Google Chrome, Mozilla, Internet Explorer and many
more. the purpose of web browser is to retrieve and transmit the data from one location to
another. It uses hyperlink for navigating from one page to another. It also fetches the data
such as video, images, contents, and the entire thing related to the web with the help of
WWW it provides the resources to the web browser. Web browser is used to run the software
application that allows retrieving, presenting and traversing the information from one place to
another. Web browser defines the application software that is designed for the user to access
and retrieve the documents using the Internet.

3.1 Secondly, a search engine is a software that finds websites, webpages, images, videos,
news, maps, and other information related to a specific topic. A web search engine or Internet
search engine is a software system that is designed to carry out web search (Internet search),
which means to search the World Wide Web in a systematic way for particular information
specified in a web search query. The search results are generally presented in a line of results,
often referred to as search engine results pages (SERPs). The information may be a mix
of web pages, images, videos, infographics, articles, research papers and other types of files.
Some search engines also mine data available in databases or open directories.

Unlike web directories, which are maintained only by human editors, search engines also
maintain real-time information by running an algorithm on a web crawler. Internet content
that is not capable of being searched by a web search engine is generally described as
the deep web. is used for searching the information which is present in the web. searching in
the search engine done with the help of keyword. some of the examples of search engine are
Google, Bing, Opera and Yahoo. purpose of search engine are to locate the information
which the user is seeking.

4
3.2 Thirdly, an online social network encourages members to share their interests, ideas,
stories, photos, music, and videos with other registered users. When most people hear the
term social network, they automatically think of online social networks. That's because online
social networks, also known as social-networking sites, have exploded recently in popularity.
Sites like MySpace, Facebook and LinkedIn account for seven of the top 20 most visited Web
sites in the world. For many users, especially the fully wired Net Generation, online social
networks are not only a way to keep in touch, but a way of life.

Several features of online social networks are common to each of the more than 300 social
networking sites currently in existence. The most basic feature is the ability to create and
share a personal profile. This profile page typically includes a photo, some basic personal
information (name, age, sex, location) and extra space for listing your favorite bands, books,
TV shows, movies, hobbies and Web sites.

Most social networks on the Internet also let you post photos, music, videos and personal
blogs on your profile page. But the most important feature of online social networks is the
ability to find and make friends with other site members. These friends also appear as links
on your profile page so visitors can easily browse your online friend network.

Each online social network has different rules and methods for searching out and contacting
potential friends. MySpace is the most open. On MySpace, you're allowed to search for and
contact people across the entire network, whether they're distant members of your social
network or complete strangers. However, you'll only gain access to their full profile
information if they agree to become your friend and join your network.

5
4.0 Explanation about the digital security risks associated with, viruses and other
malware, privacy, health , environment.

Malware threats to online privacy and digital security. Malware is a general term that gets


used to refer to any kind of malicious software or program. The goal of amalware is to infect
your devices by using computer viruses, worms, Trojan horses, spyware, adware and
whatnot. Today we use internet-connected devices in all aspects of our lives. We go online to
search for information, shop, bank, do homework, play games, and stay in touch with family
and friends through social networking. As a result, our devices contain a wealth of personal
information about us. This may include banking and other financial records, and medical
information—information that we want to protect. If your devices are not protected, identity
thieves and other fraudsters may be able to get access and steal your personal information.
Spammers could use your computer as a "zombie drone" to send spam that looks like it came
from you. Malicious viruses or spyware could be deposited on your computer, slowing it
down or destroying files.

By using safety measures and good practices to protect your devices, you can protect your
privacy and your family. The following tips are offered to help you lower your risk while
you're online

It is important that users protect their computers and mobile devices Green computing
involves reducing the electricity consumed and environmental waste generated when using a
computer. Strategies include such as Recycling, using energy efficient hardware and energy
saving features, regulating manufacturing processes, extending the life of computers, and
immediately donating or properly disposing of replaced computers.

6
5.0 Different between Operating System and Applications

Differnt between Operating System and Application has a few point. Let me explain about
Operating System. Software designed to handle basic elements of computer operation, such
as sending instructions to hardware devices like disk drivesand computer screens, and
allocating system resources such as memory to different software applications being run.
Given uniformly designed operating system that run on many different computers, developers
of software do not need to concern themselves with these problems,  and are
provided with a standard platform for new programs. Different between Operating System
and Application has a few points. let me explain about Application software is a subclass
of computer software that employs the capabilities of a computer directly to a task that the
user wishes to perform. This should be contrasted with system software which is involved in
integrating a computer’s various capabilities, but does not directly apply them in the
performance of tasks that benefit the user.

The Operating System is the System Software that makes the Computer work. We can say
that an Operating System (OS) is Software that acts as an interface between you and the
hardware. It not only contains drivers used to speak the hardware’s language, but also offers
you a very specific graphical user interface (GUI) to control the computer. An OS can also
act as an interface (from the hardware) to the other software. A complex OS like Windows or
Linux or Mac OS offers the services of an OS, but also has applications built in. Solitaire,
Paint, Messenger, etc. are all applications.

Application software is the software that you install onto your Operating System. It consists
of the programs that actually let you do things with your computer. These Applications are
written to run under the various Operating Systems. These include things like your word
processing programs, spread sheets, email clients, web browser, games, etc. Many programs,
such as most of the Microsoft Office suite of programs, are written in both Mac and Windows
versions, but you still have to have the right version for your OS.

7
So, the operating system of a computer is the software that allows the computer work. It
provides the framework under which the applications run. The Operating system of a
Computer is the Software that allows the Computer work. It provides the framework under
which the Applications run. An operating system is the type of Computer system you have
such as Window XP or Window 95, 98, Mac, etc. The applications are the software that
actually allows the user to do something with the computer. Without the applications, all you
can do is change settings and navigate among the folders.The Applications are the Software
that actually allows the user to do something with the Computer. Without the applications, all
you can do is change settings and navigate among the folders. You can purchase its CD from
a software company or download from a software company’s web site.

6.0 Differentiation between wired and wireless network technologies,

The biggest difference between these two types of networks is one uses network cables and
one uses radio frequencies. A wired network allows for a faster and more secure connection
and can only be used for distances shorter than 2,000 feet. A wireless network is a lot less
secure and transmission speeds can suffer from outside interference. Although wireless
networking is a lot more mobile than wired networking the range of the network is usually
150-300 indoors and up to 1000 feet outdoors depending on the terrain.
(Homelanextream.com)

The cost for wired networking has become rather inexpensive. Ethernet cables, hubs
and switches are very inexpensive. Some connection sharing software packages, like ICS, are
free; some cost a nominal fee. Broadband routers cost more, but these are optional
components of a wired network, and their higher cost is offset by the benefit of easier
installation and built-in security features.

Wireless gear costs somewhat more than the equivalent wired Ethernet products. At
full retail prices, wireless adapters and access points may cost three or four times as much as
Ethernet cable adapters and hubs/switches, respectively. 802.11b products have dropped in
price considerably with the release of 802.11g. (Homelanextream.com)

8
Wired LANs offer superior performance. A traditional Ethernet connection offers
only 10 Mbps bandwidth, but 100 Mbps Fast Ethernet technology costs a little more and is
readily available. Fast Ethernet should be sufficient for file sharing, gaming, and high-speed
Internet access for many years into the future. (Wi-Fi.org) Wired LANs utilizing hubs can
suffer performance slowdown if computers heavily utilize the network simultaneously. Use
Ethernet switches instead of hubs to avoid this problem; a switch costs little more than a hub.

Wireless networks using 802.11b support a maximum bandwidth of 11 Mbps, roughly the
same as that of old, traditional Ethernet. 802.11a and 802.11g LANs support 54 Mbps, that is
approximately one-half the bandwidth of Fast Ethernet. Furthermore, wireless networking
performance is distance sensitive, meaning that maximum performance will degrade on
computers farther away from the access point or other communication endpoint. As more
wireless devices utilize the 802.11 LAN more heavily, performance degrades even further.
(Wi-Fi.org)

The greater mobility of wireless LANs helps offset the performance disadvantage. Mobile
computers do not need to be tied to an Ethernet cable and can roam freely within the wireless
network range. However, many computers are larger desktop models, and even mobile
computers must sometimes be tied to an electrical cord and outlet for power. This undermines
the mobility advantage of wireless networks in many organizations and homes.

For any wired network connected to the Internet, firewalls are the primary security
consideration. Wired Ethernet hubs and switches do not support firewalls. However, firewall
software products like Zone Alarm can be installed on the computers themselves. Broadband
routers offer equivalent firewall capability built into the device, configurable through its own
software.

In theory, wireless LANs are less secure than wired LANs, because wireless communication
signals travel through the air and can easily be intercepted. The weaknesses of wireless
security are more theoretical than practical. (Wi-Fi.org) Wireless networks protect their data
through the Wired Equivalent Privacy (WEP) encryption standard that makes wireless
communications reasonably as safe as wired ones.

9
No computer network is completely secure. Important security considerations for
organizations tend to not be related to whether the network is wired or wireless but rather
ensuring that the firewall is properly configured, employees are aware of the dangers of spoof
emails, they are away of spy ware and how to avoid and that anyone outside the organization
does not have unauthorized access to the network.

6.1 Discussion about the reasons individuals and businesses use networks.

Increased mobility is by far the biggest attraction that wireless networking holds for most
businesses. Being able to sit at any terminal, anywhere in the building and access the server is
a great advantage.

When laptops were developed, because of the new mobility convenience factor that they
brought within them, this gave added impetus to the advantages of being able to work
anywhere within range of the wireless network signal. It means that not only can employees
now access information from the server, wherever they are in the premises, but it also enables
colleagues to collaborate and share information in meetings held anywhere; either in a corner
of the office, a bespoke meeting room, or even the staff canteen. It enables total mobility.

10
7.0 Conclusion

In a conclusion, there are many reasons that people from all walks of life use networks to

connect to the Internet such as share a single high-speed Internet connection, access photos,

music, videos, and other content, share devices, play multiplayer games, connect game

consoles to the Internet, subscribe to and use VoIP, and Interact with other devices in a smart

home . There are also many reasons businessman or businesswoman use networks such as to

facilitate communications, sharing hardware, and sharing data, information, and software.

Wired and Wireless networks are very common in the workplace as well as in the home.

Technology has been created to store, transmit and receive data through networks at very

high rates of speed. Networks have become essential to completing daily business tasks and

most business, those who rely heavily on information technologies, would be crippled

without their networks.

Advances in networking storage have allowed for organizations to use their networks

not only for the sharing of resources but to store large pools of data to be used for data

analysis. Companies can now store detailed profile information for customers at a very low

cost. In the future, the speed of networks will increase as they have in past years. The cost of

networks will continue to decline and using a network will be essential for every

organization. As computing technology increases in power, and decreases in size, the price

of creating a high-powered full featured network will decrease rapidly.

11
REFERENCES

1.https://www.quadratek.net/blog/news/2013/12/12/9-advantages-to-using-a-wireless-
network

2. https://www.iup.edu/WorkArea/DownloadAsset.aspx?id..

3. https://www.inspiredtechs.com.au/computer-networking/

4. http://www.homelanxtreme.com/wired-vs-wireless.htm

5. http://www.vicomsoft.com/knowledge/reference/wireless1.html#6

6. http://www.cert.org/tech_tips/home_networks.html#introduction

7. http://www.pcstats.com/articleview.cfm?articleID=1489

8. http://compnetworking.about.com/od/wirelesssecurity/

9. http://www.homenethelp.com/web/diagram/index.asp

10. http://www.windowsecurity.com/articles/Wireless-Networks-Surpassed-Security-Wired-
Networks.html

12

You might also like