Saturday, May 6, 2017

ETHICAL, SOCIAL AND LEGAL ISSUES

INTELLECTUAL PROPERTY RIGHTS

Image result for COPYRIGHT            Image result for COPYRIGHT     





- refers to creations of mind, original creative works from creator
e.g: software, applications, systems, etc              

COPYRIGHTS

  • exclusive right given to the owner of copyright for a specific period
  • permission must be obtained to use copyrighted material (and pay any required fee)  
TRADEMARKS
  • used as a marketing tool to enable customers in recognizing the product of a particular trader
  • includes words, logos, pictures, names, letters, numbers or a combination of these
PATENTS

  • exclusive right granted for an invention, which is a product or a process that provides a new  way of doing something
  • offers a new technical solution to a problem
CYBER LAWS IN MALAYSIA


Since 1997, some of the cyber laws that have been passed by our Parliament include:
http://malaysiancyberwarriors.blogspot.my/2013/03/introduction-of-cyber-law-acts-in.html

SOFTWARE PIRACY AND DIGITAL COUNTERFEITING 
  • Creating duplicates of software/digital items and then selling/using them as authentic items
                                        

Wednesday, May 3, 2017

NETWORK AND COMPUTER SECURITY

NETWORK SECURITY CERTIFICATE
SSL or Secure Socket Layer certificates
 • allows secure connections from a web server to a browser
 • when installed on a web server, it activates the padlock and the https protocol
 • SSL is used to secure credit card transactions, data transfer and logins

Phishing and Web Spoofing

Image result for phishing and web spoofing

Image result for phishing and web spoofing

Image result for difference between phishing and web spoofing

PHISHING
- Attacks are performed with the intention to acquire personal information like credit card numbers, bank account, etc.
- The recipients are encouraged to enter personal identification data.

WEB SPOOFING
- Mocking the web presences of trusted corporations with the intention to trick customers.
- Use convincing websites, email designs and URLs

DESKTOP SECURITY ISSUES

Difference between Adware and Spyware
http://www.webopedia.com/DidYouKnow/Internet/spyware.asp

Adware  - Programs used to deliver advertising contents.
               - Visible to the user, experienced to be annoying

Spyware  - Intends to remain unrecognized.
                - Used to gather personal info like login details, etc.
                - Spyware monitors the user’s activities and scan the system.

Viruses   - Attached to executable files or documents
               - Spread through sharing of infected files or sending emails with viruses contained in the                        attachment
               - Some can cause further damage to the systems

Worms   - Replicate or copy themselves

Trojan Horses  - Do not replicate themselves but typically cause damage or compromise of security                               of infected computers
                         - Appears to be useful software and often offer the pretended useful functionality
                         - Damage caused varies – include data theft and destruction or illegitimate access

Related image

Image result for adware, spyware, trojan horses, viruses and worms

TYPES OF ANTI-VIRUS SOFTWARE
Image result for types of anti virus




             

BASIC WEB DEVELOPMENT

WHAT IS HTML???
 HTML is an acronym for HyperText Markup Language

  • to tag various parts of Web document so browsing software will know hot to display that document's link, media, text, graphic and attached file.
HTML FILES
  1. is a text file containing small markup tags
  2. markup tags tell the Web browser how to display the page
  3. must have htm or html file extension                                                         https://www.quora.com/What-is-the-difference-between-a-html-and-a-htm-page
  4. can be created using simple text editor
EXAMPLE:


HTML: HEAD, TITLE, BODY
<html>
<head>
<title>Title of page</title>
</head>
<body>This is my first
homepage.
<b>This text is bold</b>
</body>
</html>
 
HEADING
<BODY>
<H1>Level 1 Heading</H1>
<H2>Level 2 Heading</H2>
<H3>Level 3 Heading</H3>
<H4>Level 4 Heading</H4>
<H5>Level 5 Heading</H5>
<H6>Level 6 Heading</H6>
</BODY> 

Level 1 Heading

Level 2 Heading

Level 3 Heading

Level 4 Heading

Level 5 Heading
Level 6 Heading
Image result for HEADING

Thursday, April 20, 2017

EMAIL

EMAIL : a mail, but is sent electronically across the Internet.
               - quickly delivered in seconds or minutes

Image result for advantages and disadvantages of email

Image result for advantages and disadvantages of email

EMAIL ADDRESS
- user@host
e.g : nnaliah@utm.my

  • "utm.my" is the domain name of the mail server which handles the recipient's email
  • "nnaliah" is the username of the recipient
  • separated by "@"
EMAIL CLIENT AND SERVER

Image result for email client and server

Email-client   = software/program that can transfer email from a local host to a local email server
Email-server  = software/program that can send and receive email from or to other email servers
Mailbox         = a disk file which holds email messages

CC AND BCC
Image result for cc and bcc in email

  • cc (carbon copy section) - send a message to more than 1 person                                                                                           - all the recipients will see the list of email addresses
  • bcc (blind carbon copy section) - email is sent to a large group of people who do not know each                                                       other                                                                                                                                              - addresses won't be seen by the recipients
ATTACHMENT = MIME (MULTIPURPOSE INTERNET MAIL EXTENSION)

- non-ASCII data is converted into ASCII for transmission and then converted back at the receiver
- associated with multimedia
- additional hardware and helper software are required

Image result for common MIME types

How Does Email Works???
Image result for how does email works

IMAP (INTERNET MESSAGE ACCESS PROTOCOL)

- to work with email from multiple computers
- messages are displayed on local computers and stored on the email server
  = you can work with all your mail, old and new, from any computer connected to the Internet, as            long as the mail servers are running

HTTP (HYPERTEXT TRANSFER PROTOCOL)

- allowing mail to be delivered in a web page format

BOUNCED BACK EMAIL ⇨ bad user account name
                                              ⇨ bad domain name
                                              ⇨ domain name server is down for several days
                                              ⇨ some other malfunction (email is too big)

SPAM MAILS!!!
  • may contain disguised links leads to phishing websites or sites that are hosting malware





INTERNET APPLICATION

                                                       COMMUNICATION
                                            ⇙                                                    ⇘                     
                             synchronous application                       asynchronous application
               communication that is occuring at the        communication that is not occuring at the same 
               same time                                                    time
                  e.g : chatrooms or online conferences         e.g : discussion forums and emails

Image result for pros and cons of asynchronous learning

ASYNCHRONOUS LEARNING ENVIRONMENT
    = students participate actively in their learning
    = allow students to interact, provide feedback and reflect on their learning process
    = contributes to students overall learning goals and outcomes


OTHER APPLICATIONS = WebTV/IPTV (youtube, UTMotion)
                                           = podcast
                                           = social networking


Thursday, March 30, 2017

WEB SEARCHING

Web Searching : An act of looking for information in computer databases or network

  4 types: 1) Directories → web guide (hierarchical representation of hyperlinks)
                                       → enormous collection links to sites, arranged in different categories
                                       → top level = wide range of very general topics
                                       → each topic contains hyperlinks of more specialized subtopic

      * popular directories
        https://searchenginewatch.com/sew/how-to/2048976/major-search-engines-directories

Image result for popular directories

                2) Search Engines → computer program that allows users to submit query that consists of
                                                   word or phrase and searches databases
                 
                3) Meta-search Engines → use of more than one other search engine to complete the search
                                                       → the results are ranked according to how well they match with
                                                            the query
                                                       → Adv : a single query can access lot of search engines
                                                            Disadv : a lot of matches will not be suitable for you
                 
                 4) Yellow Pages → allows users to lookup information about individuals
                                            → to track down telephone numbers, email addresses
                                            → contain certain information about businesses

Web Browser  : Can be defined as a soft ware application used to locate and display web

     * popular browser
http://www.techradar.com/news/software/applications/best-browser-which-should-you-be-using-932466


Image result for popular browser 2017

Searching Technique :

  • Pattern Matching Queries (Fuzzy Query)
- can enter ''ungrammatical sentence'', ''incomplete sentence fragments''. ''nonsence words''
- search engines gets collection of keywords
- required keyword "+"
- prohibited keyword "-"
  • Boolean Queries
- query that consists keywords but with logical operators (AND, OR, NOT)

Find a search engine that meet these conditions: - user-friendly interface
                                                                              - easy-to-understand documentation
                                                                              - convenient to access
                                                                              - a large indexed database
SEARCHING......
= user interface : allows to type a query and displays the results
= searcher : engine searches the database for matching your query 
= evaluator : engine assigns scores to the retrieved information
= gatherer : component that travels the WEB and collects information
= indexer : engine that categorizes that data collected by the gatherer

Web Resource Evaluation 

Evaluation Criteria  ⇒ Authority
                                ⇒ Accuracy
                                ⇒ Objectivity
                                ⇒ Currency
                                ⇒ Coverage




Monday, March 20, 2017

INTERNET INFRASTRUCTURE

INTERNET : Interconnected computer work by transmitting data through a special type of packet
                        switching which is known as Internet Protocol (IP).

Internet vs World Wide Web (WWW) ⇒ accessing information over the medium of the internet
     ⇓
- connects millions of computers together globally
- forming a network: any computer can communicate with any other computer

Hierarchy of Network

Image result for hierarchy of network


  • From single computer to LAN
  • From LAN to ISP (Internet Service Provider)
  • From ISP to WWW
* ISP also known as IAP (Internet Access Provider)
* example of ISP: TM

Internet Protocol (IP Address)
- unique identifying number in every machine on the internet
- language that computers used to communicate over the internet
- normally expressed in decimal format to make easier to remember
  e.g: 216.27.61.137

 216: area or location of network (e.g: UTM)
   27: server no.
   61: division or unit no. (e.g: FP)
 137: computer no.

Domain Name System

Image result for domain name system

HTTP (Hyper Text Transfer Protocol) : defines how messages are formatted and transmitted and 
                                                                    what actions Web servers and browsers should take in 
                                                                    response to various command


Type of Internet Connection and Access

  • Dial Connection - used with home computers
  • Cable - used a direct connection (e.g: office)
  • Satellite Internet Access - required transceiver satellite to receive and transmit data
  • Fixed Wireless - used in radio transmission tower (same as satellite internet)
  • Broadband - transmits data digitally, modem or similar device required to translate data                                  packages
  • Mobile Wireless - virtually anywhere cellular phone service available




CONNECTING A NETWORK

WIRELESS : send data through airwaves between devices, instead of physical cable
                     e.g : cellular telephone, tabs, wireless networking, satellite television, GPS units

Uses of Wireless - mobile users can access email anywhere anytime'
                            - travelers with portable computer can connect to internet through base station
                                                                                                                                     ↙                 ↘
                                                                                                                       railway station       airport
Types: 1) Wireless Wide Area Network (WWANs)
            2) Wireless Metropolitan Area Network (WMANs)
            3) Wireless Local Area Network (WLANs)
            4) Wireless Personal Area Network (WPANs)

Wireless Technology : Infrared    Bluetooth     WLANs     Broadband Wireless   WiMax    WiFi

Infrared: - send data as infrared light rays in short distance
                 - do not use signal in radio frequency

Bluetooth: - designed for very short range < 10m
                   - connect and exchange information between devices such as mobile phones, laptops,                             PCs, printers, digital cameras

WLANs: - vary from simple, independent, peer-to-peer connections between a set of PCs to more
                  complex, intra-building infrastructure networks
                - wireless solutions → point-to-point solution: bridge between two local area networks
                                                                                         : to provide alternative to cable between two                                                                                              distant locations
                                                → point-to-multi-point solution: connect several, separate location to
                                                                                                     one signal location

WiMax: - provides access to internet to fixed location with large coverage
               - speed up 70Mbps, range 30 miles
               - extent range of wireless network

Wired vs. Wireless Network

Image result for wired vs wireless



Thursday, March 9, 2017

CABLING AND HARDWARE

CABLE : Medium → information moves from one device to another

1. Wired Network : physically connected using cables
                              : using conventional telephone network
2. Wireless Network : use signals to transfer data
                                  : television and radio network, cellular network

Types of Cable
(commonly used with LAN)

- Coxial Cable : have 3 layer → centre conductor : block interference
                                               → foil shield
                                               → braided shield
                         : large number of high-speed video transmission
                         : carry data quickly

Image result for coaxial cable
- Fibre Optic Cable : centre glass core - no electronic signal
                                    e.g: UNIFI
                                  : use light to carry data or signal
                                  : have large amount of electrical interference

Image result for fibre optic cable     Image result for fibre optic cable

- Unshielded Twisted Pair (UTP) : 4 pair of wires = jacket
                                                         : each pair is twisted (8 wires) to eliminate interference
                                                         : disadvantage → susceptible for radio and frequency
Image result for unshielded twisted pair cable

- Shielded Twisted Pair (STP) : 2 wires wrap in foil shielded
                                                    : more reliable in data communication
                                                    : disadvantage → extra shielding can cause bulky

Related image

Cable Connector

- Coaxial Cable Connector

  • Bayonet-Neill-Concelman (BNC) connector
  • Adapters: T-connector, barrel connector, terminator

         Image result for BNC connector     Image result for bnc connector wiring

- Fiber Optic Cable Connector

  •        ST & SC connector                 
          Image result for ST & SC connector

- UTP Cable Connector

  • RJ-45 connector (RJ = Registered Jack)
  • look like a large telephone-style connector
  • a slow allows RJ-45 to be inserted only one way
                Image result for rj-45 connectorImage result for rj-45 connector

Topology and Cable

1. Linear/Bus → Coaxial, Twisted Pair, Fiber
2. Star ( concentrator at the middle) → Twisted Pair, Fiber
3. Star-Wired Ring → Twisted Pair
4. Tree → Coaxial, Twisted Pair, Fiber

Network Hardware/Equipment

Networking hardware includes all computers, peripherals, interface cards, and other equipment needed to perform data-processing and communication within network.

- File Server : large amount of RAM and storage space
                      : a fast network interface card

- Workstation : configured with appropriate cables, network interface card and networking software
                         : do not necessarily storage capability, files saved on file server

- Network Interface Card : physical connection between network and workstation
                                             : 3 most common network interface → Ethernet card
                                                                                                       → LocalTalk connector
                                                                                                       →Token Ring card

- Concentrator/Hubs : central connection point
                                     : lots of extra network trafic, network less efficient
                                     : for all traffic network

- Switch : can connect ethernet, toking ring and fiber channel
               : for one traffic channel

- Repeater : to boost signal
                   : can be separate device or incorporate into concentrator

- Bridges : connect multiple network segments
                 : connect different types of cabling or topology

- Routers : used to link different networks
                 : translates information from one network to another = superintelligent bridge
                 : direct signal traffic efficiently
                 : route messages between topology and cables

Network Gateway 


  • Internetworking system → joining together two networks that use different base protocols.
  • Can be implemented completely in software, hardware or combination of both.