Dr. CK Tan, UMS 3
Internet It is used for global communication,
moving ideas and information.
Cyberspace concepts (virtual environment)
Started with ARPANET (Advanced Research Project Network) by USA in 1969
Known as WWW, World Wide Web in 1992 at CERN (Center for European Nuclear Research) in Switzerland
Dr. CK Tan, UMS 7
Internet service providers (ISP)– National (Streamyx, TM Unifi,
Jaring, YES)
Wireless service providers –
DIGI, Celcom, Maxis
How to be connected to internet ?
Dr. CK Tan, UMS 8
How does a modem work?When a computer sends a message (etc. email), the digitalsignal will be converted by the modem into analog signal(modulation). Then the signal travels via the publictelephone networks (etc. streamyx) to the recipient'slocation (etc. USA). When it reaches the destination modem,it is converted back to digital signal (demodulation) andthen the user is able to reach the message.
PUBLIC TELEPHONE NETWORKSATELIT (WIRELESS)
MODULATION
DEMODULATION
Dr. CK Tan, UMS 9
Network Types Local Area Network (LAN)
- networks with computers and peripheral devices
within the same building
Metropolitan Area Network (MAN)
- a networks of LANs
Wide Area Network (WAN)
- integration of LANs and WANs
- countrywide/worldwide networks
Dr. CK Tan, UMS 11
Uses of internet for education
E-learning– Lecture notes, discussion board, online exam
Education portal– LMS, free MOOC courses –
Openlearning.com (chats, discussion, online tuitions)
Information showcase– Personal websites/homepage
– Educational shareware– Ex: hot-potatoes/surveymonkey.com (for
building online quiz)
Dr. CK Tan, UMS 13
Is email secure?
snoopware, spyware, phishing
Stealing confidential info (HP numbers, etc)
Browser records pages that are visited
Cookies record – Times and pages visited
– Other private information
Breach of privacy and security: Examples
Dr. CK Tan, UMS 14
Computer Threats and Crimes
Thefts (organised crime)
– Hardware theft, stealing data – online and offline (lost password)
– Software piracy
“Hackers” (for fun and challenge) and
“crackers” (for malicious purposes)
Natural disasters (flood, fire)
Dr. CK Tan, UMS 15
Viruses– Damage to computers, programs or files
3 types:– Virus (damage/delete system files)
– Worm (self-multiplying and spreads)
– Trojan (can be virus or worm)
Computer Threats and Crimes
Dr. CK Tan, UMS 18
ICT Security Measures Protecting Information (antivirus, backing
up data)
Encrypting messages (make password more complex)
Restricting access (password and firewall)
Anticipating disasters (disaster recovery plan)
Secured the computer labs (door grill, smart card access, CCTV, security guard)
Enhanced online system (anti-hacking)
Dr. CK Tan, UMS 19
Ergonomics Ergonomics study of human
factors related to things people use
Physical Health– Avoiding eyestrain and headache– Avoiding back and neck pain– Avoiding effects of
electromagnetic fields