3.1 What is Network? 92 3.1.2.8 Telemedicine Telemedicine can be defined as the use of network technology (computers, video, phone, messaging) by a medical professional to diagnose and treat patients. Telemedicine is the use of networking technology to provide medical information and services. It includes Web sites that patients can access to • contact their physicians, • make appointments, and • view lab results. For example, • physicians can use videoconferencing robots to communicate remotely with other physicians or with hospitalized patients. • Physicians can also use telemedicine to perform remote diagnosis of patients. Another example of telemedicine is telesurgery—a form of robot-assisted surgery (where a robot controlled by a physician operates on the patient) in which at least one of the surgeons performs the operation by controlling the robot remotely over the Internet or another network. Robot-assisted surgery systems typically use cameras to give the human surgeon an extremely close view of the surgical area. As a result, robot-assisted surgery is typically more precise and results in smaller incisions than those made by a human surgeon, allowing for less invasive surgery and resulting in less pain for the patient, a faster recovery time, and fewer potential complications. Telemedicine has enormous potential for providing quality medical care to individuals who live in rural or underdeveloped areas and who do not have access to sufficient medical care.
3.1 What is Network? 93 3.1.3 Networking Media (T2C1) Network media refers to the communication channels used to interconnect nodes on a computer network. To connect the devices in a network, either wired media (physical cables) or wireless media (typically radio signals) can be used. Two (2) types of networking media: • Type 1: Wired networking media o Twisted-Pair cable Shielded, copper-based, twisted-pair cable. This form of cabling is used in local area networks, particularly older types of networks. o Coaxial cable Copper-based coaxial cable. Coaxial cable is thick, multiwire cable that can be used for both high bandwidth and high connectivity connections. o Fibre-optic cable Glass or plastic-based fiber-optic cable. • Type 2: Wireless networking media o Cellular radio transmission o Microwave and satellite transmission o Infrared (IR) transmission 3.1.4 Wired and Wireless Networking Media (T3C2) Wired Networking Media It is also referred to as Wired or Bounded transmission media. Signals being transmitted are directed and confined in a narrow pathway by using physical links. Features: • High Speed • Secure • Used for comparatively shorter distances The most common types of wired networking media are • twisted-pair • coaxial • fiber-optic cable
3.1 What is Network? 94 Twisted-Pair Cable Twisted pair cabling is a type of wiring in which two conductors of a single circuit are twisted together for the purposes of improving electromagnetic compatibility. A twisted-pair cable is made up of pairs of thin strands of insulated wire twisted together. Twisted-pair is the least expensive type of networking cable and has been in use the longest. In fact, it is the same type of cabling used inside most homes for telephone communications. Twisted-pair cabling can be used with both analog and digital data transmission and is commonly used for LANs. Twisted-pair cable is rated by category, which indicates the type of data, speed, distance, and other factors that the cable supports. Category 3 (Cat 3) twisted-pair cabling is regular telephone cable; higher speed and quality cabling—such as Category 5 (Cat 5), Category 6 (Cat 6), and Category 7 (Cat 7)—is frequently used for home or business networks. The pairs of wires in twisted-pair wire are twisted together to reduce interference and improve performance. To further improve performance, it can be shielded with a metal lining. Twisted-pair cables used for networks have different connectors than those used for telephones. Networking connectors are typically RJ-45 connectors, which look similar to, but are larger than, telephone RJ-11 connectors. Coaxial cable Coaxial cable is a type of electrical cable consisting of an inner conductor surrounded by a concentric conducting shield, with the two separated by a dielectric. Coaxial cable (also known as coax) was originally developed to carry a large number of high-speed video transmissions at one time, such as to deliver cable TV service. A coaxial cable consists of a relatively thick center wire surrounded by insulation and then covered with a shield of braided wire to block electromagnetic signals from entering the cable. Coaxial cable is commonly used today in computer networks, for short-run telephone transmissions outside of the home, and for cable television delivery. Although more
3.1 What is Network? 95 expensive than twisted-pair cabling, it is much less susceptible to interference and can carry more data more quickly. While not used extensively for networking home computers at the moment, that may change with the relatively new option of networking via the existing coax in a home. Coax is also used with home multimedia networks. The most common types of connectors used with coaxial cable are the slotted BNC connectors that are turned once to lock or unlock them into place and the threaded F connectors frequently used with cable TV and antenna applications. Fiber optic cable A fiber-optic cable is an assembly similar to an electrical cable, but containing one or more optical fibers that are used to carry light. Fiber-optic cable is the newest and fastest of these three types of wired transmission media. It contains multiple (sometimes several hundred) clear glass or plastic fiber strands, each about the thickness of a human hair. Fiber-optic cable transfers data represented by light pulses at speeds of billions of bits per second. Each strand has the capacity to carry data for several television stations or thousands of voice conversations, but each strand can only send data in one direction so two strands are needed for full-duplex data transmissions. Fiber-optic cable is commonly used for the high-speed backbone lines of a network, such as to connect networks housed in separate buildings or for the Internet infrastructure. It is also used for telephone backbone lines and, increasingly, is being installed by telephone companies all the way to the home or business to provide super-fast connections directly to the end user. The biggest advantage of fiber-optic cabling is speed; the main disadvantage of fiber-optic cabling is the initial expense of both the cable and the installation. Fiber-optic connectors are less standardized than connectors for other types of wired media, so it is important to use cables with the connectors that match the hardware with which the cable will be used. Common connectors include the push-pull SC connector and the tabbed SC and slotted ST connectors.
3.1 What is Network? 96 Summary of wired networking media. Characteristics Twisted pair cable Co-axial cable Optical fiber cable Description It consists of 2 separately insulated conductor wires wound about each other. It has an outer plastic covering containing an insulation layer made of PVC It uses the concept of reflection of light through a core made up of glass or plastic. Signal transmission Takes place in the electrical form over the metallic conducting wires. Takes place in the electrical form over the inner conductor of the cable. Takes place in an optical form over glass fiber. Data rate Twisted pair cable supports a low data rate. Moderately high data rate. Very high data rate. Noise immunity Twisted pair cable has low noise immunity. Co-axial cable has higher noise immunity. Optical fiber cable has the highest noise immunity. External magnetic field Affected due to external magnetic field. The external magnetic field is less affected. The external magnetic field is not affected. Cause of power Power loss due to conduction and radiation. Power loss due to conduction. power loss due to absorption, scattering, and bending.
3.1 What is Network? 97 Characteristics Twisted pair cable Co-axial cable Optical fiber cable Bandwidth The twisted-pair cable has low bandwidth. Co-axial cable has moderately high bandwidth. Optical fiber cable has a very high bandwidth. Electromagnetic interference(EMI) EMI can take place. EMI is reduced to shielding. EMI is not present. Installation Easy installation. Fairly easy installation. Difficult to install. Attenuation In twisted pair cable has very high attenuation. In coaxial cable has low attenuation. In optical fiber cable has very low attenuation. Cost The cost is very low. Cost is moderate Cost is expensive. Repeater Spacing Repeater spacing is 2-10 km. Repeater spacing is 1-10 km. Repeater spacing is 10-100 km. Use Usually used for telephone connections. Generally used for Cable television Internet connections Digital telephone networks Analog telephone networks The Internet Television broadcasting Surgical operations Used industries and in defence services
3.1 What is Network? 98 Wireless Networking Media It is also referred to as Wireless or Unbounded transmission media. No physical medium is required for the transmission of electromagnetic signals. Features: • The signal is broadcasted through air • Less Secure • Used for larger distances The most common types of wireless networking media are • Cellular radio transmission • Microwave and satellite transmission • Infrared (IR) Transmission Cellular radio transmission Cellular radio transmissions are used with cell phones and are sent and received via cellular (cell) towers—tall metal towers with antennas on top. Cellular service areas are divided into honeycomb-shaped zones called cells; each cell contains one cell tower. When a cell phone user begins to make a call, it is picked up by the appropriate cell tower (the one that is located in the cell in which the cell phone is located and that is associated with the user’s wireless provider). That cell tower then forwards the call to the wireless provider’s Mobile Telephone Switching Office (MTSO), which routes the call to the recipient’s telephone via his or her mobile or conventional telephone service provider (depending on the type of phone being used by the recipient). When a cell phone user moves out of the current cell into a new cell, the call is passed automatically to the appropriate cell tower in the cell that the user is entering. Data (such as e-mail and Web page requests) sent via cell phones works in a similar manner. The speed of cellular radio transmissions depends on the type of cellular standard being used. Microwave and satellite transmission Microwaves are high-frequency radio signals that can send large quantities of data at high speeds over long distances. Microwave signals can be sent or received using microwave stations or communications satellites, but they must travel in a straight line from one station or satellite to another without encountering any obstacles because microwave signals are line of sight. Microwave stations are earth-based stations that can transmit microwave signals directly to each other over distances of up to about 30 miles. To avoid buildings, mountains, and
3.1 What is Network? 99 the curvature of the earth obstructing the signal, microwave stations are usually placed on tall buildings, towers, and mountaintops. Microwave stations typically contain both a dishshaped microwave antenna and a transceiver. When one station receives a transmission from another, it amplifies it and passes it on to the next station. Microwave stations can exchange data transmissions with communications satellites, discussed next, as well as with other microwave stations. Microwave stations designed specifically to communicate with satellites (such as those used to provide satellite TV and satellite Internet services) are typically called satellite dishes. Satellite dishes are usually installed permanently where they are needed, but they can also be mounted on trucks, boats, RVs, and other types of transportation devices when portable transmission capabilities are necessary or desirable, such as when used for military or recreational applications. Communications satellites are space-based devices launched into orbit around the earth to receive and transmit microwave signals to and from earth. Communications satellites were originally used to facilitate microwave transmission when microwave stations were not economically viable (such as over large, sparsely populated areas) or were physically impractical (such as over large bodies of water) and were used primarily by the military and communications companies (such as for remote television news broadcasts). Today, communications satellites are used to send and receive transmissions to and from a variety of other devices, such as personal satellite dishes used for satellite television and Internet service, GPS receivers, satellite radio receivers, and satellite phones. They are also used for earth observation (EO) applications, including weather observation, mapping, and government surveillance. Traditional communications satellites maintain a geosynchronous orbit 22,300 miles above the earth and, because they travel at a speed and direction that keeps pace with the earth’s rotation, they appear (from earth) to remain stationary over any given spot. Because these satellites are so far above the surface of the earth, there is a slight delay while the signals travel from earth, to the satellite, and back to earth again. This delay—less than one halfsecond—is not normally noticed by most users (such as individuals who receive Internet or TV service via satellite) but it does make geosynchronous satellite transmissions less practical for voice, gaming, and other real-time communications. Because of this delay factor, low earth orbit (LEO) satellite systems were developed for use with satellite telephone systems. LEO satellites typically are located anywhere from 100 to 1,000 miles above the earth and, consequently, provide faster transmission than traditional satellites. Medium earth orbit (MEO) systems typically use satellites located about 1,000 to 12,000 miles above the earth and are used most often for GPS.
3.1 What is Network? 100 Infrared (IR) Transmission Infrared (IR) is electromagnetic radiation (EMR) with wavelengths longer than those of visible light. Infrared (IR) transmission sends data as infrared light rays over relatively short distances. Like an infrared television remote control, infrared technology requires line-of-sight transmission. Because of this limitation, many formerly infrared devices (such as wireless mice and keyboards) now use RF radio signals instead. Infrared transmissions are still used with remote controls (such as for computers that contain TV tuners). They are also used to beam data between some mobile devices, as well as between some game consoles, handheld gaming devices, and other home entertainment devices. Summary of wireless networking media. Cable Radio waves Microwaves Infrared Description These are easy to generate and can penetrate through buildings. The sending and receiving antennas need not be aligned. It is a line of sight transmission i.e. the sending and receiving antennas need to be properly aligned with each other. Infrared waves are used for very short distance communication. They cannot penetrate through obstacles. Frequency Range 3KHz – 1GHz 1GHz – 300GHz 300GHz – 400THz Application AM and FM radios Cordless phones Mobile phone communication Television distribution. TV remotes Wireless mouse, keyboard, printer
3.1 What is Network? 101 3.1.5 Network Device (T2C1) A network device is physical devices that are required for communication and interaction between hardware on a computer network. The seven (7) types of networking hardware used in home and small office networks include: • Network adapter (NIC) • Modem • Switches • Routers • Wireless access point • Repeaters • Hub 3.1.6 Function of Network Device (T3C2) Network Device Description with function Network adapter (NIC) A network adapter, also called a network interface card (NIC) is a network device used to connect a computer to a network (such as a home or business network). Modem A modem (derived from the terms modulate and demodulate) is a network device used to connect a computer to a network over telephone lines. Technically, to be called a modem, a device must convert digital signals (such as those used by a computer) to modulated analog signals (such as those used by conventional telephone lines) and vice versa. However, in everyday use, the term modem is also used to refer to any device that connects a computer to a broadband Internet connection, such as a cable modem used for cable Internet service. Hub A hub is a network device used to transmits all data received to all network devices connected to the hub, regardless of which device the data is being sent to, so the bandwidth of the network is shared and the network is not very efficient. Switches A switch is a network device which contains ports to which the devices on the network connect and facilitates communications between the devices by using packet switching, similar to a hub. But, unlike a hub, a switch identifies which device connected to the switch is the one the data is intended for and sends the data only to that
3.1 What is Network? 102 device, rather than sending data out to all connected devices. Consequently, switches are more efficient than hubs Routers Router is a network device that forwards data packets between computer networks (such as two LANs, two WANs, or a LAN and the Internet). It performs the traffic directing functions on the Internet by passing data on to the intended recipient only and can plan a path through the network to ensure the data reaches its destination in the most efficient manner possible, and they are used to route traffic over the Internet. Wireless Access Point A wireless access point is a network device used to grant network access to wireless client devices. In home and small business networks, typically the capabilities of a switch, router, and wireless access point are integrated into a single wireless router device. A wireless router is commonly used to connect both wireless (via Wi-Fi) and wired (via Ethernet cables) devices to a network and to connect that network to an Internet connection via the appropriate broadband modem. It is a networking hardware device that allows other Wi-Fi devices to connect to a wired network. As a standalone device, the WAP may have a wired connection to a router, but, in a wireless router, it can also be an integral component of the router itself. A WAP is differentiated from a hotspot which is a physical location where Wi-Fi access is available. Repeaters Repeaters is a network device used to amplify signals along a network. They are necessary whenever signals have to travel farther than would be otherwise possible over the networking medium being used. Repeaters are available for both wired and wireless networks; repeaters for a wireless network are often called range extenders. Range extenders usually connect wirelessly to the network and repeat the wireless signal to extend coverage of that network outside or to an additional floor of a building, or to eliminate dead spots—areas within the normal network range that don’t have coverage.
3.1 What is Network? 103 It is an electronic device that receives a signal and retransmits it. Repeaters are used to extend transmissions so that the signal can cover longer distances or be received on the other side of an obstruction.
3.1 What is Network? 104 Exercise 3.1 What is Network? 1 Define network.: A collection of computers and other hardware devices connected together so that network users can share hardware, software, and data, as well as communicate with each other electronically. 2 Describe the following uses of network application. (a) The Internet: The global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. (b) Telephone Service: A voice-grade telephone service employing analog signal transmission over copper loops. (c) Television and Radio Broadcasting: a telecommunications network for distribution of television program content, where a central operation provides programming to many television stations providers. (d) Global Positioning System (GPS): GPS is a satellite navigation system used to determine the ground position of an object. (e) Applications Monitoring Systems: a networking technology to determine the current location or status of an object. (f) Multimedia Networking: Multimedia network is a network application to deliver digital multimedia content to computers. (g) Videoconferencing, Collaborative Computing and Telecommuting: the use of networking technology to conduct real-time, face-to-face meetings between individuals physically located in different places. (h) Telemedicine: Telemedicine can be defined as the use of network technology by a medical professional to diagnose and treat patients. 3 Name and explain types of networking media. Types Definition Examples
3.1 What is Network? 105 4 State the most suitable networking media for the following characteristics. Characteristics Network media (a) High Bandwidth, better noise Immunity, easy to install and expand, and inexpensive (b) Used for very short distance communication. They cannot penetrate through obstacles. (c) The transmission rate of data is fast. Noise is slow in these cables. (d) These are easy to generate and can penetrate through buildings. (e) It is a line of sight transmission i.e. the sending and receiving antennas need to be properly aligned with each other. (f) Increased capacity and bandwidth, lightweight, less signal attenuation, immunity to electromagnetic interference, and resistance to corrosive materials. 5 Describe wired and wireless networking media. 6 State and describe the function of each network device. Network Devices Function
3.1 What is Network? 106 7 Identify the example of communication/network device based on statement below: Statements Network device Enables a computer or device that does not have built-in networking capability to access a network. Network card A central communications device that allows computers and devices to transfer data wirelessly to a wired network. Wireless access point Provides a central point for cables in a network. Hub / switch A device that connects multiple computers together and transmits data to its correct destination on a network. Router 8 Identify the example of transmission/network media based on statement below: Statements Network media Ahmad is working as a technician of TMNet. He needs to use one type of cable for the new Unifi subscriber. Fiber-optic cable Siti wants to connect his satellite television service modem with the external dish. Coaxial cable Nur wants to connect his home Internet connection with the telephony company. Twisted pair cable Amin is doing a research on earth-based device that sends and receives high-frequency and high-speed radio signals. Microwave
3.1 What is Network? 107 9 FIGURE 1 shows an example of a computer network that connects group of computing resources. (a) State one (1) of the communication device in the network shown in FIGURE 1. Hub, Switch, Network card (b) Give one (1) example of transmission media that might be used in this network. Twisted pair cable 10 Explain three (3) advantages of network. Facilitates communications: People may communicate efficiently and easily via email, instant messaging, chat, and online social network. Share data and information: Users can share and access data and information stored on the network faster and easier. Share hardware and software: Users have access to hardware and software on the network, thus users can save cost on hardware and software. Transfer fund: Electronic Fund Transfer (EFT) allows users to transfer money between accounts more conveniently. 11 Explain three (3) disadvantages of network. Theft of personal information: Theft of personal information such as name, address, and credit card number can easily occur when users give information on unsecured websites. Virus threat: Users are easily exposed to virus attacks on their systems when they connect to the Internet. Social disconnect: Users addicted to the Internet are drifting apart from their family and friends. Pornography: Internets allows easy access to pornographic materials which can be detrimental for children and teenagers.
3.2 The Internet and World Wide Web 108 3.2 The Internet and World Wide Web 3.2.1 Internet Searching Learning Outcomes: At the of this lesson, students should be able to: (a) Describe types of search tools (Search Engine-Keyword Search Subject Directory- Directory Search) (b) Describe different search strategies (Phrases, search operators, field searches) (c) Use proper citation for Internet resources (APA format style) 3.2.1.1 Types of Search Tools (T2C2) A search tools is a program to locate the information on the Internet. Two (2) types of search tools: • search engines – keyword search o A software system designed to carry out web searches by allowing the user to enter keywords that are run against a database • subject directories – directory search o A hierarchically organized indexes of subject categories that allow the Web searcher to browse through lists of Web sites by subject in search of relevant information. Search Engines – Keyword Search A search engine is a program that finds Web sites, Web pages, images, videos, news, maps, and other information related to a specific topic. The most common type of Internet search is the keyword search—that is, when you type appropriate keywords (one or more key terms) describing what you are looking for into a search box. The site’s search engine then uses those keywords to return a list of Web pages (called hits) that match your search criteria; you can view any one of these Web pages by clicking its corresponding hyperlink. Search sites differ in determining how close a match must be between the specified search criteria and a Web page before a link to that page is displayed, so the number of hits from one search site to another may vary. The keyword search is the most commonly used search type. It is used not only on conventional search sites like the Google search site, but also on many other Web sites.
3.2 The Internet and World Wide Web 109 Subject Directories – Directory Search A subject directory classifies Web pages in an organized set of categories, such as sports or shopping, and related subcategories. An alternate type of Internet search available on some search sites is the directory search, which uses lists of categories instead of a search box. To perform a directory search, click the category that best matches what you are looking for in order to display a list of more specific subcategories within the main category. You can then click specific subcategories to drill down to more specific topics until you see hyperlinks to Web pages matching the information you are looking for. Types of search tools Search Engines – keyword search Subject Directories – directory search Definition a program that finds Web sites, Web pages, images, videos, news, maps, and other information related to a specific topic. classifies Web pages in an organized set of categories, such as sports or shopping, and related subcategories. Best used helpful in locating information for which you do not know an exact Web address or are not seeking a particular Web site. best for browsing and for search of more general nature and may include search engine for searching their own database. Examples Bing search, Yahoo search, Live search, Google search Yahoo directory, Open directory, Google directory *Some Web sites offer the functionality of both a search engine and a subject directory. 3.2.1.2 Search Strategies (T2C2) A search strategy can be used to help narrow down a list of hits to a more manageable number. It is possible to find information more effectively and efficiently by using search strategies. Search strategies usually involve: • Using phrases • Using Boolean operators • Using field searches
3.2 The Internet and World Wide Web 110 Using phrases • Improve the quality of the hits returned—essentially typing more than one keyword in a keyword search. • Most search engines automatically list the hits that include all the keywords first, followed by hits matching most of the keywords, continuing down to hits that fit only one of the keywords. Using Boolean Operators • To further specify exactly what you want a search engine to find, Boolean operators—most commonly AND, OR, and NOT—can often be used in keyword searches. Using Field Searches • Limits the search to a particular search characteristic (or field), such as the page title, URL, page text, top-level domain, or Web site. • When a field search is performed, only the hits associated with the Web pages that match the specified criteria in the specified field are displayed. 3.2.1.3 Citation for Internet Resources (T1C1) A citation is a quotation from or reference to a book, paper, or author, especially in a scholarly work. In-text citations (basic) The idea of VR was first presented in the 1950s, and it has now developed to a point where it may be used for entertainment (Grossard, 2018). Reference List (detail) Grossard, C., Palestra, G., Xavier, J., Chetouani, M., Grynszpan, O., David Cohen, D. (2018). ICT and autism care: State of the art. Curr. Opin. Psychiatry, 31, 474–483. The following example uses APA style (Publication Manual of the American Psychological Association, 6th edition, 2010) to cite online articles.
3.2 The Internet and World Wide Web 111 Articles from online versions of newspapers and magazines MacGillis, A. (2019, November 11). The case against Boeing. The New Yorker. Retrieved from https://www.newyorker.com/ Articles from blogs Alexander, S. (2019, November 13). Autism and intelligence: Much more than you wanted to know [Blog post]. Retrieved from https://slatestarcodex.com/-2019/-11/-13/-autism--and--intelligence--much--more- -than--you--wanted--to--know/ Other online articles Walker, A. (2019, November 14). Germany avoids recession but growth remains weak. Retrieved from https://www.bbc.com/-news/-business--50419127 Websites with no author Australia fires: ‘Catastrophic’ alerts in South Australia and Victoria. (2019, November 11). Retrieved from https://www.bbc.com/-news/-world--australia--50483410 Websites with no date University of Amsterdam. (n.d.). About the UvA. Retrieved November 20, 2019, from https://www.uva.nl/-en/-about--the--uva/-about--the--university/-about--the- -university.html The importance to cite Internet resources: • To show your reader you've done proper research by listing sources you used to get your information • To be a responsible scholar by giving credit to other researchers and acknowledging their ideas • To avoid plagiarism by citing words and ideas used by other authors • To allow your reader to track down the sources you used by citing them accurately in your paper by way of footnotes, a bibliography or reference list 3.2.2 Web Activities (T2C2) Web activities include • online communications, • social networking/social media, • e-commerce,
3.2 The Internet and World Wide Web 112 • online entertainment, • online news, reference, and information, and • online education and writing. 3.2.2.1 Online Communications Many types of online communications methods exist. E-mail (a method of exchanging messages between people using electronic devices) is one of the most common; other types of online communications include: • Instant Messaging and Text Messaging • Twittering and Social Networking Updates • Forums • Voice over Internet Protocol (VoIP) • Web Conferences and Webinars Instant messaging (IM) Instant messaging (IM) technology is a type of online chat allowing real-time text transmission over the network. It allows you to exchange real-time typed messages with people on your contact list or buddy list. Instant messages (IMs) can be sent via computers and smartphones via messaging programs (such as AIM, Yahoo! Messenger, the Skype program, or the WhatsApp mobile app). Because IM applications typically display the status of your buddies (such as if they are online or if they have set their status to “Busy” or “In a meeting”), IM is an example of an application that uses presence technology—technology that enables one computing device to identify the current status of another device. Text messaging Text messaging is the act of composing and sending electronic messages between two or more users of mobile devices or computers. It is a form of messaging frequently used by mobile phone users
3.2 The Internet and World Wide Web 113 Also called Short Message Service (SMS), text messaging is used to send short (less than 160 character) text-based messages via a cellular network. If the messages also include photos, audio, or video, Multimedia Message Service (MMS) is used instead. While e-mail is still important for business online communications, messaging is beginning to replace e-mail for personal communications—particularly with teenagers and other individuals who carry a mobile phone with them at all times. Twittering and Social Networking Updates Twittering refers to posting short (up to 140 character) updates (called tweets) about what you are doing or thinking about at any moment to the Twitter social network. Can be sent via text message or the Twitter Web site. Individuals see the tweets of people they follow on their Twitter home page; they can view other tweets by searching Twitter for key terms or hashtags (key terms used on Twitter and that are preceded by the symbol #). Forums Forums can be used.for asking questions, making comments, or initiating discussions with a large group of individuals. Forums are Web pages designed to facilitate written discussions on specific subjects, such as TV shows, computers, movies, investing, gardening, music, photography, or politics. They typically have a moderator who monitors the forum to remove inappropriate posts. When a participant posts a message, it is displayed for anyone accessing the forum to read and respond to. Messages are usually organized by topics (called threads); participants can post new messages in response to an existing message and stay within that thread, or they can start a new thread. Forum participants do not have to be online at the same time so participants can post and respond to messages at their convenience. Voice over Internet Protocol (VoIP) Internet telephony is the original industry term for the process of placing telephone calls over the Internet.
3.2 The Internet and World Wide Web 114 Today, the standard term for placing telephone calls over the Internet or any other type of data network is Voice over Internet Protocol (VoIP) and it can take many forms. At its simplest level, VoIP calls can take place from computer to computer, such as by starting a voice conversation with an online contact using a messaging program and a headset or microphone. Web Conferences and Webinars Web conferences typically take place via a personal computer or mobile device and are used by businesses and individuals. Many free messaging programs or services (such as Skype, Google Hangouts, and Apple FaceTime) support video phone calls. Web conferencing is often used for meetings between individuals located in different geographical locations, as well as for employee training, sales presentations, customer support, and other business applications. Webinars (Web seminars) are similar to Web conferences, but typically have a designated presenter and an audience. A Webinar is typically more one-way communication than a Web conference. A completely one-way presentation (such as a recorded Webinar played back on demand) is sometimes referred to as a Webcast. 3.2.2.2 Social Networking/Social Media A social networking site is an online platform which people use to build social networks or social relationships with other people who share similar personal or career content, interests, activities, backgrounds or real-life connections. It can be loosely defined as any site that creates a community of individuals who can communicate with and share information with one another. The collection of social networking sites and other communications channels used to transmit or share information with a broad audience is referred to as social media. Social media are interactive digital channels that facilitate the creation and sharing of information, ideas, interests, and other forms of expression through virtual communities and networks. Some examples of social networking sites are
3.2 The Internet and World Wide Web 115 • MySpace, Facebook, and Google+ that allow users to post information about themselves for others to read; • Meetup that connects people in specific geographic areas with common hobbies and interests; • Flickr and Fotki and other photo sharing sites; • Pinterest that allows individuals to share ideas and snippets from Web pages, organized by topic; and • YouTube and other video sharing sites. Social networking sites are used most often to communicate with existing friends. Social networking sites today are also viewed as a business marketing tool. There are also business social networking sites designed for business networking. Some of these sites (such as LinkedIn) are used for recruiting new employees, finding new jobs, and building professional contacts. 3.2.2.3 E-commerce e-Commerce is the activity of electronically buying or selling of products on online services or over the Internet. Online shopping, online auctions, online banking, and online investing are examples of ecommerce—online financial transactions. Online Shopping Online shopping is commonly used to purchase both physical products and downloadable products via Web pages. Typically, shoppers locate the items they would like to purchase using an online shopping site, and then they add those items to their online shopping carts or shopping bags. The site’s checkout process—including supplying the necessary billing and shipping information—is then used to complete the sale. After the payment is processed, the item is either • shipped to the customer (if it is a physical product), or • the customer is given instructions on how to download it (if it is a downloadable product).
3.2 The Internet and World Wide Web 116 Online auctions The most common ways to purchase items online from other individuals. Sellers list items for sale on an auction site (such as eBay) and then pay a commission to the auction site if the item is sold. Individuals can visit the auction site and enter bids on auction items until the end of the auction. At that time, the person with the highest bid is declared the successful bidder and arranges payment for and delivery of the item directly with the seller. Online Banking Online banking enable customers to • check balances on all their accounts, • view cashed checks, • transfer funds between accounts, and • pay bills electronically. Online Investing Buying and selling stocks, bonds, mutual funds, and other types of securities is referred to as online investing. It is common to see stock quote capabilities on many search and news sites but trading stocks and other securities requires an online broker. The biggest advantages of online investing include • lower transaction fees and • the ability to quickly buy or sell stock when desired, without having to make a phone call—a convenience for those investors who do a lot of trading. Common online investing services include • the ability to order sales and purchases; • access performance histories, corporate news, and other useful investment information; and • set up an online portfolio that displays the status of the stocks you specify.
3.2 The Internet and World Wide Web 117 3.2.2.4 Online Entertainment There are many ways to use the Web for entertainment purposes, such as • listening to music, • watching TV and videos, and • playing online games. Online Music There are a number of options available today for online music, such as • listening to live radio broadcasts via an online radio station, • watching music videos on MTV.com or Yahoo! Music, • listening to or downloading music on demand via a monthly online music subscription service, or • downloading music from online music stores, such as the iTunes Music Store or Amazon MP3. Online TV, Videos, and Movies Watching TV shows, videos, and movies online is another very popular type of online entertainment. Online videos such as news videos and movie trailers and videos shared via YouTube are widely available Online Gaming Online gaming refers to games played over the Internet. Some of the games are designed to be played alone or with just one other person. Others, called online multiplayer games, are designed to be played online against many other online gamers. Online multiplayer games (such as Doom, EverQuest, Final Fantasy, and City of Heroes) are especially popular in countries, such as South Korea, that have readily available highspeed Internet connections and high levels of Internet use in general. Internet-enabled gaming consoles (such as recent versions of the PlayStation, Xbox, and Wii consoles) and portable gaming devices (such as the Sony PSP and Nintendo 3DS) that have built-in Internet connectivity can also be used for multiplayer online gaming. Online gaming is also associated quite often with Internet addiction—the inability to stop using the Internet or to prevent extensive use of the Internet from interfering with other aspects of one’s life.
3.2 The Internet and World Wide Web 118 3.2.2.5 Online News, Reference and Information There is an abundance of news and other important information available through the Internet. News and Reference Information Online news is commonly read on home or business computers, as well as on smartphones and media tablets. News can also be delivered via headlines displayed on smart TVs, as well as via an app (such as the Windows 8 News live tile) that can be clicked to display that news story. Reference sites are designed to provide users access to specific types of useful information. For example, reference sites can be used to • generate maps, • check the weather forecast, • look up the value of a home, or • provide access to encyclopedias, dictionaries, ZIP Code directories, and telephone directories. One potential downside to the increased availability of online reference sites is use by criminals. 3.2.2.6 Online Education and Writing Online education—using the Internet to facilitate learning. The Internet can be used to • deliver part or all of any educational class or program; • to supplement or support traditional education. Many education institution use Web content (online syllabi, schedules, discussion boards, podcasts, and tutorials) as required or suggested supplements. There are also Web-based learning management systems (such as Google Classroom) that are often used to deliver course content, manage assignments and grades, and more. Web-Based Training and Distance Learning The term Web-based training (WBT) refers to any instruction delivered via the Web. It is commonly used for employee training, as well as for delivering instruction in an educational setting.
3.2 The Internet and World Wide Web 119 Distance learning occurs whenever students take classes from a location—often home or work—which is different from the one where the delivery of instruction takes place. Distance learning today typically includes Web-based training or other online learning tools (and so is also called online learning and e-learning) and is available through many high schools, colleges, and universities, as well as organizations that provide professional certifications. Distance learning can be used to • learn just one task or new skill; • complete an online course or an entire degree online via an accredited college or university. The biggest advantage of Web-based training and distance learning is that they are typically experienced individually and at the user’s own pace. Online Testing In both distance learning and traditional classes, online testing—which allows students to take tests via the Internet. Both objective tests and performance-based exams can be administered and taken online. Typically online tests are graded automatically, providing fast feedback to the students, as well as freeing up the instructor’s time for other activities. One challenge for online testing is ensuring that an online test is taken by the appropriate individual and in an authorized manner in order to avoid cheating.
3.2 The Internet and World Wide Web 120 3.2.3 Censorship and Privacy Issues Learning Outcomes: At the of this lesson, students should be able to: (a) Define censorship. (b) Describe privacy (Web browsing, E-mail) There are many important societal issues related to the Internet. The important issues is censorship and privacy. 3.2.3.1 Censorship (T1C1) Censorship is the suppression of speech, public communication, or other information. This may be done on the basis that such material is considered objectionable, harmful, sensitive, or "inconvenient". Censorship can be conducted by governments, private institutions and other controlling bodies. The issue of Internet censorship affects all countries that have Internet access. In some countries, Internet content is filtered by the government, typically to hinder the spread of information from political opposition groups, to filter out subjects deemed offensive, or to block information from sites that could endanger national security. Increasingly, some countries are also blocking information (such as blogs and personal Web pages) from leaving the country, and have occasionally completely shut down Internet access to and from the country during political protests to stop the flow of information in and out of that country. It is also commonly used by employers to keep employees from accessing non-workrelated sites, by some ISPs and search sites to block access to potentially objectionable materials, and by many schools and libraries to control the Web content that children are able to view in order to be in compliance with CIPA. Internet filtering typically restricts access to Web pages that contain offensive language, sex/pornography, racism, drugs, or violence (based on either the keywords contained on each site or a database of URLs containing restricted content).
3.2 The Internet and World Wide Web 121 It can also be used to block access to specific sites (such as social networking sites, YouTube, or eBay), as well as to restrict the total number of hours or the time of day that the Internet can be used. Most browsers include some Internet filtering options. For instance, Internet Explorer’s Family Safety options can be used to filter the Web sites displayed for specific users of a particular computer (although blocked Web sites can be viewed if the user knows the administrator password). More comprehensive Internet filtering can be obtained with stand-alone filtering programs, such as NetNanny or Safe Eyes for parents, or Netsweeper for schools and businesses. 3.2.3.2 Privacy (T2C2) Data privacy is the relationship between the collection and dissemination of data, technology, the public expectation of privacy, and the legal and political issues surrounding them. It is typically applied to personal health information (PHI), personally identifiable information (PII) where financial information, medical records, ID numbers, names, birthdates, and contact information is present. Privacy, as it relates to the Internet, encompasses what information about individuals is available, how it is used, and by whom. As more and more transactions and daily activities are being performed online, there is the potential for vast amounts of private information to be collected and distributed without the individual’s knowledge or permission. A few issues that are of special concern to Internet users include • Web browsing privacy • e-mail privacy
3.2 The Internet and World Wide Web 122 Web Browsing Privacy Web browsing privacy encompasses what information about individuals is available, how it is used, and by whom. Cookies Many Web pages today use cookies—small text files that are stored on your hard drive by a Web server—to identify return visitors and their preferences. First-party cookies belong to the Web site you are visiting and are only read by that site. So, while some individuals view cookies as a potential invasion of privacy, they can provide some benefits to consumers. Spyware and Adware Spyware is the term used for any software program that is installed without the user’s knowledge and that secretly gathers information about the user and transmits it through his or her Internet connection. Spyware is sometimes used to provide advertisers with information used for marketing purposes, such as to help select advertisements to display on each person’s computer. The information gathered by the spyware software is usually not associated with a person’s identity. But spyware is a concern for privacy advocates because it is typically installed without a user’s direct knowledge. Spyware can also be used by criminals to retrieve personal data stored on your computer for use in criminal activities. Internet browsers (Google Chrome, Mozilla Firefox, Internet Explorer, and Safari) are the first step to accessing the internet. They are also the first step to both increasing your online privacy and controlling your personal information. Browsers provide in-browser privacy settings for users. These options include • private browsing, • controlling activity logs, and • deleting cookies.
3.2 The Internet and World Wide Web 123 Email Privacy Email privacy refers to keeping emails secured, either while in transit or while they're stored in a server. The process of sending an email involves many hardware and software systems like the email clients, ISPs, and servers. Many people mistakenly believe that the e-mail they send and receive is private and will never be read by anyone other than the intended recipient. Because it is transmitted over public media, however, only encrypted (electronically scrambled) e-mail can be transmitted safely. It is important to realize that your employer and your ISP have access to the e-mail you send through those organizations. Businesses and ISPs typically archive (keep copies of) e-mail messages that travel through their servers and are required to comply with subpoenas from law enforcement agencies for archived e-mail messages. Tips to improve your email privacy: • Treat email as a formal communication method • Don’t use personal email platforms for business • Encrypt sensitive emails • Secure confidential attachments • Always enable 2-step verification
3.2 The Internet and World Wide Web 124 Exercise 3.2 The Internet and World Wide Web 1 The Web is a worldwide resource of information. A primary reason that people use the Web is to search for specific information. Give two (2) steps in successful searching. Identify the main idea or concept in the topic about which you are seeking information. Determine any synonyms, alternate spellings, or variant word forms for the topic. 2 Define search tools. A program to locate the information on the Internet. 3 Describe two (2) types of search tools. (a) Search Engine-Keyword Search A program that finds Web sites, Web pages, images, videos, news, maps, and other information related to a specific topic. (b) Subject Directory - Directory Search It classifies Web pages in an organized set of categories, such as sports or shopping, and related subcategories. 4 List three (3) ways of search strategies. Using phrases, Using Boolean operators, Using field searches 5 Describe each strategy that you have mentioned in question 4. Using phrases: Improve the quality of the hits returned—essentially typing more than one keyword in a keyword search. Using Boolean Operators: To further specify exactly what you want a search engine to find, Boolean operators—most commonly AND, OR, and NOT—can often be used in keyword searches. Using Field Searches: Limits the search to a particular search characteristic (or field), such as the page title, URL, page text, top-level domain, or Web site. 6 State the importance of using a proper citation for Internet resources. To avoid plagiarism by citing words and ideas used by other authors. 7 Web page citations generally follow the following format: Author or agency. (Date of article or page update). Title of the web page. Retrieved from [website URL/DOI]. Cite the Website with the following information. (a) Format Information Author(s) National University of Malaysia Institute of IR4.0 Date 2022 Title Graduate Research Assistant (GRA) URL https://appsmu.ukm.my/modalinsan/ (b) Format Information
3.2 The Internet and World Wide Web 125 Author(s) Mohd Amran, M. N. Date 2023 Title An Ontology for Virtual Reality (VR) in High Functioning Autism Spectrum Disorder (HFASD) DOI 10.1016/j.jbi.2015.06.026 8 Web activities include online communications, social networking/social media, ecommerce, online entertainment, online news, reference, and information, and online education and writing. Describe the following types of web activities. (a) Instant Messaging A type of online chat allowing real-time text transmission over the network. (b) Text Messaging Text messaging is the act of composing and sending electronic messages between two or more users of mobile devices or computers. (c) Social Networking An online platform which people use to build social networks or social relationships with other people who share similar personal or career content, interests, activities, backgrounds or real-life connections. (d) Social Media Interactive digital channels that facilitate the creation and sharing of information, ideas, interests, and other forms of expression through virtual communities and networks. (e) E-commerce The activity of electronically buying or selling of products on online services or over the Internet. (f) Online Entertainment The use the Web for entertainment purposes, such as listening to music, watching TV and videos, and playing online games. (g) Online News, Reference and Information Online news is commonly read on home or business computers, as well as on smartphones and media tablets. Reference sites are designed to provide users access to specific types of useful information. (h) Online Education and Writing The use of the Internet to facilitate learning such as Web-Based Training and Distance Learning.
3.2 The Internet and World Wide Web 126 9 There are many activities on the Web. List the appropriate type and one (1) example of each Web activity in the following situation: Scenarios Web activities Example Mr Ali wants to read the latest news on the Internet using his computer. Online news www.bharian.com Ms Teh communicates with her friends around the world using text. Instant Messaging Whatsapp Fatimah sends an assignment to her lecturer using the internet. Email Gmail Siti makes a voice call to her grandmother in Seattle by using internet. VoIP Whatsapp Hashimah wanted to share her interest, ideas, stories, photos, music and videos with other friends on the Internet. Social Networking Facebook Hashim transferred money to his daughter through Internet. Online banking www.maybank2u.com Akif likes to play network games with his friends. Online games Mobile legend 10 Define censorship. Censorship is the suppression of speech, public communication, or other information. This may be done on the basis that such material is considered objectionable, harmful, sensitive, or "inconvenient". 11 Describe privacy in (a) Web browsing Web browsing privacy encompasses what information about individuals is available, how it is used, and by whom. (b) E-mail Email privacy refers to keeping emails secured, either while in transit or while they're stored in a server.
2.3 Database System 127 3.3 Latest issues of Internet (T1C2) Learning Outcomes: At the of this lesson, students should be able to: (a) Discuss latest issues of Internet. (The Internet of Things (IoT), The Fourth Industrial Revolution (4IR)) 3.3.1 The Fourth Industrial Revolution (4IR) The Fourth Industrial Revolution (4IR) conceptualizes rapid change to technology, industries, and societal patterns and processes in the 21st century due to increasing interconnectivity and smart automation. It refers to the disruptive transformation of industries through the application of emerging technology. It is characterized by new technology that is fusing the physical, digital and biological worlds, impacting all disciplines, industries and the economy. Digital economy and 4IR are interdependent and mutually reinforcing. Digitalization enables more sophisticated technology applications, innovations and the emergence of new business models across all sectors. The wide adoption of 4IR technologies will accelerate the growth of digital economy. 4IR is inevitable. 4IR technologies has the potential to improve the wellbeing of society by • raising income levels, • increasing societal cohesion, • improving efficiency, • providing convenience, • safety and security, and • better protecting and conserving limited natural resources. 4IR is changing how we live, work and communicate through the use of technologies like • artificial intelligence (AI), • autonomous vehicles (AV) and • the Internet of Things (IoT).
2.3 Database System 128 Today, the 4IR is already present in our everyday life. For example, • AI has enabled services such as chatbots to answer queries in eCommerce platforms. • It has also allowed smartphones to perform highly sophisticated functions such as creation of augmented reality, speech recognition and indoor navigation. • IoT is also being used to improve road safety as it enables quick information exchange for relevant authorities to act more efficiently in reducing road fatalities and carbon emissions. • 3D printing is being used widely in engineering, aviation, healthcare, architecture and even fashion. • Drones are already being deployed to perform tasks such as delivery services. These changes have brought about many risks which need to be properly managed, especially disruption to the labour market and lifestyles. Hence, strong policy actions are needed to address such risks. The 4IR is transforming systems and economies, which necessitates an improved and agile governance. The application of 4IR technologies has huge potential economic and social benefits, as well as risks, as shown in Figure 1-1. Benefits Risks New business opportunities and value creation Job redeployment due to change in skills requirements Efficiency and productivity gains Irresponsible use and manipulation of technology Transformation of ‘dangerous, dirty and difficult (3D)’ jobs Erosion of trust in society due to increased privacy concerns and cyber threats Improved quality of life Widening inequality Improved environmental quality Deterioration of value and ethics New job creation Social interaction and societal wellbeing affected Figure 1-1: Potential benefits and risks from 4IR Presence Technology Future Technology
2.3 Database System 129 3D printing 4D or 5D printing Genetic engineering Genetic computing Artificial Intelligence (AI) Generative Artificial Intelligence (GAI) Internet of Things Geoengineering Automation and Robotics Social robots Battery and Energy storage Carbon-breathing batteries Biotechnology Biomimetic materials Advanced materials Metalenses Synthetic biology DNA data storage Sensor technology Biodegradable Sensor Cloud computing and Big Data Analytics (BDA) Photonics in space Bioprinting Health passport Figure 1-2: Example technologies of the 4IR and beyond
2.3 Database System 130 3.3.2 The Internet of Things (IoT) The Internet of Things (IoT) describes physical objects with sensors, processing ability, software, and other technologies that connect and exchange data with other devices and systems over the Internet or other communications networks. It refers to a world where everyday physical objects are connected to, and uniquely identifiable on, the Internet so they can communicate with other devices. The IoT will be created by turning formerly dumb objects into smart devices (using sensors and other technology) that can send data to a system for analysis. These smart devices can range from sensors in your shoes, to smart fitness devices, to healthcare monitors, to home automation systems, to smart farm equipment, to smart freeways and traffic lights. These smart devices will communicate with each other to provide advantages such as • making our lives more convenient, • saving us money, and • providing us with better healthcare and other services. Businesses will benefit from getting feedback from equipment being able to automate more processes, and getting faster and more accurate feedback about point-of-sale purchases. IoT is used in many different fields include • personal applications, • consumer applications, • organizational applications, and • industrial applications.
2.3 Database System 131 Personal applications Home automation Enabling the appliances and other devices in your home (such as your alarm system, door locks, and sprinklers) to communicate with you and each other so the devices operate according to your stated preferences or observed habits, as well as be able to give you the power to control devices remotely via your smartphone. Fitness systems Uses a sports-tested accelerometer to track your daily activity—including running, walking, dancing, and basketball—in steps, time of day, and calories burned. You can set a personal goal for yourself. You can also share your data with others via Facebook and Twitter. Consumer applications Smart home IoT devices are a part of the larger concept of home automation, which can include lighting, heating and air conditioning, media and security systems and camera systems. Long-term benefits could include energy savings by automatically ensuring lights and electronics are turned off or by making the residents in the home aware of usage. Elder care One key application of a smart home is to provide assistance to elderly individuals and to those with disabilities. These home systems use assistive technology to accommodate an owner's specific disabilities. Voice control can assist users with sight and mobility limitations while alert systems can be connected directly to cochlear implants worn by hearing-impaired users. Organizational applications Medical and healthcare IoT devices can be used to enable remote health monitoring and emergency notification systems. These health monitoring devices can range from blood pressure and heart rate monitors to advanced devices capable of monitoring specialized implants, such as pacemakers, Fitbit electronic wristbands, or advanced hearing aids.
2.3 Database System 132 Transportation The IoT can assist in the integration of communications, control, and information processing across various transportation systems. Application of the IoT extends to all aspects of transportation systems (i.e. the vehicle, the infrastructure, and the driver or user). Dynamic interaction between these components of a transport system enables inter- and intra-vehicular communication, smart traffic control, smart parking, electronic toll collection systems, logistics and fleet management, vehicle control, safety, and road assistance V2X communications In vehicular communication systems, vehicle-to-everything communication (V2X), consists of three main components: • vehicle to vehicle communication (V2V), • vehicle to infrastructure communication (V2I) and • vehicle to pedestrian communications (V2P). V2X is the first step to autonomous driving and connected road infrastructure. Building automation IoT devices can be used to monitor and control the mechanical, electrical and electronic systems used in various types of buildings (e.g., public and private, industrial, institutions, or residential) in building automation systems. Industrial applications Manufacturing The IoT can connect various manufacturing devices equipped with sensing, identification, processing, communication, actuation, and networking capabilities. Digital control systems to automate process controls, operator tools and service information systems to optimize plant safety and security are within the purview of the IIoT.
2.3 Database System 133 Agriculture There are numerous IoT applications in farming such as • collecting data on temperature, • rainfall, humidity, • wind speed, • pest infestation, and • soil content. This data can be used to automate farming techniques, take informed decisions to improve quality and quantity, minimize risk and waste, and reduce the effort required to manage crops. Maritime IoT devices are in use monitoring the environments and systems of boats and yachts. Many pleasure boats are left unattended for days in summer, and months in winter so such devices provide valuable early alerts of boat flooding, fire, and deep discharge of batteries. Product digitalization There are several applications of smart or active packaging in which a QR code or NFC tag is affixed on a product or its packaging. The tag itself is passive, however, it contains a unique identifier (typically a URL) which enables a user to access digital content about the product via a smartphone.
2.3 Database System 134 Exercise 3.3 Latest issues of Internet 1 Define the following terms: (a) The Fourth Industrial Revolution (4IR) (b) Internet of Things (IoT) 2 List the benefits of the application of 4IR technologies. 3 List the risks of the application of 4IR technologies. 4 Explain two (2) applications of 4iR in our daily lives. 5 Discuss one (1) application of IoT in the following fields: (a) Personal application (b) Consumer application (c) Organizational application (d) Industrial application
Pre Summative Evaluation Test 1 (Pre UPS1) 135 Pre Summative Evaluation Test 1 (Pre UPS1) 1 E-Mail, Yahoo Messenger, Video Conferencing, and Multimedia Message Service (MMS) are examples of multimedia applications. (a) Define Multimedia. [2 marks] (b) Explain one (1) type of multimedia application representation. [2 marks] (c) Explain one (1) application of multimedia in the following field: (i) Business [2 marks] (ii) Education [2 marks] (iii) Entertainment [2 marks] (iv) Health care [2 marks]
Pre Summative Evaluation Test 1 (Pre UPS1) 136 2 Multimedia design is the art of integrating different media, including text, images, audio and video to communicate with an audience. (a) The elegance and simplicity of the three-phase (3Ps) model have contributed to its widespread adoption as a conceptual framework for the production process. (i) List two (2) activities in pre-production phase. [2 marks] (ii) State two (2) activities in production phase. [2 marks] (iii) Describe one (1) activity in post-production phase. [2 marks] (b) An authoring tool is a program that enables you to create a digital course and publish it in select formats. (i) List three (3) types of multimedia authoring tools. [3 marks] (ii) Describe one (1) type of multimedia authoring tools. [2 marks] END OF QUESTION PAPER KERTAS SOALAN TAMAT
Pre Summative Evaluation Test 2 (Pre UPS2) 137 Pre Summative Evaluation Test 2 (Pre UPS2) 1 Define the following terminologies: (a) Database [2 marks] (b) Database System [2 marks] (c) Database Management Systems (DBMS) [2 marks] 2 Explain five (5) components of database environment. [5 marks] Components Explanation (a) (b) (c) (d) (e)
Pre Summative Evaluation Test 2 (Pre UPS2) 138 3 Describe the representations of a relational database: (a) Field [2 marks] (b) Record [2 marks] (c) Table / File [2 marks] END OF QUESTION PAPER KERTAS SOALAN TAMAT
Pre Summative Evaluation Test 3 (Pre UPS3) 139 Pre Summative Evaluation Test 3 (Pre UPS3) 1 Today, computer networks are converging with telephone networks and other communications networks, with both data and voice being sent over these networks. (a) Define network. [2 marks] (b) To connect the devices in a network, either wired media (physical cables) or wireless media (typically radio signals) can be used. (i) List two (2) types of networking media. [2 marks] (ii) Explain both of networking media that you have mentioned in 1(b)(i). [4 marks] Networking Media Explanation Examples (c) A network device is physical devices that are required for communication and interaction between hardware on a computer network. (i) State six (6) examples of network device. [2 marks]
Pre Summative Evaluation Test 3 (Pre UPS3) 140 (ii) Describe the network device that you have mentioned in 1(c)(i). [6 marks] Network Device Description 2 The Internet is the global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) while the World Wide Web (WWW) is the world's dominant software platform. (a) Based on the following information, use APA 6th format style to cite. Format Information Author Clark Blyth Date 2018 Title Immersive technologies and language learning. Foreign Language Annals doi https://doi.org/10.1111/flan.12327 [2 marks] (b) Censorship can be conducted by governments, private institutions and other controlling bodies. Define censorship. [2 marks] END OF QUESTION PAPER KERTAS SOALAN TAMAT
PRACTICAL (Multimedia Application) 141 PRACTICAL Multimedia Application (8 hours) Learning Outcomes: At the of this lesson, students should be able to: (a) Create multimedia elements by using multimedia editing software. 3.4 Creating e-Poster using Canva This is a quick tutorial on how to make a poster using Canva. 3.5 Make a Poster using Canva. How to Make a Poster using Canva. Criteria for a good poster design: Content: Details on the poster capture the important information about the topic and increase the audience’s understanding. Theme: Poster fully meet theme requirement. Layout Design: All information on the poster is in focus and can be easily viewed. Use of Graphics: All graphics are related to the topic and make it easier to understand. Creativity: Design is unique and have “wow” factors are display elements that are totally their own (originality).