$ Share software Share data and information Share hardware Facilitate communications Transfer funds Figure 2.20 Networks facilitate communications; enable sharing of hardware, data and information, and software; and provide a means for transferring funds 3 Disadvantages of using networks: (a) Viruses can easily spread to other computers throughout a computer network. (b) If the server is down or the network is down, then most of the files or data on the network cannot be accessed. (c) The network starts to slow down as more users log onto it and request files, send documents to be printed and open more software applications. (d) Setting up a network requires special devices and cabling, and therefore higher costs. (e) A larger network needs to be maintained by an expert worker. (f) There is the danger of hacking, so security procedures are needed to prevent such threats. Quick Check 2.1 1 Define network. 2 State two examples of wired transmission media. 3 List five types of wireless transmission media. 4 Explain the following advantage and disadvantage of using networks. Advantage Disadvantage Facilitating communication: Network failure: A network is a set of computers and devices connected together via communications devices and transmission media. Communications devices is any type of hardware capable of transmitting data, instructions, and information between a sending device and a receiving device. Transmission media are materials that are capable of carrying communication signals. There are physical/wired transmission media and wireless transmission media. Recap! 49 Mid Semester Test 1 Answers Topic 2 Internet Technology PENERBIT ILMU BAKTI SDN. BHD.
2.2 Network Architecture ● Explain types of network architecture (Peer-to-Peer, Client/Server). UPS ● Illustrate types of network architecture (logical drawing) based on the given scenario. PSPM Learning Outcomes Types of Network Architecture 1 Network architecture is the way network devices are organised in a system and how the tasks are allocated between them. In short: Network architecture refers to the configuration of the computers, devices, and media on a network. 2 Two widely-used types of network architectures are client/server and peer-topeer. Client/Server Architecture 1 On a client/server network, one or more computers act as the server and the other computers on the network request services from the server. This is depicted in Figure 2.21. Figure 2.21 The Client/Server architecture is a system where the server hosts and manages most of the resources and services requested by the clients 2 The server is a computer that controls access to the hardware, software, and other resources on the network and provides a centralised storage area for programs, data, and information. 3 The client is each of the other computers and mobile devices on the network that rely on the server for its resources. For example, a server might store an organisation’s email messages. Clients on the network, which include any users’ connected computers or mobile devices, access email messages on the server. 50 Mid Semester Test 1 Topic 2 Answers Internet Technology PENERBIT ILMU BAKTI SDN. BHD.
4 Both wired and wireless networks can be configured as a client/server network. Although it can connect a smaller number of computers, a client/server network architecture typically provides an efficient means to connect ten or more computers. 5 Most client/server networks require a person to serve as a network administrator because of the large size of the network. Some servers are dedicated servers that perform a specific task. For example, a network server manages network traffic (activity), and a web server delivers requested web pages to computers or mobile devices. Peer-to-Peer Architecture 1 In peer-to-peer (P2P) networking, a group of computers are linked together with equal permissions and responsibilities for processing data. Peer Peer Peer Peer Network Figure 2.22 Peer-to-Peer architecture is a decentralised network of peers that act as both clients and servers 2 Peer-to-peer networks allow users to share resources and files located on their computers and to access shared resources found on other computers on the network. 3 Peer-to-peer networks do not have a common file server. Instead, all computers can use any of the resources available on other computers on the network. For example, you might set up a P2P network between an Android tablet and a Windows laptop so that they can share files using Bluetooth or so that you can print from the tablet to a printer accessible to all devices on the network. 4 Both wired and wireless networks can be configured as a peer-to-peer network. P2P networks are ideal for very small businesses and home users. 5 Home P2P networks do not require an Internet connection and P2P software. There can be only two computers connected via a network cable to transfer files. 6 An Internet P2P network is set up using an Internet connection and P2P software such as LimeWire and BearShare. Some operating systems include a P2P networking tool that allows users to set up a peer-to-peer network. 7 Many businesses also see an advantage to using P2P, in that companies and employees can exchange files using P2P, freeing the company from having to maintain a network server for this purpose. 51 Mid Semester Test 1 Answers Topic 2 Internet Technology PENERBIT ILMU BAKTI SDN. BHD.
8 Business-to-business e-commerce websites find that P2P easily allows buyers and sellers to share company information such as product databases. 9 Table 2.2 compares the advantages and disadvantages of the client/server and peer-to-peer architectures. Table 2.2 Client/Server Vs Peer-to-Peer model of networking Client/Server Peer-to-Peer • One or more computers (called servers) act as service providers to deliver most of the resources and services requested by the other computers (called clients). Server Client 1 Client 2 Client 3 Client4 • All the computers (called peers) on the network have equal ability to share hardware or data and perform tasks or workloads. Peer 1 Peer 2 Peer 3 Peer 4 • Only servers have high responsibilities and capabilities. Clients request for service and the server responds with service. • Each computer has equal responsibilities and capabilities. Individual workstations can request or deliver services. • A centralised network where users can access shared data which are centrally controlled. • A decentralised network where every user manages his/her own machine. No central repository for files and folders. • Centralised control by the server can be more efficient at administering the whole network. Backups are managed centrally and are easy to access. • Files and folders cannot be centrally backed up. Decentralised back-ups are difficult to access. • More stable and secure. Network security and software installation are controlled centrally. • Less stable. There is little or no security besides the permissions. Users often do not need to log onto their workstations. Each user is responsible for ensuring that viruses are not introduced to the network. • It can be used in small as well as large networks. • It is ususally used in small networks with less computers and devices. • Expensive to install and implement. Needs a high-end server and a network operating system. • Less costly to install and maintain as it does not require extensive hardware or a network operating system. 52 Mid Semester Test 1 Topic 2 Answers Internet Technology PENERBIT ILMU BAKTI SDN. BHD.
• Network professionals are normally needed to manage and maintain the whole network. • No need for specialist staff such as network technicians as users set their own permissions as to which files to share. • Any failure in the server will disrupt the function of all the clients. • More reliable as there are multiple nodes that can provide service. • Access time for a service is higher. File transfers from a central server usually take longer. • Access time is quicker since files will download quicker than downloading from a central server. But as each computer might be accessed by others, it can slow down the performance for the user. Network Architecture Diagram 1 Given a scenario, we can illustrate a network architecture using a logical drawing. This is a visual representation of the network showing the interconnections between the components of the system. 2 A network diagram helps us visualise the layout of the network, understand how the devices are connected, and troubleshoot any network problems. Example Scenario: You are a Network Planner in your company and you need to draw a computer network layout. All the devices and workstations in the network are under centralised control. The network will consist of five computers. The network also has two unit printers. The network must be connected to the Internet. Network diagram: Internet Printer 1 Printer 2 PC 1 PC 2 PC 3 PC 4 PC 5 Server A cloud shape is often used to represent the Internet or parts of the network where the details are not important. Smart Tips! • Network architecture is the configuration of computers, devices and media on a network. • The two widely-used network architecture are client/server and peer-to-peer. Recap! 53 Mid Semester Test 1 Answers Topic 2 Internet Technology PENERBIT ILMU BAKTI SDN. BHD.
Quick Check 2.2 1 What does network architecture refer to? 2 Name two types of network architecture. 3 State one difference between the client/server and peer-to-peer architectures. 4 Describe two disadvantages of the client-server architecture compared to the peer-to-peer architecture. 2.3 Classification of Networks ● Explain the classification of networks. UPS ● Differentiate between Local Area Network and Wide Area Network based on the area of coverage and ownership. PSPM Learning Outcomes 1 Computer networks can be classified into different categories. The classification can be done according to different criteria, such as by the size and ownership of the network. 2 The size of a network refers to the geographical area and number of computers that are a part of the network. The LAN and WAN are two major types of networks designed to operate over the geographical area they cover. Local Area Network (LAN) 1 A local area network (LAN) is a network that connects computers and devices in a limited geographical area, such as a home, school, office building or a closely positioned group of buildings. 2 Examples of LAN include the network in a school computer lab, the network in a cyber cafe, and the network in a small office. Figure 2.23 illustrates how a LAN may be set up in an office. Nodes Customer service offices Marketing department offices Servers for local area network Figure 2.23 Local area network (LAN) in an office 54 Mid Semester Test 1 Topic 2 Answers Internet Technology PENERBIT ILMU BAKTI SDN. BHD.
3 Each computer or device on the network, called a node, can share hardware resources such as printers, large hard drives or fax machines, and software resources. 4 Often, the nodes are connected via cables. However, a wireless LAN (WLAN) is a LAN that uses no physical wires. An example is depicted in Figure 2.24. Tablet Internet Firewall Router Hub switch Client Client Laptop Servers 1 Servers 2 Printer Wi-Fi router Mobile phone Figure 2.24 This network diagram shows how a LAN be wired or wireless 5 The LAN is a private network. The advantages and disadvantages of using a LAN network are summarised in Table 2.3. Table 2.3 Advantages and disadvantages of a LAN Advantages • Devices (such as printers, scanners, external drives) can be shared by network users, reducing the cost of hardware purchases. • Data of all network users can be stored in a central location. • Data (homework, pictures) and messages can be easily shared over networked computers. • The cost of LAN setup is relatively low because of the small coverage area compared to WAN. Disadvantages • It covers only a limited geographical area. • Security is an issue as each computer and device becomes another point of entry for threats. • All the connected computers running at once may reduce the speed for each user. Wide Area Network (WAN) 1 A wide area network (WAN) is a network that covers a large geographical area such as a city, country, or the world using a variety of wired and wireless transmission media such as telephone lines, cables, and radio waves. 2 A WAN can be one large network, or can consist of multiple LANs connected together. In this way, any organisation can set up a global integrated network using WAN. 55 Mid Semester Test 1 Answers Topic 2 Internet Technology PENERBIT ILMU BAKTI SDN. BHD.
3 The Internet, for instance, is the world's largest WAN. LAN LAN LAN WAN Figure 2.25 A WAN can connect multiple LANs together 4 A WAN covers a large geographical area, allowing business offices situated far apart to communicate easily. It also allows remote access to resources and applications. 5 The drawbacks of the WAN include the difficulty in managing and maintaining the network; skilled technicians and network administrators are needed. Errors and issues may also arise because of the wide coverage and the use of different technologies in different locations. 6 How is WAN different from LAN? The key difference is in their area of coverage and network ownership. Table 2.4 elaborates on these differences. Table 2.4 Key differences between LAN and WAN Network Area Coverage Network Ownership Example LAN Connects computers and devices in a limited geographical area, such as home, school or office building. Private – LANs are typically owned, controlled, and managed by a single person or organisation. Network in a school computer laboratory, a cybercafe, or a small office. WAN Connects computers and devices in a large geographical area, such as city, country or the world. Private or public – WANs are not owned by a single organisation but rather exist under a collective or distributed ownership over a wide area. Internet (the largest network in the world). Quick Check 2.3 1 What is a Wide Area Network? 2 Give one example of LAN and one example of WAN. 3 Identify the type of network based on the following explanation. Type of network Advantage (a) Servers can be shared by many users from different far-flung locations. (b) Data transmits at a fast rate as the number of computers linked together is limited. Computer networks can be classified as LAN or WAN according to their size (geographical spread) and ownership. Recap! 56 Mid Semester Test 1 Topic 2 Answers Internet Technology PENERBIT ILMU BAKTI SDN. BHD.
4 State the type or classification of network shown by each network diagram: (a) (b) Internet 2.4 Introduction to the Internet ● Explain the Internet. ● Describe advantages and disadvantages of the Internet. ● Differentiate between Intranet and Extranet based on accessibility of information. Learning Outcomes How the Internet Started 1 The precursor of the Internet began in the 1990s as a research project funded by the Department of Defense, United States of America (USA), spurred on by the Cold War with the Soviet Union. The goal was to find a means of communication that would not be affected by a nuclear attack. 2 Government researchers were also looking for a way to easily share information, instead of having to travel from one site to another or to send magnetic tapes through the postal system. 3 The network connection began with four computers of researchers connected together over phone lines. The first network was called ARPANET (Advanced Research Projects Agency NETwork). 4 The network was a success but access was limited to certain academic and research organisations. Soon, other similar networks were formed to facilitate information sharing. But the various networks did not have a standard way to communicate with each other. 5 On January 1, 1983, a standard communications protocol (set of rules for handling data) called Transfer Control Protocol/Internet Protocol (TCP/IP) was launched. It allowed all the different networks to communicate with each other. And this marked the beginnings of the Internet, a global interconnected network of networks. 6 The system was eventually replaced by new networks operated by commercial Internet Service Providers (ISPs) in 1995. People started using the Internet (also known as “The Information Superhighway”) to send messages, read news, chat with one another, and swap files. 57 Mid Semester Test 1 Answers Topic 2 Internet Technology PENERBIT ILMU BAKTI SDN. BHD.
7 As of January 2023, global Internet users have climbed to 5.16 billion, with Internet penetration standing at 64.4 percent of the world’s total population (www.datareportal.com). What is the Internet? 1 The Internet is a public and global communication network that provides direct connectivity to anyone who is subscribed to the services of an Internet Service Provider (ISP). It can be defined as: A worldwide collection of computer networks that connects millions of businesses, government agencies, educational institutions and individuals. 2 The Internet is a public network that is connected and routed over gateways. End users are connected to local access providers (LANs or ISPs), who are connected to the Internet access providers, then to network access providers, and eventually to the Internet backbone. 3 Since access to the Internet is open to all with no restrictions, there is a lack of control that may result in an unruly proliferation of information. 4 Table 2.5 lists some of the advantages and the disadvantages of the Internet. Table 2.5 Advantages and disadvantages of the Internet Advantages • The Internet provides instant access to a wealth of information on almost any imaginable topic. The information is available 24 hours a day. • The Internet is a learning resource and a teaching tool. Students and teachers can access online lessons and look up study materials in multimedia formats. • Internet facilities such as email, VoIP and social media make communication with friends and family more efficient. • The Internet provides many sources of entertainment such as online games, music, on-demand movies and dramas. • Cloud storage provides users with the convenience of storing their files on servers and access them from almost anywhere. Cloud storage synchronises the data across any Internet-connected devices and platforms. • Many daily activities can also be performed online such as shopping, banking, bill payment, and others. • We can use IoT (Internet of Things) devices that can transmit or gather data over the Internet. For instance, we use a smartphone to control our home security system remotely. A gateway is a network node that connects two different networks together. Smart Tips! 58 Mid Semester Test 1 Topic 2 Answers Internet Technology PENERBIT ILMU BAKTI SDN. BHD.
1 Computer System Quick Check 1.1 1 (a) Input–Computer receives or accepts data and instructions into memory of a computer. (b) Processing–Activities of transforming data into information. (c) Output–Data that has been processed into a useful form. (d) Storage–Physical location where a computer keeps data, information, programs, and applications for future use. 2 Input Processing Output Storage 3 INPUT: (i) The system scans the card. (ii) The system reads the card’s balance amount. PROCESS: (i) The system verifies the card’s balance amount. (ii) The system deducts the toll fee from the card’s balance. OUTPUT: (i) The system displays the new balance on the screen. (ii) The system gives the instruction to the raise the toll gate. STORAGE: (i) The system records the transaction. (ii) The system updates the card’s new balance amount. 4 INPUT: System reads the marks for each quiz, assignment and group project. PROCESS: System calculates the sum of the coursework marks. OUTPUT: System displays the sum of the coursework marks. Quick Check 1.2(a) 1 The bit is the smallest unit of data in computer systems. It can hold only one of two values, either 0 or 1. 2 (a) A bit represents a single binary digit of 0 and 1. (b) A byte is a group of 8 bits. 3 Decimal number system is a base 10 number system having ten digits from 0 to 9. Binary number system is a base 2 number system having two digits that are 0 and 1. Hexadecimal number system is a base 16 number system having 16 alphanumeric values that are 0,1,2,3,4,5,6, 7, 8, 9, A, B, C, D, E and F. 4 Computers represent data in binary form because there are two states of electric signals: high (on) or low (off) voltage that can be represented by 1 (high) or 0 (low). 5 It is easy to convert between binary and hexadecimal numbers. – Hexadecimal numbers can represent binary values in a more compact and readable form. Quick Check 1.2(b) 1 1111102 2 110101012 3 110010102 4 92 5 57 6 199 Quick Check 1.2(c) 1 19616 2 C0.0.0.2 3 FACE16 4 162 5 2 845 6 61 946 Quick Check 1.2(d) 1 3A16 2 52C16 3 9F7B16 4 101001102 5 1011110001002 6 1011112 Quick Check 1.3 1 (iii), (iv) (i), (ii) 2 (a) 64 bits, 8 bytes (b) 80 bits, 10 bytes 3 128 bits, 16 bytes 4 (a) 112 bits (b) No 5 352 bits, 44 bytes 6 Unicode – it can represent up to 65 536 characters and can support all the languages of the world. Quick Check 1.4(a) 1 Boolean Notation Gate Logic Symbol (a) !A or A' or A A Y (b) A·B A B Y (c) A+B A B Y (d) A·B A B Y (e) A+B A B Y (f) AB A B Y Answers 144 PENERBIT ILMU BAKTI SDN. BHD.
Answers Answers (g) AB A B Y 2 OR AND NOR NAND XOR XNOR (a) 0 0 1 1 0 1 (b) 1 0 0 1 1 0 (c) 1 0 0 1 1 0 (d) 1 1 0 0 0 1 3 (a) OR (b) AND (c) NOR (d) NOT (e) XOR (f) NAND (g) XNOR Quick Check 1.4(b) 1 (a) X = A.(BC) A B C A BC X 0 0 0 1 0 0 0 0 1 1 1 1 0 1 0 1 1 1 0 1 1 1 0 0 1 0 0 0 0 0 1 0 1 0 1 0 1 1 0 0 1 0 1 1 1 0 0 0 (b) X = A(A.B) A B A A.B X 0 0 1 0 1 0 1 1 0 1 1 0 0 0 0 1 1 0 1 1 (c) X = (AB+C) + BC A B C C AB AB + C (AB+C) BC BC X 0 0 0 1 0 1 0 0 1 1 0 0 1 0 0 0 1 0 1 1 0 1 0 1 0 1 0 0 1 1 0 1 1 0 0 0 1 1 0 1 1 0 0 1 0 1 0 0 1 1 1 0 1 0 0 0 1 0 1 1 1 1 0 1 1 1 0 0 1 1 1 1 1 0 1 1 0 1 0 0 2 (a) (b) A B C A.B Q A.C 3 (a) D B A C (b) (B+C)' A'B+(B+C)' 1 1 0 0 0 1 0 1 1 1 0 0 0 0 0 0 4 (a) X = (AB+C) + BC A B C A' C' A'C BC' A'C + BC' Y = (A'C + BC')' 0 0 0 1 1 0 0 0 1 0 0 1 1 0 1 0 1 0 0 1 0 1 1 0 1 1 0 0 1 1 1 0 1 0 1 0 1 0 0 0 1 0 0 0 1 1 0 1 0 0 0 0 0 1 1 1 0 0 1 0 1 1 0 1 1 1 0 0 0 0 0 1 (b) A Y B C 5 Y = A'.B'.C A B C Q A.B B+C B.C 145 PENERBIT ILMU BAKTI SDN. BHD.
Answers Answers Summative Practice 1 1 (a) Input: Computer receives or accepts data and instructions into the memory of a computer. (b) Storage: Physical location or material on which a computer keeps data, information, programs, and applications for future use. 2 Process: (a) Process first customer’s payment of RM100 and update new account balance and depositor details. (b) Process second customer’s payment of RM220 and update new account balance and depositor details. Storage: (a) Account stores updated balance of RM300 in Bella’s bank account. (b) Bella’s bank account stores new balance total of RM520. 3 (a) Input - item (round neck shirt) - quantity of item (2) - price of item (15.00) - cash payment (50.00) (b) Process - calculate total amount (30.00) - calculate change (20.00) (c) Output - diplay information on receipt - display total amount - display change - receipt transaction 4 A. The machine will read the card entered by user. 5 Computers only understand digital data in binary form. The data in a computer system are represented by 1s and 0s for two states of electric pulse of high (on) or low (off) voltage. 6 (i) It is the simplest data representation (0 and 1) which can be easily processed by electronic circuits. (ii) Binary digits require very little space to store and transmit data, which allows for compact storage and efficient data transfer. (iii) Binary digits can be processed quickly by electronic circuits, allowing for high-speed processing of data. 7 461 8 412 is an even number. 9 100110112 10 11001102 11 8B2F16 12 A. CD 13 10016 14 2621 15 7D16 16 775516 17 1111111012 18 1001110110010102 19 38 bits,19 bytes 20 Characteristic ASCII EBCDIC Unicode Number of bits Uses 8 bits for a character Uses 8 bits for a character Uses 16 bits for a character Character representation Can represent 256 characters Can represent 256 characters Can represent 65 536 characters Usage Primarily used in PCs Primarily used on mainframe and highend servers Implemented in several OS, such as Windows, Mac OS, Linux. 21 (a) C2 C3 C4 C1 0 0 0 0 0 0 1 1 0 1 0 0 0 1 1 1 1 0 0 0 1 0 1 1 1 1 0 1 1 1 1 1 (b) C1 = (C2.C3) + C4 22 Y = AB'C 23 X Y Z 0 0 0 0 1 0 1 0 0 24 D. A = 1, B = 0, C = 0 2 Internet Technology Quick Check 2.1 1 A network is a collection of computers and devices connected together via communication devices and transmission media. 2 Wired transmission media: Twisted pair cable / Coaxial cable / Fibre optic cable 3 Wireless transmission media: (i) Infrared (ii) Broadcast radio (iii) Cellular radio (iv) Microwave (v) Satellite 4 Facilitating communication: Using a network, people can communicate efficiently and easily via e-mail, instant messaging, chat rooms, blogs, wikis, online social networks and others. Network failure: If the file server fails, users on the network cannot access any files or folders, and work will be disrupted. Quick Check 2.2 1 Network architecture is the configuration of computers, devices and media on a network. 146 PENERBIT ILMU BAKTI SDN. BHD.
Answers Answers 2 (i) Peer-to-peer (ii) Client/Server 3 Client-Server Peer to Peer Only servers have high responsibilities and capabilities. All the computers have equal responsibilities and capabilities. Difficult to set up and configure the computers in the network; usually network professionals are needed. Easy to set up and configure the computers in the network; does not need network professionals. Centralised control by the server is often more efficient at administering the whole network. Every user takes care of his/ her own machine; so it could be difficult to administer the network. Cost to install and manage the network can be expensive. Cost to install and maintain the network is inexpensive. 4 (i) Less reliable because too dependent on the server; any failure of the server will affect the network. The peer-topeer architecture is more reliable because failure of one peer will not affect other peers. (ii) Network professionals are normally needed to manage and maintain the whole network while the peer-to-peer network is easy and inexpensive to set up and manage. Quick Check 2.3 1 A WAN is a network that connects the computers and devices over a large geographical area such as a city, country or world. 2 LAN – computer lab WAN – Internet 3 (a) WAN (b) LAN 4 (a) WAN (b) LAN Quick Check 2.4 1 The Internet is a worldwide collection of networks that links millions of businesses, government agencies, educational institutions, and individuals. 2 Advantages: (i) Huge information resources - By using an available search engine such as Google and Yahoo!, students and teachers will have the ability to access all different types of information, which can greatly improve their learning/ teaching process. (ii) Facilitates communication - Online communication facilities such as email and messaging make it easier for students to ask questions or have a discussion with lecturers and friends after hours. (iii) Convenient cloud storage – Students and teachers can store learning materials and access learning materials from anywhere at any time via cloud storage such as Google Drive, and Dropbox. (iv) Accessibility of assignments after class hours - Access to assignments online after hours can give students the ability to complete assignments on their own timetable and having a way to study or submit assignments from home can greatly help the students. Disadvantages: (i) Interfere with and may cause stress in one's personal, school, and/or work life. (ii) Cybercrime – When personal and confidential records are not protected properly, individuals may find their privacy violated and identities stolen. (iii) Social alienation/decrease in social abilities - The more time one spends on the Internet, the less time they spend communicating with other people. In particular Internet users tend to spend less time talking to friends and family over the phone that limits their social skills. (iv) Physical injury – Prolonged or improper computer use to access to the Internet can lead to injuries or disorders of the hands, wrists, elbows, eyes, neck, and back. (v) Cyberbullying – Individuals can be a potential target of social media verbal bullying due to hatred. 3 (a) Education: Internet will help students and teachers to take up shortterm courses with the course material available online; they can attend virtual classes, learn, and appear for exams. (b) Society: Using the Internet has many benefits, including having the access to information. In addition, the Internet allows people to communicate quickly and easily. (c) Entertainment: It gives people a chance to see and enjoy other cultures, traditions, ways of life, and various forms of entertainment. (d) Banking: Internet banking is available 24/7 and it allows for easy fund transfers and bill payments. (e) Advertising: Internet advertising allows advertisers to choose their target audience, or the audience to which their brand and products are directed, so that they can receive their ads. (f) Business: Key benefits of using the Internet in business are profits, visibility, customer base, customer support options, opening hours (since the Internet is 'on' 24 hours a day) and cost savings. 4 Intranet – is a computer network within an organisation that uses Internet technologies for members of the organisation only. Extranet – is the portion of a company’s network that allows customers or suppliers of a company to access parts of an enterprise’s intranet. Quick Check 2.5 1 (a) Provides high-speed Internet access through the cable television network via a cable modem. (b) Provides high-speed Internet connections through the telephone network. 147 PENERBIT ILMU BAKTI SDN. BHD.
Answers Answers (c) Fibre optic technology converts electrical signals to light pulses (on/off) and sends the light pulses through transparent glass fibres. (d) Uses radio signals to provide high-speed Internet connections to computers and devices. (e) Uses cellular radio network to provide high-speed Internet connections to computers and devices with builtin compatible technology ( 3G, 4G or 5G), a wireless modem or other communication device. (f) Provide high-speed Internet connections by using dishshaped antenna on a building to communicate with a tower location via radio signal. (g) Provide high-speed Internet connections via satellite to a satellite dish that communicates with a satellite modem. 2 (a) Wired and wireless broadband Internet connection (b) (i) Fixed wireless (ii) Cable Internet service (iii) Mobile broadband 3 Broadband Internet connection provides users with high speed Internet connection that allows them to do various online activities such as video streaming, online shopping, Voice over Internet Protocol (VoIP), online class and many more. 4 (i) Cable Internet service (ii) DSL (Digital Subscriber Line) Quick Check 2.6 1 Internet Protocol address is a sequence of numbers that uniquely identifies the location of each computer or device connected to the Internet. 2 IPv4: 10.20.86.124 IPv6: 2001:db18:3333:4444:CCCC:DDDD:EEEE:FFFF 3 (a) Identifies the location of each computer or device connected to the Internet (b) 202 . 256 . 201 , 11 4 The need for more IP addresses due to the increasing use of the Internet cannot be fulfilled by IPv4. IPv6 can provide up to 2128 addresses. 5 IPv4 Addresses IPv6 Addresses Written in decimal digits Written in hexadecimal digits Consist of 4 groups/octets separated by dots Consist of 8 hexadecimal strings separated by colons Values of each octet range from 0 to 255 Value of each string range from 0 to FFFF 6 At the current rate growth of the Internet, available IP addresses under the IPv4 scheme will soon run out. IPv6 will be able to provide significantly more addresses, that is, up to 2128. 7 A domain name is a text version of an IP address 8 The TLD “.com” indicates that the website is associated with a commercial organisation or business 9 Generic TLD: .gov Counttry code TLD: .my 10 (a) .edu (b) .gov Summative Practice 2 1 (a) Coaxial cable (b) Fibre-optic cable (c) Wireless 2 X = Fibre-optic cable Y = Infrared/Broadcast radio/Microwave 3 (a) Peer 1 Hub Peer 3 Peer 2 Peer 4 (b) Server Hub Client2 Client1 Client3 4 (a) Client-Server (b) Peer-to-peer 5 LAN WAN (a) The speed of LAN is high (quicker than WAN). The speed of WAN is slower than LAN. (b) Connects computers and devices in a limited geographical area such as a home, school or office. Connects computers and devices in a large geographical area such as a country, or the world. 6 (i) Violation of privacy – This can occur if confidential information is not kept securely or not password controlled (ii) Public safety – All users around the world are using the Internet to share data publicly, such as photos, journals, videos and others. Some of these unsuspecting, innocent computer users have fallen victim to crime committed by dangerous strangers. 7 (a) (i) Intranet – A private network of an organisation which uses Internet technologies to share the organisation’s information or operations with its employees. (ii) Extranet – A private network of an organisation that securely shares parts of the organisation’s information with its suppliers, vendors, partners, customers, or other organisations. 8 Financial transaction: Users can use online banking in finance such as to transfer funds, check account balance, and make payments without queuing in the banks anymore. Business transaction: By using online shopping, users can make orders with convenience and quick service from the sellers. 9 Intranet – Make company information accessible to employees and facilitate working in groups. OR 148 PENERBIT ILMU BAKTI SDN. BHD.
Answers Answers Share company resources accessed only by members of an organisation Extranet – Share information exclusively with third parties 10 (Choose any one) - Students access matriculation portal using dedicated IP address to find their personal information, messages from the administrator, update their new information or others. - Staff and lecturers receive internal email from the College Director internally. - Lecturers fill students’ attendances in eMatris portal. - Lecturers fill in students’ marks in eMatris portal by accessing the portal internally using IP address dedicated for the portal. - Using learning portal that is only accessible to matriculation students. - Lecturers use a helpdesk system to report computer problems. 11 Applicant: - Email the resume to organisation - Online interview by using Zoom or StreamYard - Search information about company details Employer: - Receive resume via email from applicant - Conduct online interview via by using Google Meet or Zoom - Search and verify personal information on applicant through social media 12 (Choose any two) - Cable Internet Service Provides high-speed Internet access through the cable television network via a cable modem - DSL (Digital Subscriber Line) Provides high-speed Internet connections through the telephone network via a DSL modem - Fibre to the Premises (FTTP) Uses fibre-optic cable to provide high-speed Internet access often via a modem - Wi-Fi (Wireless fidelity) Uses radio signal to provide high-speed Internet connections to computers and devices with built-in Wi-Fi capability or a communications device that enables Wi-Fi connectivity. 13 (a) Wi-Fi (Wireless fidelity) (b) Fibre to the Premises (FTTP) (c) Mobile broadband (d) DSL (Digital Subscriber Line) 14 (i) Wi-Fi (Wireless fidelity) (ii) Mobile broadband 15 (a) Provides high-speed Internet connections by using a dish-shaped antenna on a building to communicate with a tower location via radio signal (b) Provides high-speed Internet connections through the telephone network via a DSL modem 16 IP address is a sequence of numbers that uniquely identifies the location of each computer or device connected to the Internet or any other network. Because lengthy IP addresses can be difficult to remember, the Internet supports domain names. A domain name is the text version of an IP address. 17 Example: 192.168.0.103 The smallest number is 0 The largest number is 255 18 Example of IP address: 192.168.0.120 Example domain name: google.com 19 An IP address identifies the location of each computer or device connected to the Internet or any other network. 20 Invalid because the third octet 256 is more than 255. 21 IPv6 provides much larger address space, with improved traffic routing and better security. 22 (a) .gov (b) .org 23 Due to the growth of the Internet, the original IPv4 addresses began dwindling (running out) in availability. 3 Computer Ethics and Security Quick Check 3.1 1 Computer ethics refers to the guidelines that govern the use of computers and information systems. 2 (a) Information accuracy is concerned with assuring the authenticity and fidelity of information, and identifying those accountable for informational errors that harm people. (b) Green computing involves reducing electricity consumption and environmental waste while using a computer. (c) Software piracy is the illegal copying, distribution, or use of software. (d) A code of conduct is a written guideline that helps determine whether a specific computer action is ethical or unethical. (e) Information privacy refers to the right of individuals and companies to deny or restrict the collection and use of information about them. (f) Intellectual property rights refers to the exclusive rights of creators or inventors over the use of their unique and original works such as ideas, inventions, art, writings, processes, company and product names, and logos. 3 False. Sharing inaccurate information is not ethical, even if it supports your argument. 4 Copyright refers to the exclusive rights given to an author/ artist for their materials (literary works; musical works; artistic works; films; sound recordings; broadcasts; and derivative works) 5 Copyright Quick Check 3.2 1 Netiquette is the code of acceptable behaviours that users should follow while online on the Internet. 2 (a) World Wide Web - Do not share or distribute personal information about others without their permission. - Be cautious when sharing your own personal information online. - Use language that is appropriate for the audience and purpose of the website or online platform. - Avoid using offensive language or making personal attacks. - When using information or content from other sources, 149 PENERBIT ILMU BAKTI SDN. BHD.
Answers Answers be sure to give proper credit or citation. (b) E-mail - Use a clear and concise subject line. - Start with a greeting and end with a closing. - Keep the message focused and to the point. - Do not use all capital letters or excessive punctuation. - Use a professional signature with your contact information. (c) Instant Messaging - Use appropriate language and do not use ALL CAPITAL LETTERS (which is equivalent to shouting), excessive punctuation or emojis that can be misconstrued. - Avoid using sarcasm or jokes that may be misinterpreted. - Use emoticons to express emotion for informal communication: Use emoticons to convey emotions, express humor or sarcasm, or to indicate the tone of your message. - Avoid sending too many messages in a short time frame, or sending messages outside of normal business hours. - Ensure that your messages are clear and easy to understand. (d) Chat Rooms - Use appropriate language. Be polite. Avoid offensive language. - Use proper grammar, spelling, and punctuation (Ensure that your messages are clear and easy to understand). - Avoid sending or posting flames, which are abusive or insulting messages. - Be careful when using sarcasm and humor, as it might be misinterpreted. - Treat others in the chat room as you would like to be treated. (e) File Transfer Protocol - Be mindful of what files you are transferring and who may have access to them. - Use secure FTP connections and encryption where possible. - Be respectful of the website, server, and other users who may be using the FTP service. - Avoid deleting or modifying files that are not yours without permission. - Read and follow the rules and guidelines of the server or FTP service. (f) Message boards - Be respectful of other users and their opinions, even if you disagree with them. - Avoid using derogatory language, personal attacks, or making inflammatory statements. - Keep your messages relevant to the topic of the message board. - Avoid posting off-topic messages or hijacking threads. - Read and follow the rules and guidelines of the message board. 3 - Avoid using shorthand or abbreviations that the recipient may not understand. - Do not share sensitive or confidential information. - Avoid forwarding or sharing messages without permission. 4 - Avoid plagiarising or sharing messages without permission. - Only share links to trustworthy and reliable sources. - Avoid sharing links to inappropriate or unsafe websites. 5 Not acceptable: Use appropriate language and DO NOT USE ALL CAPITAL LETTERS which is the equivalent of shouting. Quick Check 3.3 1 Virus, Worms, Trojans, Ransomware, Spyware, Adware, Rootkits, Backdoors, Bots, Logic bombs 2 Unauthorised access and use refers to the act of accessing, modifying, or using a computer or network without proper authorisation. Examples: Salman, a former employee of a company, used his old credentials to log into the company's network and accessed confidential client data without authorisation. This action constitutes unauthorised access and use since Salman was no longer an authorised user of the system and did not have permission to access the data. 3 Hardware theft is the act of stealing computer equipment. This type of theft is a security risk because the stolen hardware can contain sensitive or confidential data that can be accessed or exploited by unauthorised individuals. 4 Common methods used by thieves to steal computer hardware include breaking into offices or homes, stealing devices from parked cars or unattended public places, and using social engineering techniques to trick people into handing over their devices. 5 Software theft, also known as software piracy, is the act of illegally copying, sharing, distributing or using software without the proper licensing or authorisation from the software's owner. 6 Information theft, also known as data theft, is when someone steals personal or confidential information. This can occur through various means, such as hacking into a computer system, stealing physical storage devices like hard drives or USB drives, or even tricking someone into divulging sensitive information through phishing or social engineering attacks. 7 Common causes of system failures include hardware or software errors, power outages, natural disasters, and cyberattacks. 8 Malicious code refers to a program that acts without a user’s knowledge and deliberately alters the computer’s operation. It can damage the computer by interfering with or stealing sensitive data, compromising system resources or gaining unauthorised access to networks or devices. 9 A virus is a malicious program that replicates itself by attaching its code to other legitimate programs or documents. Example: "ILOVEYOU". A worm is a standalone malicious program that can replicate itself over a network without requiring a host file or user action. Example: “Code Red” 10 Ransomware is a type of malware that encrypts a victim's files and demands payment in exchange for the decryption key. Once the ransomware has infected a computer, it typically displays a message demanding payment, often in the form of cryptocurrency, in exchange for the decryption key. Examples: WannaCry, Locky 150 PENERBIT ILMU BAKTI SDN. BHD.
Answers Answers Quick Check 3.4 1 Data backup is an important security measure because it provides a copy of important data in case the original data is lost, damaged or compromised due to various reasons such as hardware failure, malware attack, accidental deletion or natural disaster. 2 Common methods of data backup include local backup to external hard drive or storage device, cloud backup to remote server, and network backup to another computer or server. 3 Cryptography is the practice of encoding information to secure communication in the presence of third parties so it can only be read by authorised individuals. It involves transforming plain text data (also known as cleartext) into an encoded form that can only be read by the intended recipient with the decryption key. 4 It is a program or set of programs designed to detect, prevent, and remove malicious software (malware) from computer systems. It is important for computer security because it can protect a computer from various types of malware, including viruses, trojans, and spyware. 5 Anti-spyware is a type of software designed to detect, prevent spying activities and remove unwanted spyware programs from a computer. Anti-spyware software works by scanning a computer system for spyware programs and removing them. 6 A firewall is a part of computer system or network designed to block unauthorised access while permitting outward communication. It acts as a barrier between a trusted internal network and an untrusted external network, such as the Internet. A firewall can prevent unauthorised access to your computer by blocking malicious traffic from reaching your system and by preventing unauthorised applications from communicating with the Internet. 7 Physical access control is a security measure that restricts access to physical spaces, equipment, and resources based on authentication and authorisation at access points. 8 The human aspect of cybersecurity refers to the awareness and education of individuals in an organisation or society to follow proper security practices to prevent security breaches and protect sensitive data. 9 The frequency of data backup depends on the amount and importance of the data. Generally, it is recommended to perform backup at least once a week for important data, and more frequently for data that changes frequently. 10 Data backup can be secured by using encryption, password protection, and restricting access to the backup storage. Encryption ensures that the data is unreadable without the encryption key, while password protection prevents unauthorised access. Access to the backup storage should be restricted to authorised personnel only to prevent theft or damage. Summative Practice 3 1 (a) Green computing (b) Information privacy (c) Intellectual property rights (d) Intellectual property rights 2 Not obtaining accurate information regarding the pandemic can cause misunderstanding and misjudgement among civilians. This can lead to public distrust and concern, and create panic and chaos in society. 3 (a) Intellectual property (b) Information accuracy (c) Information privacy (d) Green computing (e) Intellectual property rights 4 - May cause a fatal air crash as incorrect weather forecast may lead to misjudgement. - Delayed flights might bring about a chaotic situation as many people are stranded in the airport because of wrongly analysed weather forecasts. 5 Act as moral guidelines to govern the use of computers and information system. 6 (a) Rights given to creators over the use of their original work (b) Disclosure of information only to authorised users OR Right of individuals and companies to deny or restrict the collection and use of information about them 7 (a) Information accuracy (b) Green computing 8 (a) - Do not use all capital letters. - Use appropriate language with correct spelling and grammar and avoid offensive language. - Use abbreviations that are understood by all. (b) Sir, boleh saya tahu kelas ada ke esok? OR Sir, do we have class tomorrow? Could you please answer ASAP. Thank you. 9 - Do not use all capital letters as it resembles shouting. - Use a meaningful subject line. - Be courteous and avoid rude language. 10 - Ali reads John’s email without permission. - Joshua opens Ahmad’s email account without permission from Ahmad. - Didi uploads his friend’s photo or picture in instagram without permission. 11 - Use appropriate language. - Be polite. Avoid offensive language. - Use proper grammar, spelling, and punctuation to avoid misunderstandings. - Avoid sending or posting flames, which are abusive or insulting messages. - Avoid sending spam, which is the Internet’s version of junk mail. - Be careful when using sarcasm and humour, as it might be misinterpreted. - Do not use all capital letters, which is equivalent of shouting. - Use emoticons to express emotion for informal communication. - Use abbrevaitions and acronyms only for common phrases. 12 Unethical; Message is not concise OR Message should be brief 151 PENERBIT ILMU BAKTI SDN. BHD.