ict t4
TRANSCRIPT
-
7/24/2019 ict t4
1/35
COMPUTER SECURITY
LESSON 16
COMPUTER SECURITY
DEFINITION OF COMPUTER SECURITY
Computer security means protecting ourcomputer systems and the information theycontain against unwanted access, damage,destruction or modification.
We need to protect our computer from any
intruders such as hackers, crackers and scriptkiddie.
We do not want strangers to read our e-mail, use our computer to
attack other systems, send forged e-mail from our computer, or examinepersonal information stored on our computer such as financial statements.
TYPES OF COMPUTER SECURITY
Three types of computer security are:
a) hardware security
b) software securitydata security
c) network security
a) HARDWARE SECURITY
!ardware security refers to security measures usedto protect the hardware specifically the computerand its related documents.
The examples of security measures used to protect
the hardware include "C-locks, keyboard-locks,
smart cards and biometric de#ices.
b) SOFTWARE AND DATA SECURITY
$oftware and data security refers to the security
measures used to protect the software and the lossof data files.
%xamples of security measures used to protect the
software are acti#ation code and serial number.
40
-
7/24/2019 ict t4
2/35
&n example of security measure used to protect the loss of data files is the
disaster reco#ery plan method. The idea of this plan is to store data,program and other important documents in a safe place that will not beaffected by any ma'or destruction.
c) NETWORK SECURITY
The transfer of data through network has become a
common practice and the need to implementnetwork security has become significant.
(etwork security refers to security measures used
to protect the network system. ne example of
network security measures is firewall. With firewall, network resources canbe protected from the outsiders.
PERSONAL COMPUTER SECURITY CHECKLIST
*n order to make sure our computers are secured, here are the computer
security checklist to follow.
+o not eat, drink or smoke near the computer
+o not place the computer near open windows or doors +o not sub'ect the computer to extreme temperatures
Clean the euipment regularly "lace a cable lock on the computer
se a surge protector $tore disks properly in a locked container
aintain backup copies of all files
$tores copies of critical files off sites $can a floppy disk before you open it +o not open any unknown email recei#ed
LESSON 17
INTRODUCTION COMPUTER THREATS
The computer is a great tool to store important information. *n certain
cases, the information is #ery #ital that losing it will harm the computer
system.
Computer threats can come from many ways either from human or natural
disasters. /or example, when someone is stealing your account informationfrom a trusted bank, this threat is considered as a human threat. !owe#er,
when your computer is soaked in hea#y rain, then that is a natural disasterthreat.
MALICIOUS CODE
41
-
7/24/2019 ict t4
3/35
alicious code is also known as a rogue program. *t is
a threat to computing assets by causing undesiredeffects in the programmer0s part. The effect is causedby an agent, with the intention to cause damage.
The agent for malicious code is the writer of the code,
or any person who causes its distribution. There are
#arious kinds of malicious code. They include #irus, Tro'an horse, logic door,trapdoor and backdoor, worm and many others.
a) VIRUS
a program that can pass on the malicious
code to other programs by modifying them
attaches itself to the program, usually files
with .doc, .xls and .exe extensions
destroys or co-exists with the program
can o#ertake the entire computing system and spread to other
systems
b) TROJAN HORSE
a program which can perform useful and
unexpected action
must be installed by users or intruders
before it can affect the system0s assets
an example of a Tro'an horse is the login script that reuests for
users0 login *+ and password
the information is then used for malicious purposes
42
-
7/24/2019 ict t4
4/35
c) LOGIC BOMB
logic bomb is a malicious code that goes off when a specific
condition occurs.
an example of a logic bomb is the time bomb
it goes off and causes threats at a specified time or date
) TRAPDOOR OR BACKDOOR
a feature in a program that allows
someone to access the program withspecial pri#ileges
!) WORM
a program that copies and spreads itselfthrough a network
P"#$a"% D#!!"&c' B(& W*"$' A&+ ,#"-''
W*"$
perates through the network
$preads copies of itself as astandalone program
V#"-'
$preads through any medium
$preads copies of itself as aprogram that attaches to otherprograms
HACKER
!acking is a source of threat to security in computer.
*t is defined as unauthorised access to the computer
system by a hacker.
!ackers are persons who learn about the computer system in detail. They
write program referred to as hacks. !ackers may use a modem or cable to
hack the targeted computers.
NATURAL AND ENVIRONMENTAL THREATS
Computers are also threatened by natural or en#ironmental disaster. 1e it athome, stores, offices and also automobiles.%xamples of natural anden#ironmental disasters:
/lood
/ire
%arthuakes, storms and tornados
%xcessi#e !eat
*nadeuate "ower $upply
43
-
7/24/2019 ict t4
5/35
-
7/24/2019 ict t4
6/35
THEFT
Two types of computer theft:
2) Computer is used to steal money, goods,
information and resources.3) $tealing of computer, especially notebook and
"+&s.
Three approaches to pre#ent theft:
2) pre#ent access by using locks, smart-card or
password3) pre#ent portability by restricting the hardware
from being mo#ed4) detect and guard all exits and record any
hardware transported
44
-
7/24/2019 ict t4
7/35
SECURITY MEASURES
Today, people rely on computers to create, store and manage critical
information. *t is important that the computer and the data they store areaccessible and a#ailable when needed. *t is also important that users takemeasures to protect their computers and data from lost, damage andmisused.
$ecurity measures mean the precautionary measures taken toward possible
danger or damage. There are 5 type of security measures.
1) DATA BACKUP
+ata 1ackup is a program of file duplication. 1ackupsof data applications are necessary so that they can
be reco#ered in case of an emergency.
+epending on the importance of the information,
daily, weekly or biweekly backups from a hard diskcan be performed.
45
-
7/24/2019 ict t4
8/35
.) CRYPTOGRAPHY
Cryptography is a process of hiding information by altering the actual
information into different representation, for example, an &"& can bewritten as *6 7.
&lmost all cryptosystems depend on a key such as a
password like the numbers or a phrase that can be used to encrypt or
decrypt a message.
The traditional type of cryptosystem used on a computer network is called a
symmetric secret key system.
/) ANTIVIRUS
&n anti#irus program protects a computer against#iruses by identifying and remo#ing any computer#iruses found in the computer memory, onstorage media or incoming e-mail files.
&n anti#irus program scans for programs that
attempt to modify the boot program, the operatingsystem and other programs that normally are read from but not modified.
IDENTIFYING VIRUS
Two techniue are used to identify the #ir
VIRUS SIGNATURE
&lso called a #irus definition is a
specific pattern of the #irus code.
INOCULATING A PROGRAM FILE
The anti#irus program recordsinformation such as the file si8e and filecreation date in a separate inoculationfile.
The anti#irus program then uses this
information to detect if a #irus tampers
with the data describing the inoculatedprogram file.
*f an anti#irus program identifies an infected file, it attempts to remo#e its
#irus, worm or Tro'an horse. *f the anti#irus program cannot remo#e theinfection, it often uarantines the infected file. 9uarantine is a separate
area of a hard disk that holds the infected file until the infection can beremo#ed. This step ensures other files will not become infected. "atents forin#entions tility, design or plant patents that protect in#entions andimpro#ements to existing in#entions
0) ANTISPYWARE
$pyware is a program placed on a computer withoutthe user0s knowledge. *t secretly collects information
about the user.46
-
7/24/2019 ict t4
9/35
The spyware program communicates information to
the outside source.
&n anti-spyware application program sometime called tracking software or a
spybot is used to remo#e spyware.
&mong of the popular anti-spyware programs are:
$pybot $earch and +estroy
&d-aware
$pyware 1laster
2) FIREWALL
/irewall is a piece of hardware or software whichfunctions in a networked en#ironment to pre#ent somecommunications forbidden by the security
policy.
/irewall implement a security policy. *t might permit
limited access from in or outside the networkperimeters or from certain user or for certain acti#ities.
6) HUMAN ASPECTS OF SECURITY MEASURES
!uman aspects refer to the user and also the intruderof a computer system.
*t is one of the hardest aspects to gi#e protection to.
47
-
7/24/2019 ict t4
10/35
The most common problem is the lack of achie#ing a good information
security procedure.
LESSON 13
RELATIONSHIP BETWEEN SECURITY THREATS AND
SECURITY MEASURES
$ecurity threats may come from in many forms. /or example, when
someone is in#ading your account information from a trusted bank, this actis considered as a security threat.
$ecurity measures can be used to pre#ent this in#ader
from getting the account information. /or example, thebank can use a firewall to pre#ent unauthorised access toits database.
SECURITY THREADS
$ecurity threats may come from in many forms. /or example, when
someone is in#ading your account information from a trusted bank, this actis considered as a security threat.
$ecurity measures can be used to pre#ent this in#ader from getting the
account information. /or example, the bank can use a firewall to pre#entunauthorised access to its database.
MALICIOUS CODE THREATS VS4 ANTIVIRUS AND
ANTISPYWARE
$ecurity threats include #irus, Tro'an horse, logic bomb, trapdoor andbackdoor, and worm.
48
-
7/24/2019 ict t4
11/35
&nti#irus and anti-spyware can be used to protect the computer from the
threats by:
limiting connecti#ity
allowing only authorised media for loading data and software
enforcing mandatory access controls
blocking the #irus from the computer program
HACKING VS4 FIREWALL
!acking is an unauthorised access to the computer
system done by a hacker. We can use firewall orcryptography to pre#ent the hacker from accessing
our computers.
& firewall permits limited access to unauthorised
users or any acti#ities from the network en#ironment. Cryptography is aprocess of hiding information by changing the actual information into
different representation, for example, an &"& can be written as ;
-
7/24/2019 ict t4
12/35
BE SUPSPICIOUS OF ALL RESULTS
There are many instances where non-programmers
de#elop applications which are not built with properunderstanding of software engineering practices.
+ata produced by such applications may not be
correct and may risk corrupting data recei#ed from
other sources that are not compatible with theapplication.
LESSON .5
SECURITY PROCEDURES
Computers should ha#e alarm systems to guard them from any attacks such
as #iruses and data corruption. The alarm system is the security measuresthat we take to ensure its safety.
DATA PROTECTION
We need to protect the data in the computer as itmay somehow get lost or corrupted due to some#iruses or mishap like fire, flood, lightning, machinefailures and e#en human errors.
There are a few ways to protect the information namely:
make backup files detect the #irus and clean the computer warn others on #irus attacks
1) BACKUP FILES
sers can do backups of file systems by: keeping the duplicated files in external storage
such as in the floppy disk and thumb dri#e do backup freuently
.) DETECT VIRUS AND DO CLEANUP
& computer #irus is able to affect and infect the waythe computer works. >iruses can be detected when
we run an anti#irus program.We can also delete theinfected files and documents.
/) WARN OTHERS ON VIRUS
ATTACK
We can warn others on #irus attacks or new #iruses
by sending e-mails to them.
50
-
7/24/2019 ict t4
13/35
DETECTING ILLEGAL ACCESS TO SYSTEMS
The computer system is able to detect any illegal access to the system by auser who does not ha#e any authorisation. 1asically, a corporation willsimply use tcpwrappers and tripwire to detect any illegal access to theirsystem. ser?s access will be re#iewed periodically by computer operations.n going internal audits will be made to ensure detection of #iolations ofsecurity and unauthorised modifications to software and data .
TCPWRAPPERS
Tcpwrappers stop the attempted connection
examines its configuration files
will decide whether to accept or re'ect the reuest.
Tcpwrappers will control access at the application le#el, rather than at the
socket le#el like iptables and ipchains. The system will run tcpwrappers tolog access to ftp, tftp, rch, rlogin, rexec and telnet.
TRIPWIRE
Tripwire will detect and report on any changes in the
thousands of strategic system files.
The system will run tripwire to determine if system
files ha#e changed.
PREVENTING ILLEGAL ACCESS TO SYSTEMS
!a#e any of you e#er been to an airport6 +o you know the do0s and don0ts
when you are at the airport6
There are things that cannot be taken inside the airplane. *t is for the
purpose of security procedures.
*t is the same as computer systems. *t would not allow any unauthorised
users to simply access the system.
Ways to pre#ent illegal access to systems:
2. @un anlpassword to make password cracking difficult.
3. @un tcpwrappers to check if the name for an ip address can be
pro#ided by +(C4. se a callback system to pre#ent unauthorised use of stolen
passwords.
51
-
7/24/2019 ict t4
14/35
PREVENTING ILLEGAL ROOT ACCESS
To pre#ent any illegal root access, we should ha#e
S-+*so that people can perform on some machinewithout getting access to the entire root if that is notreuired. *n addition, with $udo we did not ha#e togi#e out the root password.
S-+*stands for A$uperuser do) and is a program in nix, Binux and similar
operating systems such as ac $ 7 that allows users to run programs in
the form of another user Anormally in the form of the system?s superuser).
S-+*allows a permitted user to execute a command as the superuser or
another user, as specified in the sudoers file.
PATCH
"atch supplies small updates to software, pro#ided
that the source code is a#ailable.
"atch is a name of an (*7 utility. *t applies a script
generated by the different program to a set of filesthat allows changes from one file to be directlyapplied to another file.
@esources are not enough to patch all security holes that we hear about
through the bugtraqlist.
(Bugtraq is a full disclosure mailing list dedicated to the issues of computersecurity. On-topic discussions are new discussions about vulnerabilities,
methods of exploitation and how to fix them. It is a high volume
mailing list and almost all new vulnerabilities are discussed there.
LESSON .1
COMPUTER APPLICATIONS IN THE SOCIETY
The computer has change the society today as much as industrial re#olution
changed society in 2thand 2Dthcentury. "eople interacts directly with
computer in education, finance, go#ernment, health care, science,publishing, tourism, and industry.
Computers help them to do their work faster and more efficient by using the
software application that consist of special program for specific task.
52
-
7/24/2019 ict t4
15/35
SOFTWARE APPLICATIONS
$oftware applications are used for many reasons. $uch as to enhance thelearning process, to help in business acti#ities, to assist the graphics andmultimedia pro'ect and to fasilitate communication.
A"a
!ome and%ducation
1usiness
Eraphics
and ultimedia
Ea$89' *! '*!(a" a889#ca(#*&'
*ntegrated software, "ersonal finance, Begal, Tax"reparation,Clip &rt*mage Eallery, !ome +esignBandscaping and
@eference
Word "rocessing, $preadsheet, +atabase, "resentation
Eraphics, "ersonal *nformation anager, $oftware $uite,
"ro'ect anagement and &ccountingComputer-aided design AC&+), +esktop "ublishing,
"aint*mage %diting, >ideo and &udio %diting, ultimedia&uthoring and Web "age &uthoring
Communication %-mail, Web 1rowsers, Chat @ooms, (ewsgroups, *nstant
essaging, Eroupware and >ideo Conferencing
These software application comes in packages.
53
-
7/24/2019 ict t4
16/35
SOFTWARE APPLICATIONSPACKAGES
S*!(a" A889#ca(#*&
Word "rocessing
$preadsheet
+atabase
"resentation Eraphics
"ersonal *nformation
anager
$oftware $uite
"ro'ect anagement
&ccounting
Ea$89' *! P*8-9a" Pac:a;'
icrosoft Word and Botus Word "ro
icrosoft %xcel and Botus 2-3-4
icrosoft &ccess and icrosoft >isual /ox"ro
icrosoft "ower "oint and Botus /reelanceEraphics
icrosoft utlook and "alm +esktop
icrosoft ffice and Botus $mart$uite
icrosoft "ro'ect and Corel C&T&BF$T
F1 and "eachtree Complete &ccounting
HOME AND EDUCATION
Today, computers are used in schools, colleges anduni#ersities in order to promote better education byusing computers. *n the labs, students use softwarepackages to complete their assignments. &t thesame time, some educators use the computer-basedtraining and web-based training as replacements forlecture presentation.
$ome of the software applications that are usually used in schools and
uni#ersities include icrosoft ffice, &dobe "hotoshop, acromedia /lash,&utoC&+, acromedia +reamwea#er and acromedia +irector.
COMPUTERS FOR HIGHER EDUCATION
pen +istance Bearning A+B) or online learning can
be implemented as computers are the main medium in
deli#ering the knowledge from one location to theother locations.
This type of learning consists of online forum,
discussion, ui88es, test uestions and many more.The example of the pen +istance Bearning institution is the pen ni#ersityof alaysia Awww.oum.edu.my).
BUSINESS
"eople use finance or accounting software to balance check books, pay bills,
track personal income and expenses, manage in#estments and e#aluatetheir financial plans.
&ccounting software helps companies to record and report their financial
transactions. %xamples of these software applications include F1, *ntuit9uick 1ooks and "eachtree Complete &ccounting.
54
-
7/24/2019 ict t4
17/35
COMPUTERS IN BANKING
*n the banking sector, many financial institutions offer online banking.
"eople can access their financial records from anywhere in the world. neexample of online banking is aybank3u. Awww.maybank3u.com)
ost of the packages on banking offer a #ariety of online ser#ices. Which
reuires access to the web./or example we can track our in#estment online, compare insurance ratesand do online banking.
INDUSTRY
1y using the C& system, computers record actual
labour, material, machine and computer time used tomanufacture a particular product.
Computers process this data and automatically update
in#entory, production, payroll and accounting recordson the company0s network.
%xamples of companies using this system are "rotonAwww.proton.com.my)
and "erodua Awww.perodua.com.my).
GRAPHICS AND MULTIMEDIA
Computers are crucial in publishing especially in theprocess of making works a#ailable to the public.These works include maga8ines, books, newspapers,
music and film production.
$pecial software applications are used to assist graphic designers to de#elop
graphics, texts, photographs and composing songs.
Computer-&ided +esign, +esktop "ublishing, "aint*mage %diting, >ideo and
&udio %diting and ultimedia &uthoring are among the popular applications
software.
COMMUNICATION
& go#ernment pro#ides society with direction bymaking and administering policies. ost go#ernment
offices or agencies ha#e websites in order to pro#ideciti8ens with up-to-date or latest information.
%xamples of software applications used for
communication include e-mail, web browsers,newsgroups, instant messaging and #ideo conferencing.
"eople can access go#ernment websites to:
check information on taxesAwww.hasil.org.my)
apply for permits and licenses Awww.'p'.go#.my)
55
http://www.maybank2u.com/http://www.maybank2u.com/http://www.hasil.org.my/http://www.hasil.org.my/http://www.jpj.gov.my/http://www.jpj.gov.my/http://www.maybank2u.com/http://www.maybank2u.com/http://www.hasil.org.my/http://www.hasil.org.my/http://www.jpj.gov.my/http://www.jpj.gov.my/ -
7/24/2019 ict t4
18/35
check for yGadAwww.'pn.go#.my)
pay parking tickets and check summons Awww.'p'.go#.my)
renew #ehicle registration Awww.'p'.go#.my)
register online for *"T&*"T$ application Awww.moe.go#.my)
COMPUTERS IN TOURISM
Today, people will go online to get all related
information about tra#eling. They can #isit websites toget information on destinations, prices, hotels, flights
and car rentals.
They can also purchase ticket online, all payments can
be made by using credit card.
COMPUTERS IN THE HEALTHCARE
*n the medical field, computers are #ery important in
running the operations. edical staffs use computersfor #arious purposes, namely:
maintaining patient records
monitoring patients0 #ital sign
assisting doctors, nurses and technicians with medical tests by usingcomputer and computerised de#ices .
using medical software to help with researching and diagnosing healthconditions.
/urthermore, computers and the internet are important sources for people to
get all information on medical, nutrition, fitness and other tips from se#eral
a#ailable websites. The latest de#elopment in the medical field istelemedicine. This technology is meant to help professional to conduct li#e
conference in separate locations around the globe.
SCIENCE
*n the scientific world, computers are used in allfields of science from biology to astronomy tometeorology and others. These are things thatcan be done by computers, namely:
collecting, analy8ing and modelling data
ser#ing as medium of communication with colleagues around the world
contributing to new in#entions or breakthrough in surgery, medicine
and treatment imitating functions of the central ner#ous system, retina of the eye
and others by tiny computers allowing a deaf person to listen through cochlear implant
56
http://www.jpn.gov.my/http://www.jpn.gov.my/http://www.jpn.gov.my/http://www.jpj.gov.my/http://www.jpj.gov.my/http://www.jpj.gov.my/http://www.jpn.gov.my/http://www.jpn.gov.my/http://www.jpn.gov.my/http://www.jpj.gov.my/http://www.jpj.gov.my/ -
7/24/2019 ict t4
19/35
LESSON ..
COMPUTER USERS
"eople around the world rely on computers to do so many things. They arefrom different backgrounds and are di#ided in H categories.
HOME USERThe computer is a basic necessity. %ach home user
spends time on the computer for different reasons: business
communication entertainment
education
SMALL OFFICE
-
7/24/2019 ict t4
20/35
obile users:
include real estate agents, insurance agents, meter readers and
'ournalists
use notebook computers, *nternet-enabled "+&s or smart phones
work with basic business software such as word processing andspreadsheet business software
use presentation graphics software to create and deli#er presentationsto a large
audience by connecting a mobile computer or de#ice to a #ideo
pro'ector
POWER USER
"ower users reuire the capabilities of workstationcomputers or other types powerful computers. Thesoftware that is used by power users is normally
expensi#e because of their speciali8e design. Theircomputer ha#e network access connections andinternet connections.
"ower users:
include engineers, scientists, architects and #irtual reality animators
use computers with extremely fast processor, bigger storage andcustomised software
work with mini computers that uses design to meet the organisationalneeds
use software such as C&+, C& and &TB&1%xamples :
LARGE BUSINESS USER
%ach employee or customer who uses computer inlarge offices of company is a large business user.Barge business users use a large network ofcomputers. se computers for basic business acti#itiessuch as preparing bills for millions of customers,preparing payroll and managing thousands of items in
the in#entory.
Barge business users:
bank, insurance company, hypermarket use computers for basic business acti#ities
ha#e e-commerce that allow customers and #endors to interact and dobusiness transactions online therefore customers, #endors and otherinterested parties can access information on the web
ha#e e-mail and web browsers to enable communications amongemployees, #endors and customers
pro#ide kiosks in public locations
any employees of large business telecommute, which means they workaway from their offices workstation. They also ha#e flexible schedule.
8
-
7/24/2019 ict t4
21/35
67
-
7/24/2019 ict t4
22/35
SYSTEM CONCEPT
LESSON .7
OVERVIEW OF COMPUTER SYSTEM
These de#ices are examples of computer hardware. & computer system
needs to ha#e these hardware to function.
COMPUTER SYSTEM
& computer system is defined as combination of components designed toprocess data and store files.
& computer system consists of four ma'or hardware componentsI input
de#ices, output de#ices, processor and storage de#ices.
& computer system reuires hardware, software and a user to fully function.
$oftware refers to set of instructions that tell the hardware what to do.
$oftware can also ha#e #arious other functions such as performingcomputation, communication with other software and human interaction.
ser refers to a person who uses the computer for any purposes such as
work, business and entertainment.
COMPUTER HARDWARE
Computer hardware consists of:
input de#ices
processor
output de#ices
storage de#ices
I&8-( D,#c'
*nput de#ices feed data or commands in a form that the computer can use.%xample of input de#ices are:
Geyboard
Bight "en
Joystick
icrophone
ouse
>ideo
+igital camera.
68
-
7/24/2019 ict t4
23/35
P"*c''*"
The C" is an example of a processor. *t has the
same important as the brain to human being.
O-(8-( D,#c'
utput de#ices such as the monitor shows
people the process data or information. Thistype of information can be understood and use
by computer user. ther example of outputde#ices are:
"rinter "lotter
$peaker
S(*"a; D,#c'
$torage usually means secondary storage. *t
consists secondary storage de#ices such ashardisk, /loppy +isk, diskette, C+ @ and +>+@.
COMPUTER SOFTWARE
There a 3 types of computer software, system software and applicationsoftware. $ystem software is any computer software that helps to runcomputer system. $ystem software controls, integrate and manages the
indi#idual component of a computer system.
69
-
7/24/2019 ict t4
24/35
LESSON .>
INTRODUCTION TO COMPUTER SYSTEM
COMPUTER HARDWARE BLOCK DIAGRAM
&n *nput de#ice feed raw data to the processor. & processor processes raw
data and turns it into useful information. & storage de#ice keeps or storesboth process and unprocess data for later usage. &n output de#ice shows or
display the processed data.
INPUT DEVICES
When data is entered into the computer system, it is called an input. *nput
comes in #arious formsI texts, graphics, audio and #ideo. *nput de#ices are
needed to input data into the computer system.
Geyboard, mouse, scanner, barcode reader and digital camera are someexample of input de#ices.
OUTPUT DEVICES
utput is the result of raw input data that has beenprocessed by the central processing unit into
meaningful information. Common forms of outputare texts, numbers, graphics, sounds, animations
and #ideos.The most common output de#ices arecomputer screens, speakers and printers.
-
7/24/2019 ict t4
25/35
STORAGE DEVICES
The system0s primary storage, @andom &ccess emory A@&) can only hold
data temporarily. Thus, secondary storage is needed to pro#ide additional
storage. The data stored in the secondary storage is considered permanentuntil it is deleted or remo#ed.
$econdary storage can be magnetic disks and optical disks. %xamples of
secondary storage are hard disks, rewritable C+s and +>+s as well as
remo#able disks such as pen dri#es.
PERIPHERAL DEVICES
%xternal hardware de#ices attached to the
computer are called peripheral euipments.
LESSON .3
INFORMATION PROCESSING CYCLE
+o you know how a computer works6 We use the computer in our e#eryday
li#es but not all of us know how this machine operates.
!uman uses the brain to think, make decisions and process information. &
computer has a brain too, and the brain of a computer is the processor or
the central processing unit AC") that processes information.
THE CENTRAL PROCESSING UNIT
The central processing unit or the C" is the brain of the computer.
&ll processing acti#ities are done in the C". *t
utilises the computer memory to execute instructionsfrom the application software and accomplish a task./or example: editing a letter, drawing a picture andsorting numbers.
The processor must be connected to input de#ices, output de#ices and
storage de#ices to carry out the abo#e mentioned tasks.
-
7/24/2019 ict t4
26/35
THE INFORMATION PROCESSING CYCLE
ser will input the data to be processed by the processor.
The storage holds databases, files and programs. The output de#icespresent the processed data as useful information products for the user.
INPUT
*nput is any data or instructions that we enter into the computer system for
processing.
There are some common ways of feeding input data
into the system, which are:
typing on a keyboard
pointing with a mouse
C" accepts instruction from the user and translates the instruction into
readable information Adecode).
PROCESS
The processing unit controls all acti#ities within the system. /or e#eryinstruction, the control unit repeats a set of four basic operations called the
machine cycle:
72
-
7/24/2019 ict t4
27/35
F(c?#&;
the process of obtaining a program instructions or data item from memory.
Dc*+#&;
the process of translating a program instruction into signals that thecomputer can execute.
Ec-(#&;
the process of implementing the instructions in a program.
S(*"#&;
the process of writing the result to the storage or memory.
STORAGE
$torage is a location which data, instruction andinformation are held for future use. %#ery computeruses storage to hold system software and applicationsoftware.
When we issue a command to start the applicationsoftware, the operating system locates the program in
storage and loads it into memory.
& storage medium, also called secondary storage is the physical material in
the computer that keeps data, instruction and information.
& storage de#ice is the computer hardware that records or retrie#es items to
and from storage media.
-
7/24/2019 ict t4
28/35
OUTPUT
utput is data that has been processed into a useful
form, called information. There are four types ofoutput, which are texts, graphics, audio and #ideo.
The text consists of characters that are used to
create texts, sentences and paragraphs.
Eraphics are digital representations of non text information such as
drawings, charts and photographs.
&udio is music, speech or any other sound. >ideo consists of images that
pro#ide the appearance of full motion.
LESSON /5
DATA REPRESENTATION
BINARY DIGIT
Computers recogni8e only two discretestates: on and off. These states can berepresented by two digits, K and 2. %ach Kor 2 is called a bit in the binary system.
1it is the smallest unit of data a computercan process. 1it is a short for binary digit.
The binary system has a base of 3 withthe two digits AK and 2). Combinations of
Ks and 2s represent larger numbers.
BIT
& bit is the smallest unit of data that the
computer can process. 1it is a short for binarydigit. & bit is represented by the numbers 2
and K. These numbers represent the binarysystem. They correspond to the states of on
and off, true and false, or yes and no.
&ll digital data use the binary system to process the information. This
information include letters, digits or special character.
BYTE
1yte is a unit of information built from bits. ne byte is euals to bits.
%ight bits that are grouped together as a unit. & byte pro#ides enoughdifferent combinations of Ks and 2s to represent 3H5 indi#idual characters.
ne byte represents a single character such as the number 4, letter b
74
-
7/24/2019 ict t4
29/35
or a L symbol. 1its and bytes are the basis for representing all meaningful
information and programs on computers.
CHARACTER
> b#(' @ 1 b%(
ne byte represents one character such as &, ;, D and M.%ight bits that aregrouped together as a unit. & byte pro#ides enough different combinationsof Ks and 2s to represent 3H5 indi#idual characters.
/or example, the capital letter / is represented by the binary code K2KKK22K
that can be understood by the computer system. %ight bits grouped togetheras a unit are called a byte. & byte represents a single character in thecomputer.
CHARACTER CODES
There are three character codes to representcharacters which are &$C**, %1C+*C and nicode.%ach byte contains eight bits. & byte pro#ides enoughdifferent combination of Ks and 2s to represent 3H5characters.
The combinations of Ks and 2s are defined by patterns. These patterns are
called coding scheme. The 3H5-character capability of &$C** and %1C+*C istoo small to handle the characters that are used by other languages such as&rabic, Japanese and Chinese.
The nicode coding scheme is designed to sol#e this problem. *t uses two
bytes A25 bits) to represent one character. nicode will ha#e more than5H,KKK different characters. This can co#er all the world0s languages.
LESSON /1
INTRODUCTION TO BINARY CODING
COMMUNICATION CODES
$moke signals, orse code and semaphore are some of the communicationcodes used by people in the early days. *n the information digital era, peoplesend information #ia electronic de#ices such as through the computers.
75
-
7/24/2019 ict t4
30/35
Computers use binary codes to communicate. ne of the widely used binary
codes is the A$"#ca& S(a&+a"+ C*+ !*" I&!*"$a(#*& I&("c?a&;=ASCII)4
HISTORY OF CHARACTER CODES
1efore people used binary codes such as &$C** to communicate #ia
computers, character codes were widely used as a medium ofcommunication. Bet0s look at some of the character codes used prior to the
use of &$C**.
76
-
7/24/2019 ict t4
31/35
77
-
7/24/2019 ict t4
32/35
WHAT IS ASCII
&$C** pronounced as Nask-keyN stands for the &merican $tandard Code for
*nformation *nterchange and was proposed by &$& A&merican $tandard&ssociation) in D54 and was finalised in 2D5.&$C** is a standard of ;-bitcode used to represent characters, which include letters, numbers andpunctuation marks.
; bits allow the computer to encode a total of 23 characters for the
numbers K-D, uppercase and lowercase letters &-O and a few punctuationsymbols. !owe#er this 23 bit code only suitable for english languagespeaking users.
*1 and &pple expanded the amount of space reser#ed for the character
codes to -bits, eui#alent to 2 byte.
FUNCTIONS OF ASCII
&$C** was established to achie#e compatibility
between #arious types of data processingeuipment making it possible for the
components to communicate with each othersuccessfully.
&$C** enables manufacturers to produce components that are assured to
operate correctly in a computer.
&$C** makes it possible for humans to interact with a computer. *t also
enables users to purchase components that are compatible with theircomputer configurations.
78
-
7/24/2019 ict t4
33/35
HOW ASCII WORKS IN A COMPUTER SYSTEM
When you press a key, for example the letter + on
your keyboard, the electronic signal is sent to the C"for the computer to process and store in memory.
%#ery character is con#erted to its correspondingbinary form. The computer the processes the letter asa byte., which actually a series of on and off of
electrical states. When the computer is finishedprocessing the byte, the software installed in the system con#ert the byteback which is then displayed in the screen. *n this example, the letter + iscon#erted to K2KKK2KK.
LESSON /.
DATA MEASUREMENT
Why is 2K3P bytes Q 2G16
KILOBYTE =KB) 3KQ 2*n mathematics, 2 G1 Q 2KKK bytes. 32Q 3
*n computer, 2 G1 Q 2K3P bytes or 33Q P
can be said as: 34Q
3PQ 25
1 KB @ .15b%(' 3HQ 43
35Q 5P
This is how we get the calculation for 2K3P
bytes.
MEGABYTE =MB)
2 1 Q 2 KP H;5 bytes or it can be said as:
1 MB @ ..5b%('
GIGABYTE =GB)
2 E1 Q 2 K;4 ;P2 3P bytes or it can be said as:
1 GB @ ./5b%('
TERABYTE =TB)
2 T1 Q 2 KDD H22 53; ;;5 bytes or it can be said as:
1 TB @ .05b%('
79
3;Q 23
3Q 3H5
3DQ H2332KQ 2K3P
-
7/24/2019 ict t4
34/35
LESSON //
CLOCK SPEED MEASUREMENT
EVOLUTION OF COMMUNICATION
When people talk about a computer0s RspeedS, theymean how fast it can process data. *n other words,this means the speed the computer can turn data intoinformation.
%#ery microprocessor contains a system clock. The system clock controls the
speed of all the operations within a computer. The speed of the clock ismeasured by how many cycles per second the clock makes.
HERT AND SECONDS
The clock speed unit is measured in hert8. & hert8 is one cycle per second.
MEGAHERT =MH)
ega is a prefix that stands for million. Thus, megahert8 A!8) euals to
one million cycles of the system clock. & computer that operates at D44 !8Amegahert8) has D44 million clock cycles in one second.
GIGAHERT =GH)
Eiga is a prefix that stands for billion.Eigahert8 AE!8) euals to one billion
cycles of the system clock.*n relation with megahert8,2.K E!8 is eui#alentto 2KKK !8.
/or example, a microprocessor that runs at 3KK E!8 executes 3KK billion
cycles per second. This is what they are talking about if they say a computeris a 3.P E!8 machine. *ts clock rate is 3.P billion cycles per second.
E!8 is most often used as a measurement of a "C processor chip and power,with bigger numbers meaning more speed and higher price.
80
-
7/24/2019 ict t4
35/35
PROCESSING SPEED
The system clock is one of the ma'or factors thatinfluence the computer speed. & C" with a higherclock speed can process more instructions per secondthan a C" with a lower clock speed. /or example, a2 E!8 C" is faster than a C" operating at KK !8.
The speed of the system clock affects only the C". *thas no effect on peripherals such as a printer or disk
dri#e.
MICROPROCESSOR SPEED
ne way of comparing the performance of personal computers is bycomparing their microprocessor speeds. icroprocessor speeds aredetermined by their clock speed and are usually expressed in gigahert8AE!8), billion of machine cycles per second.
/or example, a personal computer that is listed at 3.3 E!8 has a processor
capable of handling 3.3 billion machine cycles per second. & top speedpersonal computer can be much faster, with newer ones exceeding 4.K E!8.+irect comparison of clock is meaningful between identical microprocessor.
Thus, it is accurate to say that a "entium P running at 3.P E!8 is
approximately one-third faster than a "entium P running at 2. E!8.
SPEED AND PATH
The combination of speed and number of paths determines the totalprocessing speed or channel bandwidth. This is because different processorsoften use different architectures. /or this reason, a 2.P E!8 "entium Pperforms better than a 2.P E!8 "entium 4, but it is not as fast as a 2.P E!8"ower "C EP processor.