Pages

Sunday, 11 March 2018

Internet Service and type of web sites

INTERNET SERVICE

WORLD WIDE WEB (WWW)

Consists of world wide collection of electronic document.Each electronic document on the web is called web page.Web page usually have have built-in connections to other documents.Some web page are static(fixed);others are dynamic(changing).Web site is collection of related web pages and associated items.Web Server is computer that delivers requested web pages to your computer.


AdvantageDisadvantage
can search for informationoverloot of information
it can be acess from everywhereno guarantee to get what we looking for

E-MAIL

Email is electronic mail
.It is the transmission of messages and files via a computer network.Each e-mail must have an email address.Email address is a unique name that consists of a user name and domain name that identifies the user.

Basic form of an email address is:

username@hostname.subdomain.domain 

User name is a unique combination of characters,such as letters of the alphabet and/or numbers,that identifies a specific user.Each user name must be different from other user names in the same domain

AdvantageDisadvantage
it is free toolnot real time communication
have business email communicationvirus are easily been spread

Instant messaging (IM)

Is real-time Internet communications service that notifies you when one or more people are online and allows you to exchange messages or files or join a private chat room with them.Real time means that you and the people with whom you are conversing are online at the same time. For IM to work, both parties must be online at the same time.

Voice over internet protocol (voip)

VoIP is an acronym for Voice Over Internet Protocol, or in more common terms phone service over the Internet.It also called Internet Telephony.VoIP services are also available on some mobile services that have wireless Internet service.

Message board

Is type of discussion group.Many web sites use message boards because they are easier to use.
It also known as discussion group, discussion forum and online forum.A popular Web-based type of discussion group that does not require a newsreader.

File transfer protocol

Is an Internet standard that permits file uploading and downloading with other computers on the Internet.
Uploading is the process of transferring documents, graphics and other objects from your computer to a server on the internet.FTP is one method, users have to transfer webpages files from their local machine to the server.Some examples of FTP programs are Smarter FTP, WS_FTP and Internet Explorer












                   

Saturday, 10 March 2018

Security Measures

Security Measures

The precautionary measures taken toward possible danger or damage.

Type of security measures:
  1. Data backup
  2. Cryptography
  3. Anti-virus
  4. Anti-spyware
  5. Firewall
  6. Physical access control
  7. Human aspects: awareness
  • Ethics - Be a good cyber citizen.Example: Do not engage in inappropriate conduct,do not use someone else's password or other identifying information. 
  • Phishing Emails.Example: Never respond to requests for personal information via email. Businesses will never ask for personal information in an email,do not enter personal information in a pop-up screen.
  • Dispose of Information Properly.Example: destroy/shred hard copy confidential documents that contain personal information,ensure you are using the right tools when destroying and disposing of personal information or media storage 
  • Protect data on mobile devices.Example: choose a strong password,store your portable devices securely
  • Expose employees or staff to computer security.
  • Make a routine check to update from new virus, worm or other malicious threat.

Computer Security Risk

Computer Security Risks

Any event or action that could cause a loss of or damage to computer hardware, software, data, information or processing capability.

Perpetrators of cybercrime and other intrusions fall into seven basic categories:

  1. Hacker
  2. Cracker
  3. Script kiddie
  4. Corporate spies(espionage)
  5. Unethical employees
  6. Cyber extortionist
  7. Cyberterrorist

Malicious code

code causing damage to a computer or system. It is code not easily or solely controlled through the use of anti-virus tools.

computer virus
A computer virus is a potentially damaging computer program that affects or infects, a computer negatively by altering the way the computer works without the user’s knowledge or permission.
Image result for virus gif

worm 
A program that copies itself repeatedly.For example in memory or on a network, using up resources and possibly shutting down the computer or network.
1

Trojan horse
A program that hides within or looks like a legitimate program. It does not replicate itself to other computers.Examples is Netbus, Back Orifice, Subseven, Beast.
Image result for virus gif

Unauthorized access & use

Unauthorized access 
-The use of a computer or network without permission.

Unauthorized use 
-The use of a computer or its data for unapproved or possibly illegal activities.

Hardware theft
Act of stealing computer equipment.Hardware vandalism is the act of defacing or destroying computer equipment.

Safeguards against Hardware Theft and Vandalism
  • Physical access controls, such as locked doors and windows
  • Install alarm systems in their buildings
  • Physical security devices such as cables that lock the equipment to a desk.
Software theft
Illegally copies a program occurs when software is stolen from software manufacturers. This type of theft, called piracy, is by far the most common form of software theft.

information theft
Someone steals personal or confidential information.

Safeguards against Information Theft
  • Protecting information on computers located on an organization’s premises.
  • To protect information on the internet and networks, organizations and individuals use a variety of encryption techniques.
  • Encryption is a process of converting readable data into unreadable characters to prevent unauthorized access.
System failure
Prolonged malfunction of a computer.It can cause loss of hardware, software, data, or information.

Safeguards against System failure
  • To protect against electrical power variations, use a surge protector. 
  • A surge protector, also called a surge suppressor, uses special electrical components to smooth out minor noise, provide a stable current flow, and keep an overvoltage from reaching the computer and other electronic equipment.
  • For additional electrical protection, some users connect an uninterruptible power supply to the computer. 


















Tuesday, 6 March 2018

Rules of Netiquette Areas of Computer ethics

NETIQUETTE

Code f acceptable behaviour uses should follow while on the internet or online or cyberspace.This rules apply when chatting online,using email,blogging,internet messaging,FTP(File Transfer Protocol).




Rules of Netiquette

  1. Remember the human
  2. Adhere to the same standards of behavior online that you follow in the real life
  3. Know when you are in cyberspace
  4. Respect other people's time and bandwidth
  5. Make yourself look good in online
  6. Share expert knowledge
  7. Help keep flame wars under control
  8. Respect other people's privacy
  9. Don't abuse your power
  10. Be forgiving of other's people's mistakes

Areas of computer ethics

Moral guidelines that govern the use of computers, mobile devices and information systems.

Type of Areas of computer ethics

Information accuracy
Do not assume all the information on the Web is correct.Users should evaluate the value of a Web page before relying on its content.


Green computing 
Environmentally responsible and eco-friendly use of computers and their resources. In broader terms, it is also defined as the study of designing, manufacturing/engineering, using and disposing of computing devices in a way that reduces their environmental impact.It involves reducing the electricity and environmental waste while using a computer.


Codes of conduct
Written guideline that helps determine whether a specific action is ethical/unethical or allowed/not allowed.The privacy of personal information and usually relates to personal data stored on computer systems.


Intellectual property
Unique and original works such as ideas, inventions, literary and artistic works, processes, names and logos Or refers to creations of the mind: inventions, literary and artistic works, and symbols, names, images, and designs used in commerce.


Information privacy
A patent is a set of exclusive rights granted by a government to an inventor or applicant for a limited amount of time (normally 20 years from the filing date). It is a legal document defining ownership of a particular area of new technology. 










Tuesday, 23 January 2018

Web browser, web address, web page navigation, web searching

WORLD WIDE WEB

A service of internet that was developed in the late 1960s.It emerged in the early 1990s.

Type of World Wide Web

Web browser
Application software that allows users to access and view Web pages.

Example of web browser


                                  
      GOOGLE CHROME                           INTERNET EXPLORER                          MOZILLA FIREFOX                                      SAFARI


WEB ADDRESS
Has a unique address called a URL (Uniform Resource Locator) or Web address.Retrieves a Web page using its web address. 

Example of web address

 http://www.kmph.matrik.edu.my/fizik/index.html

It must consist 
  • Protocol- http://
  • Domain name-www.kmph.matrik.edu.my/
  • Path-fizik/
  • Web page name-index.html

Transfer Protocol

http://
-Hypertext Transfer Protocol
A set of rules that defines how pages transfer on the Internet

https://
-Hypertext Transfer Protocol Secure
-A protocol to provide an encrypted communication and secure identification of a network web server
-Often used for payment transactions on www.

ftp://
-File Transfer Protocol
-The File Transfer Protocol (FTP) is a standard network protocol used to transfer computer files from one host to another host over a TCP-based network, such as the Internet. 

WEB PAGE NAVIGATION

Navigating Web Pages:
  • Hypertext-links in text based documents
  • Hypermedia-combines text-based graphic,audio and video links

Tab browsing
Most current web browsers support tabbed browsing.Tabbed browsing allows you to open and view multiple Web pages in a single Web browser windows

WEB SEARCHING
A primary reason that people use the Web is to search for specific information, including text, pictures, music and video.The first step in successful searching is to identify the main idea or concept in the topic about which you are seeking information.

Search tools:














Different types of Internet connection


 THE INTERNET CONNECTION


Types of internet connection

1)Dial-up connection
2) Broadband Internet










Sunday, 14 January 2018

Overview of the Internet

Internet
-Is a worldwide collection of network

Evolution of the internet

ARPANET

  • ARPA-Advance Research Project Agency created by US Department of Defense 
  • The network is call ARPANET
  • The network became functional in September 1969


Who control the internet?
-No one-it is a public,cooperative and independent network
-Several organisation set standard

  • Example of organisation:
World Wide Web Consortium that involved with issues such as:
  1. Establishing the protocols
  2. Making recommendations for changes 
  3. Coordinating communication among the network 
Advantage and Disadvantage of internet



AdvantagesDisadvantages
Easy to download software freelyVirus threat
Can make online transaction such as online banking,ticket booking and fliht ticket reservation Sosial disconnect
People can send messages via emailDangers to the children when using internet such as vulnerable pornographic sites
Can find information by using internet search engine Information can be accesed by irresponsible person


Advantage and Disadvantage of intranet


ADVANTAGEDISADVANTAGE
Commersial and confidential data is kept secure within the organizationHigh financial cost incurred by the company when initially implementing the intrane
Email remail private and may also may be encryptedConnections between intranet potentially compromises security,by allowing virus infections or system hacking
High bandwith.No connection limits unlike the internet Staff needs training to ensure workers know how to use the system effectively
Reliable.The company will have dedicated IT personnel to keep things running smoothlyInformation overload because it reduces productivity


Advantage and Disadvantage of Extranet


ADVANTAGEDISADVANTAGE
Enchanged large volumes of fata using electronic data interchange(EDI)Extranet can be expesive to implement and maintain within an organization
Share products catalogs exclusively with trade partners Security of extranet can be a concern when hosting valuable or propritary information

Internet Service and type of web sites

INTERNET SERVICE WORLD WIDE WEB (WWW) Consists of  world wide collection of electronic document .Each electronic document on the web is...