Modul Bahasa Inggris
Modul Bahasa Inggris
Modul Bahasa Inggris
TEKNIK KOMPUTER
BAHASA INGGRIS II (ENGLISH FOR COMPUTER) Meeting 1 What is a computer? Computer is a machine that can accept data and process it according to a stored program of instructions and then give the result via output devices. An electronic symbol-manipulating system thats designed and organized to automatically accept and store input data, process them, and produce output results under the direction of detailed step-by-step stored program of instructions. How a computer works can be explained with this simple block diagram:
For example you input any data using input devices, 5 + 4. Then this data will be processed in a computer. This process will be held by a device called processor. After the process is completed, the result will be held by an output device. Sometimes, the computer needs to save the process for a particular need. For example for further use in the future. In this case the computer will save the process to a device called storage. Thats the way computer works. Task 1 Find the synonym from the passage (Slide 2 - 4) which mean the same as: 1. Keep/save : _________________ 2. Through : _________________ 3. Commands : _________________ 4. Made : _________________ 5. Arranged : _________________ 6. Instruments : _________________ 7. Very definite : _________________ 8. As stated by : _________________ 9. Finished : _________________ 10. Necessity : _________________ Now have a look at all devices in that process. First one is input device. There are many kinds of input devices. The most commonly used is keyboard. Others are mouse, light pen, microphone, track ball, camera (for example webcam), etc. We can say that input device is any kinds of devices that can be used to input any data to a computer. The second device is the processor. This is the brain of the computer which holds all data processing in a computer. The processor is created based on semiconductor material like Germanium (Ge) and Silicon (Si). The form of processor was not like the form we see the processor nowadays. There are evolution in creating a processor until we get the form of processor today.
Vacuum tube Is an electronic device that uses glass tube to house electronic circuits. The working of which are dependent on the vacuum within the tube. Later, this device was replaced by transistor.
Integrated Circuit This is the further development of transistor. Consisting hundreds of transistor in each which makes computation faster.
Transistor Is a semiconductor device used to amplify a signal or open VLSI and close a circuit. In digital computers, it functions as an electronic bridges the gap between two wires and allows current fo flow. This device was invented by William Schockley, Walten Brattain, and John Barden. This device has three feet namely the basis, the emittor, and the collector.
(Very Large Scale Integration) Is the packing of hundreds of thousands of electronic components on a single semiconductor chip.
b. Processor Processor is a hardware (sometimes software) system to handle operations upon data. For the first time, processor is only a vacuum tube. Then it undergoes an evolution becomes transistor, until
Answer the following questions from Slide 2 - 6. 1. How many names are there for motherboard? Mention! jawabannya: main board, baseboard, system board, or planar board. 2. What is the measurement for computer speed?jawabanya: 3. Explain the evolution of processor.?jawabannya: For the first time, processor is only a vacuum tube. Then it undergoes an evolution becomes transistor, until it reaches the form of processor as we can see recently 4. What is the characteristic of Ram? Explain.jawabannya: The characteristics of RAM is volatile, meaning that the data that is stored in memory only available while the computer is turn on 5. ROM is non-volatile. What does it mean?.. jawabannya:meaning that the data is still in ROM even there is no electricity. d. Sound card Sound card is also known as audio card. It converts audio signals from a microphone, audio tape, or some other sources to digital signals, which can be stored as a computer audio file. Sound cards also convert computer audio files to electrical signals, which you can play through a speaker or a headphone. The microphone and the speakers or the headphones connect to the sound card. sound card with the ports.
e. VGA card
f. Internal Modem Modem stands for modulator and demodulator. The function is to connect a computer to the Internet. Modem will transfer a digital signal from a computer into analog signal. This process is called modulation. There is reverse process in the opposite computer, the receiver. In this computer, the receiver, the analog signal is received and then converted into digital signal. This process is known as demodulation. Thats why a modem does two processes. Modem is classified into two kinds. Internal modem which is placed inside the CPU, called internal modem. Function of modem is: - Demulation: - Modulate:
internal modem
Above is a picture of 56kbps Conexant Internal modem. This modem is identified by the chip where the company creates. Conexant means the chip is produced by Conexant The data transfer from a modem into the internet or from the Internet into a modem is called the speed of a modem. And it is measured by kbps, means kilo bit per second. The other kind of modem is external modem which is placed outside the CPU. Look at the picture on the right.
g. Network Interface Card Network Interface Card or NIC for shorts. Also known as LAN(local Area Network) card. It allows the computer to be connected to other computers so that information can be exchanged between them.
NIC can be identified easily. It has a special port called RJ-45. RJ means Registered Jack. And also a led to indicate a data is being transferred.
Above NIC is connected to other computer using a cable (wire). Fortunately, the world is changing. Due to inefficiency of using cables, people try not to use cable. This method is called wireless, means without cable/wire. The pictures below are LAN Cards without the need to connect using cable. It is known as WLAN, Wave LAN, since it uses wave as a media to transfer data.
What do these abbreviations stand for? 1. PCB() 2. PCI() 3. WLAN() 4. LAN(local area network) 5. Kbps(kilo bit per second) Complete the following sentence. 6. A sound card can and . 7. A modem is used to . 8. A LAN Card is for . http://resources.kaboose.com/brain/comples2.. html http://computer.howstuffworks.com/pc.htm http://www.kids-online.net/learn/c_n_l.html http://en.wikipedia.org http://www.ied.edu.hk/has/comp/compnent/index .htm http://www.microcenter.com/multimedia/Comput er_Components_Low/intro_lowband.htm Send answer via sms to 8181 Choose a, b, c, or d for the correct answer. 1. CPU stands for . a. Central Processed Unit b. Central Processing Unit c. Center Processing Unit d. Central Processor Unit
Meeting 3 Software and Operating System What is Software? Software is a term to describe a set of computer programs that perform a collection of tasks. Software is also a series of instructions for the computer that performs a particular task. According to Wikipedia, the term software was first used by John W. Tukey in 1958. Software is divided into some categories. Two major of them are application software and system software. Application software is a generic name for any software or computer program. Most of the computer software excludes system software is application software. Application software allows enduser to accomplish one or more specific (non-related) computer tasks. Some examples for application software is word processor such as Microsoft Word 2007, Open Office Writer, etc. System software is any computer software which manages and controls computer hardware so that application software can perform a task. System software will handle and control all operation process in computer. For example when someone boots the computer up, the system software will perform all operations until the computer is ready for user. The most important system software is operating system. What is Operating System? An 'operating system' (commonly abbreviated OS and O/S) is the software component of a computer system that is responsible for the management and coordination of activities and the sharing of the resources of the computer. The operating system acts as a host for applications that are run on the machine. As a host, one of the purposes of an operating system is to handle the details of the operation of the hardware. This relieves application programs from having to manage these details and makes it easier to write applications. Almost all computers, including handheld computers, desktop computers, supercomputers, and even video game consoles, use an operating system of some type. Some of the oldest models may
Other operating system is Mac OS. Mac OS is the trademarked name for a series of graphical user interface-based operating systems developed by Apple Inc. (formerly Apple Computer, Inc.) for their Macintosh line of computer systems. The Macintosh user experience is credited with popularizing the graphical user interface. The original form of what Apple would later name the "Mac OS" was the integral and unnamed system software first introduced in 1984 with the original Macintosh, usually referred to simply as the System software. Recently, there is also an operating system which has open source license. The most popular one is Linux. Linux is a Unix-like computer operating system family which uses the Linux kernel. Linux is one of the most prominent examples of free software and open source development; typically all the underlying source code can be freely modified, used, and redistributed by anyone. For the first time Linux kernel is created by Linus Torvalds.
Nowadays, Linux has abundant variant called distributions. Below are some of Linux distributions in ranking per October 2008 (you may refer to http://www.distrowatch.com) :Ubuntu, openSUSE, Mint, Fedora, PCLinuxOS, Debian, Mandriva, and more. Ubuntu has been the most popular Linux distributions for the last few years, since it has unique feature that most people need. The feature is live CD which is enable someone to try Ubuntu from
4. These are types of operating system available to users, except . a. Windows c. Mac OS b. GUIs d. Linux 5. Word processor such as Microsoft Word 2007 and Open Office Writer are examples of . a. system software b. application software c. office application d. OS Meeting 4 Software and Programming Language A Software is Created by Programming A set of computer consists of metal, plastic, and other physical devices which is called hardware. This hardware is no use without software. Software is a term to describe a set of computer programs that perform a collection of tasks. Software is also a series of instructions for the computer that performs a particular task. Software is created by a process called programming or computer programming. This process can also be called by coding which is a process of writing, testing, debugging, and maintain a source code of computer programs. In programming process, a programmer (a person who writes computer program) must write all code in a text editor with no error at all. He has to write from first line until last line of code. All of the code from first line until last line is called source code. This is the actual form of computer instructions which give a computer an instruction of what to do. After that, a programmer must compile the source code. A tool to compile is a compiler. This process is called compilation, that is transforming a source code into binary file like executable file. Mostly, a programmer will face error during compilation and the source code cannot be transformed into binary file. So a programmer will look for the error and fix it. This action is called debugging, that is finding and fixing error code in all of the source code. A tool for debugging is called debugger. The action of compilation and debugging will repeat and repeat, again and again until there is no error at all in the source code. If we resume the above process would be like this: a. Step one: Writing a code b. Step two: Compilation c. Step three: Debugging d. Step four: The result is binary file For the first time in computer programming, text editor, compiler, and debugger, are separated one another. But in advanced era of computer programming, those tools are integrated. So a programmer will be more comfortable and easier in creating a program. Below are a picture of Borland Delphi 7, an integrated tool for programming.
A picture about an integrated tool for programming Kinds of Programming Language 1. Pascal from Borland 2. Borland Delphi from Borland 3. BASIC from Microsoft 4. Microsoft Visual Basic from Microsoft 5. FoxPro 6. Java from Sun Microsystem 7. Phyton
Task 2 Match the terms with the definition. 1. Programmer = 2. Debugger = 3. Coding = 4. Compiler = The definitions a. a tool to compile a source code into binary file b. a person who creates and writes a program. c. a tool to find and fix an error code in a source code d. programming = computer programming FURTHER READINGS http://en.wikipedia.org/wiki/Programming http://en.wikipedia.org/wiki/Software http://programming.wikia.com/wiki/Main_P age http://en.wikipedia.org/wiki/List_of_basic_c omputer_programming_topics http://en.wikipedia.org/wiki/Software_engin eering Send answer via sms to 8181 Choose a, b, c, or d for the correct answer. 1. In programming process, the first step is . a. compilation c. writing a code b. debugging d. binary file 2. The physical devices in a computer are . a. tools c. software b. hardware d. none of the above 3. A programmer must compile the source code by using . a. compiler c. collector b. transformer d. bugger 4. Acts of finding and fixing error code in all of the source code is called . a. debugging c. bugging b. compiler d. decoding 5. The following is a programming language from Sun Microsystems.
Malicious Software In computer world, there is also a software which is created to do something bad and to perform criminal intension. This kind of software is called malicious software or malware. Malicious software can be divided into some categories: a. Virus b. Worm c. Trojan Horse d. Logic bomb e. Time bomb f. Malicious code, etc But the most important categories are virus, worm, and Trojan horse. All of them can be identified by their replication. VIRUS
Virus is a software that can replicate by injecting or infecting its own code into other file. By its way to infect other file, virus can be divided into three categories: a. Overwriting
b. Appending
c. Prepending
Virus can be created using programming language since virus is actually a program. Anybody can write a program and run it. But the important point in programming a virus is a code for replicating a virus. Other way in creating a virus is using a tool. This is the simplest and easiest way in creating a virus. This kind of tool is called virus generator or virus creator, or virus kit, or virus constructor, etc. You can search this tool using Google with those keywords. Using virus generator, anybody without any programming skill can create a virus, even if he is a new comer in computer world!
On the left is a picture about virus generator called Microsoft Macro Virus Generator.
Below is a virus generator called Walrus Macro Virus Generator. As you can see in the picture, the way to create a virus using virus generator is just selecting some options and then hit the button Generate. A new virus is ready for you, just as instant as creating instant noodles. b. WORM Worm is also a kind of malicious software. It is different from virus which is worm can not inject of infect other files. A worm is a software which replicates by creating its own copy. And without infecting other file. Worm actually spreads through a network or the Internet using email. Below is a sample of worm called I Love You. Worm I Love You spreads through the Internet as an email attachment. Pay attention at the attachment LOVELETTER- FOR-YOU.TXT.Vbs.
Usually worm will do something tricky to cheat email receiver. The first is using double file extension. At the left sample, worm I Love You uses two extension, those are TXT.VBS. The second trick is using social engineering. At the above sample, the worm uses a name I LOVE YOU which might interested to every email receiver. Who doesnt need love? So, the effect of these tricks are any body the email receiver- will click that attachment which is actually a worm code. Task 1 (From Slide 2 9) What do the followings refer to (replace)? 1. Slide 2, line 13: Them _____
There are many kind of trojan horse. Below are some of them: a. Password stealer b. Keylogger c. Fake Program d. Anonymous emailer e. Remote monitoring f. Remote administrator, etc Below are some examples of Trojan horse 1. Back Orifice created by a group called CDC 2. Mata-Mata created by krabiRw 3. SubSeven created by Mobman 4. NetBus created by Carl Fredrik Neikter 5. Deep Throat created by DarkLIGHT 6. Barok created by Onel de Guzman
Left is a picture of trojan hose Back Orifice. Below is a picture of Mata-Mata trojan hose. This is a sample trojan of keylogging tool.
Task 2 Match each definition with the correct term! 1. ___ is a tool for creating a virus instantly. 2. ___ is a program designed for stealing password. 3. ___ is a program designed to record all keyboard keystroke into a log file. 4. ___ is a program imitating a real program but it has destructive features that makes fun for the creator. 5. ___ is a program for sending email without known its sender (anonymous). 6. ___ is a program that can control other computer remotely. 7. ___ is a program that can monitor other computer remotely. Here are the terms. a. Fake program b. Virus generator c. Remote administrator d. Password stealer e. Remote monitoring f. Keylogger g. Anonymous emailer FURTHER READINGS http://id.wikipedia.org/wiki/Virus_komputer http://en.wikipedia.org/wiki/Computer_virus http://www.microsoft.com/protect/computer/basics/virus.mspx http://compnetworking.about.com/cs/worldwideweb/g/bldef_w orm.htm http://www.tech-faq.com/computer-worm-virus.shtml http://en.wikipedia.org/wiki/Computer_worm http://www.icir.org/vern/papers/taxonomy.pdf http://www.howstuffworks.com/virus.htm http://en.wikipedia.org/wiki/Trojan_horse_(computing) http://www.webopedia.com/DidYouKnow/Internet/2004/virus.a sp http://y2u.co.uk/Knowledge_Information/Technology/RN_Com puter_Trojan_Horses_A1.htm http://id.wikipedia.org/wiki/Trojan_horse Send answer via sms Choose a, b, c, or d for the correct answer. 1. One of these is not a malware. a. worm c. Trojan Horse b. Logic bomb d. Win Vista 2. All of them can be identified by their . a. replication c. multiplication b. identification d. none of the above 3. By its way to infect other file, virus can be divided into categories.
4. The simplest and easiest way in creating virus is by using a tool called . a. virus generator c. virus copier b. virus instructor d. virus emulator 5. actually spreads through a network or the Internet using email. a. worm c. Trojan Horse b. Time Bomb d. Virus
Meeting 6 Hardware Hardware is physical equipment of computer system. Hardware can be divided into two categories: Input Device and Output Device INPUT DEVICE Input device is computer device that is used to input data into computer system. Input device can be divided into some categories: 1. Text input devices Such as keyboard, a device to input text and characters by depressing buttons (referred to as keys), similar to a typewriter. The most common English-language key layout is the QWERTY layout. Below is a picture of a keyboard using QWERTY layout.
Other alternatives keyboard layout is QWERTZ layout which is used in Germany and much of Central Europe, and AZERTY layout which is used France, Belgium, and some neighbouring countries. 2. Pointing devices The most common pointing device is mouse. In computing, a mouse (plural mice or mouse devices) is a pointing device that functions by detecting two-dimensional motion relative to its supporting surface. Physically, a mouse consists of an object held under one of the user's hands, with one or more buttons, other elements, such as "wheels", or extra buttons. The mouse's motion is typically translated into the motion of a pointer on a display, which allows for fine control of a Graphical User Interface. Here is a picture of a modern mouse.
Other alternative of pointing device is trackball, a pointing device consisting of an exposed protruding ball housed in a socket that detects rotation about two axes. The trackball was invented by Tom Cranston and Fred Longstaff as part of the Royal Canadian Navy's DATAR system in 1952[1], eleven years before the mouse was invented. Below is a picture of a trackball.
3. Gaming devices One example of gaming device is a joystick. A joystick is a general control device that consists of a handheld stick that pivots around one end l,to detect angles in two or three dimensions.
4. Image, Video input devices There are two common input devices in this type. First is Image scanner, a device that provides input by analyzing images, printed text, handwriting, or an object. Below is a picture of image scanner.
Second type is a webcam. Webcams are video capturing devices connected to computers or computer networks, often using USB or, if they connect to networks, ethernet or Wi-Fi. They are well-known for their low manufacturing costs and flexible applications. Below is a picture of a webcam.
5. Audio input devices One example of audio input device is a microphone. Microphone sometimes referred to as a mic or mike, is an acoustic-to-electric transducer or sensor that converts sound into an electrical signal. Microphones are used in many applications such as telephones, tape recorders, hearing aids, motion picture production, live and recorded audio engineering, in radio and television broadcasting and in computers for recording voice, VoIP, and for non-acoustic purposes such as ultrasonic checking. Task 1 Answer the following questions based on slide 2 10. 1. What are the categories of hardware? 2. How many types of input device are there? Mention. 3. What is the function of a scanner? 4. Where is QWERTZ keyboard layout used? 5. How does a microphone work? 6. Why is webcam well-known? OUTPUT DEVICE 1. Image, Video Output Devices First example is a printer. In computing, a printer is a peripheral which produces a hard copy (permanent human-readable text and/or graphics) of documents stored in electronic form, usually on physical print media such as paper or transparencies. Many printers are primarily used as local peripherals, and are attached by a printer cable or, in most newer printers, a USB cable to a computer which serves as a document source. Some printers, commonly known as network printers, have built-in network interfaces (typically wireless or Ethernet), and can serve as a hardcopy device for any user on the network. Individual printers are often designed to support both local and network connected users at the same time. Second Example is a monitor. A visual display unit, often called simply a monitor or display, is a piece of electrical equipment which displays images generated from the video output of devices such as computers, without producing a permanent record. 2. Audio Output Devices Speakers. Computer speakers, or multimedia speakers, are external speakers, commonly equipped with a low-power internal amplifier. Headsets. Headphones are a pair of small loudspeakers, or less commonly a single speaker, with a way of holding them close to a user's ears and a means of connecting them to a signal source such as an audio amplifier, radio or CD player. They are also known as earphones, ear buds, stereo phones,headsets or, informally cans. In the context of telecommunication, the term headset is used to describe a combination of headphone and microphone used for two-way communication, for example with a telephone. Task 2 Find the synonym of these words or phrases in the text of slide 12-14. 1. Lasting __________
4. The trackball was invented by . a. Tom Cruise c. Tom Cranston b. Tom Dooley d. Tom Longstaff 5. Visual Display Unit is another term for . a. printer c. scanner b. monitor d. television Meeting 9 Computer Network Definition of computer networks A computer network is a group of interconnected computers. Networks may beclassified according to a wide variety of characteristics. The benefit of a computer network are: Sharing hardware resources easily and Sharing information easily.
There are many kinds of devices to create a computer network. For a basic computer network we would need:
NIC can be identified easily. It has a special port called RJ-45. RJ means Registered Jack. And also a led to indicate a data is being transferred. 2. Repeaters A repeater is an electronic device that receives a signal and retransmits it at a higher power level, or to the other side of an obstruction, so that the signal can cover longer distances without degradation. 3. Hub A hub contains multiple ports. When a packet arrives at one port, it is copied to all the ports of the hub for transmission. When the packets are copied, the destination address in the frame does not change to a broadcast address. Below is a picture of 4-port Ethernet hub.
Above is a network switch Task 1 Which words in the slides have the opposite meaning to the following? 1. Narrow 2. Disadvantage 3. Hard/difficult 4. The last 5. Few 6. Sends 7. Single port 8. Above 9. Disconnected 10. Shorter
Task 2 Answer these questions based on slide 2-5. 1. What is meant by a network? 2. What are the advantages of a network? 3. How do we create a basic network? 4. Who create the first network? 5. How to categorize different types of networks?
Meeting 10 Steganography What is steganography Steganography is the art and science of writing hidden messages in such a way that no-one apart from the sender and intended recipient even realizes there is a hidden message, a form of security through obscurity. By contrast, cryptography obscures the meaning of a message, but it does not conceal the fact that there is a message. Generally, a steganographic message will appear to be something else: a picture, an article, a shopping list, or some other message. This apparent message is the covertext. For instance, a message may be hidden by using invisible ink between the visible lines of innocuous documents. The advantage of steganography over cryptography alone is that messages do not attract attention to themselves, to messengers, or to recipients. An unhidden coded message, no matter how
For example someone has a secret document to secure. Any document can be secured using cryptography. For example we have to secure the word Read using cryptography. The word Read in cryptography is called Plain text. Using a set of rule called algorithm, the plain text is changed into cipher text. This process is called encryption. The result of this encryption process is the word Uhdg. This is the cipher text.
A set of rule (algorithm) that is used in encryption can be different. There are many algorithm used in encryption. At the above example we use Caesar Cipher algorithm that is used by Julius Caesar to secure his document. The reverse process of encryption is called decryption. The input is a cipher text. And the result of decryption process is plain text.
Task 2 Show whether the followings statements are true or false (T/F) from Slide 2 - 5. 1. Cryptography is the practice and study of creating a secret information. 2. Not all document can be secured using cryptography. 3. Using a set of rule called algebra, the plain text is changed into cipher text. 4. The word kryptos is a Latin origin. 5. The reverse process of encryption is called decryption. History of cryptography Cryptography is already used since ancient era. Julius Caesar used cryptography to secure his message from his enemy. He replaced a character with its next three character. For example a character A in alphabet will be replaced by character D. And so on. See the list below of Julius Caesar algorithm. Plain text : a b c d e f g h I j k l m n o p q r stuvwxyz
Unfortunately the algorithm of Enigma can be broken by US army. In computer technology, cryptography is still used to secure a computer data or document. For example in ATM machine, computer passwords, and also in electronic commerce. Using computer technology someone can use many sophisticated algorithm for example RSA, DES, and PGP. COMPUTER TERMS Plain text = a text that can be read by anybody. This text is not secured yet. Cipher text = a secret text resulting from encryption process. Algorithm = a set of rule to encrypt a document. Enigma = a machine like typewriter that is used by Nazi during World War II to secure a document before transmitted. Cryptographer = a person who is master in cryptography. Task 2 Figure out this message. BRX KDYH MXVW GLVFRYHUHD WKH DQFLHQW VHFUHW FRGLQJ FDOOHG MXOLXV FDHVDU DOJRULWKP What does it say? ___________________________________ ___________________________________ mhtirogla raseaC suiluJ esU FURTHER READINGS http://en.wikipedia.org/wiki/Cryptography http://en.wikipedia.org/wiki/Cryptography_Classification http://en.wikipedia.org/wiki/Encyclopedia_of_Cryptography_and_Security http://en.wikipedia.org/wiki/Japanese_cryptology_from_the_1500s_to_Meiji http://en.wikipedia.org/wiki/List_of_important_publications_in_computer_science#Cry ptography http://www.merriam-webster.com/dictionary/cryptology/ http://www.csrc.nist.gov/publications/fips/fips197/fips-197.pdf http://www.cesg.gov.uk/site/publications/media/notense.pdf http://citeseer.ist.psu.edu/cache/papers/cs/22094/http:zSzzSzeprint.iacr.orgzSz2001z Sz056.pdf/junod01complexity.pdf http://www.rsasecurity.com/rsalabs/node.asp?id=2152 http://www.ieee-security.org/Cipher/Newsbriefs/1996/960214.zimmerman.html http://www.schneier.com/crypto-gram-0006.html#DES
Meeting 12 The Internet Internet stands for: Internetworked Networks The Internet is a worldwide connection of millions of computers connected to thousands of different networks. These computers "communicate" that is, share, exchange, and transmit data to another computer on the same or another network. Nobody owns or controls the Internet. It is a global information system similar in some respects to telephone networks that allow anybody to call any other number anytime, anywhere. a. Internet Services The Internet has several component applications. These include: 1. Telnet - terminal emulation - Allows a user on one computer to log onto a remote computer and run software on that remote computer as if it were on the user's local computer 2. FTP File Transfer Protocol - Allows users to upload and download files from other computers 3. EDI Electronic Data Interchange - Allows for electronic transfer of data between companies over the Internet 4. IRC Internet Relay Chat - Allows people connected over the Internet to participate in discussions. It allows people to converse in "real time," people may actually see you type your questions and responses.
205.213.164.10 Since numbers are easy for a computer to work with but difficult for humans, most host machines have a Domain Name Service (DNS) address. For instance, the domain name service address of the IP address listed above is: depts.alverno.edu The most common Top Level Domains (TLD) are
Top-Level Domain Names help the user to identify what type of site they are visiting. c. Netiquette There are guidelines on how one must behave in cyberspace. In the Internet these responsibilities are defined by what is called Netiquette. There are different versions of Netiquette on the Web, the following is an example of netiquette. 10 Commandments of Computer Use by Computer Ethics Institute in Washington D.C. 1. Thou shalt not use a computer to harm other people 2. Thou shalt not interfere with other people's computer work 3. Thou shalt not snoop around in other people's computer files 4. Thou shalt not use a computer to steal 5. Thou shalt not use a computer to bear false witness 6. Thou shalt not copy or use proprietary software for which you have not paid 7. Thou shalt not use other people's computer resources without authorization or proper compensation 8. Thou shalt not appropriate other people's intellectual output 9. Thou shalt think about consequences of the program you are writing or the system you are designing 10. Thou shalt always use a computer in ways that ensure consideration and respect for your fellow humans. Task 1 Answer these questions. 1. In a network, computers communicate with each other. What does it mean? 2. If you want to upload and download files from other computers, what component application do you need? 3. What is the guidelines on how someone must behave in cyberspace called? 4. Can we copy paste other peoples intellectual output and claim it as our idea? 5. www.spiegel.de/international/business www.kompass.ie In what country is the location of the website? Challenge! Match the top level domain with the correct description in 10 seconds! ____1) .com A. US Educational institution ____2) .gov B. A non-profit or not-for-profit institution ____3) .org C. US Governmental agency ____4) .mil D. A company or business ____5) .edu E. US Military Task 2 Take home assignment In a group, translate the 10 Commandments of Computer Use by Computer Ethics Institute in Washington D.C.
An email message is made up of several parts. They include: - header - It contains information about the sender, the routing and the time of the message. The header always contains a subject line. This is a very important part of the message and you should always include a subject line. Some folks sort their messages by subject, so it is rude to not include a subject! The subject line indicates the purpose or content of the message - message body, where you write your message - signature, which identifies the sender. This part is optional and must be set up inside of your email software Header fields The message header usually includes at least the following fields: From: The e-mail address of the sender To: The e-mail address of recipient Subject: Topic of message Date: The local time and date when the message was written Cc: carbon copy, adopted from business communication protocol when typewriters ruled the day Bcc: Blind Carbon Copy, when recipient does not need to know who else got a copy of the message. May or may not appear in sender's file copy depending on e-mail software used
The usefulness of e-mail is being threatened by four phenomena: a. E-mail bombardment, an e-mail bomb is a form of net abuse consisting of sending huge volumes of e-mail to an address in an attempt to overflow the mailbox or overwhelm the server. b. spamming, unsolicited commercial (or bulk) email results in information overload for many computer users who receive such email each day
Meeting 14
a. Website A website is a site (location) contains a collection of pages on the World Wide Web. Each Web site contains a home page, which is the first document users see when they enter the site. Home page, as the name suggests, is the main or opening page of a website. You will notice that several websites use the word "Home" or an image of a house to guide surfers back to the main page. The URL or Uniform Resource Locator is the specific address of a webpage, like http://geocities.com/toe6000/www1.html The site might also contain additional documents and files. Each site is owned and managed by an individual, company or organization. Web page is a document written in Hypertext Mark-up Language (HTML) code that contains text and links to other pages, files, or parts of the document. The earliest Web pages were all-text documents and at present there are still text-based browsers like Lynx. Although Tim Berners-Lee also wrote the first multimedia browser in 1990, graphical user-interface (GUI), browsers didn't become popular until Mosaic came along in 1993. Task 1 Is it true or false (T/F)? 1. Each Web site contain a house page. 2. Tim Berners-Lee also wrote the first multimedia browser in 1991. 3. Home page, as the name suggests, is the main or opening page of a website. 4. No one owns and manages each site in the Internet. 5. Mosaic is one of internet browsers. b. Search engine Search Engine is a program that searches documents for specified keywords and returns a list of the documents where the keywords were found. Although search engine is really a general class of programs, the term is often used to specifically describe systems like Google, Alta Vista and Excite that enable users to search for documents on the World Wide Web and USENET newsgroups. In a simpler way, a Web search engine is a tool designed to search for information on the World Wide Web. Information may consist of web pages, images, information and other types of files. Search engines operate algorithmically or are a mixture of algorithmic and human input. There are basically three types of search engines: Those that are powered by robots (called crawlers; ants or spiders) and those that are powered by human submissions; and those that are a hybrid of the two. The following description explains how Crawler-based search engines works.Typically, a search engine works by sending out a spider to fetch as many documents as possible. Another program, called an indexer, then reads these documents and creates an index based on the words contained in
Task 2 Check your understanding. 1. How many tools to search the Internet ever created from 1990-1993? Name them. 2. How do surfers back to the main page? 3. What is website? 4. What is search engine? 5. Mention types of search engines. Further readings: http://dragon.ep.usm.edu/~it365/module/In ternet/Internet.htm http://www.webopedia.com/DidYouKnow/I nternet/2003/HowWebSearchEnginesWor k.asp http://www.webopedia.com/quick_ref/Inter net_Search_Engines.asp Task 3 In groups translate the following! Google Search Tips: a. You can search for a phrase by using quotations ["like this"] or with a minus sign between words [likethis]. b. You can search by a date range by using two dots between the years [2004..2007]. c. When searching with a question mark [?] at the end of your phrase, you will see sponsored Google Answer links, as well as definitions if available. In groups translate the following! d. Google searches are not case sensitive. e. By default Google will return results which include all of your search terms. f. Google automatically searches for variations of your term, with variants of the term shown in yellow highlight. g. Google lets you enter up to 32 words per search query. Send answer via sms 8181 Choose a, b, c, or d for the correct answer. 1. The first actual Web search engine was developed by Matthew Gray in 1993 and was called . a. spandex c. wantex b. wandex d. windex