Communications and The Internet: Scope of The Module
Communications and The Internet: Scope of The Module
Communications and The Internet: Scope of The Module
Suggested Readings
1
Introduction to Information Technology
Module IV
We are facing to an age where anything you want can be reached anytime and
anywhere. The link of computers with data communications is one of the most exciting
developments in data processing today. Communications and computers are partners of the
Information Age forming along the cyberspace, Information Superhighways, networking,
electronic global village, bulletin board systems, and on-line services.
Data communication is a process by which electronic data and information are moved
and transmitted from one place to another over land, in the air, and under the sea.
Telecommunication systems have improved the effectiveness of sales and customers service
work by creating immediate access to data.
A person who calls to a friend on the telephone is a Sender, the telephone line through
which the voice is transmitted is the Medium, and a friend is the Receiver. The data being
2
communicated may consist of voice, sound, text, video, and graphics. Using data
communication, the sender and the receiver are normally transmitted through computers,
telephone lines, satellites, coaxial cable, microwave links, radio signals, etc. The system
normally connects terminals or other devices to a central computer system as shown below:
The two methods of moving data from a source to destination are wire and wireless
transmission. In wire transmission, a signal moves through a wire such as telephone wire,
coaxial cable or fiber-optic cable. Different types of wireless transmission use different wave
frequencies and require different type of receivers. Common categories of wireless
transmission include radio and television broadcasting, microwave, radar, and satellite
transmission.
3
linking incompatible micros, minis and mainframes. A gateway is a combination of software
and hardware that permits networks using different communications protocols to talk to one
another. Bridges enable LANs to continue operation in their present format with the added
advantage of being able to other LAN.
4
Down-Line and Front End Processor
Another data communication hardware is Data PBX which is known as Data Private
Branch Exchange. It is a new generation switching device similar to old-time telephone
switchboard. The data PBX is a computer that electronically connects computers and
workstations for information distribution.
a. Local Area Network (LAN) - a privately owned communications network that serves
users within a confined geographical area. The range is within one office, one building,
or a group of buildings close together.
b. Metropolitan Area Network (MAN) - covers a geographical area the size of a city or a
suburb. Cellular phones are examples of a MAN.
c. Wide Area Network (WAN) - covers a wide geographic area such as a state or a
country. Some examples of computer WAN are internet and telephone systems.
e. Broadcast Networks - broadcast networks for radio and television via cable. Cable
television delivers more channels with higher quality pictures because vast of
information is carried through fiber-optic cable. Electronic superhighway opens a vast
range of choices including video-on-demand, telecommunications, and interactive
multimedia services such as home shopping, education and videogames.
f. Value-Added Networks (VANs) - these are public data networks that “add value” by
transmitting data and by providing access to commercial databases and software. The
use of VANs is usually sold by subscription where data can be sent between computers
in different locations.
6
Computer networks are configured to meet the specific requirements of an organization.
The basic computer network topologies (configuration of hardware for communication) are:
Star Topology
Ring Topology involves computer systems that are approximately the same size and no
one computer system is the focal point of the network.
7
Ring Topology
8
Bus Topology
Communications and connectivity enable the users to use telephone - related services
such as fax, voice mail, electronic mail, and teleconferencing. Resources can be shared
through workgroup computing and electronic data interchange. Work can be easy with
telecommuting, mobile workplaces, and virtual offices. On-line information services and
internet can also be used for research, e-mail, games, travel services, information gathering
and teleshopping.
a. Fax Messages. Fax which stands for facsimile transmission or reproduction sends and
receives documents over transmission lines to and from other fax machines. A fax
modem which is installed in a computer system sends signals directly from your
computer to someone else’s fax machine or fax modem.
Fax Messages
b. Voice Mail or V-mail. Like telephone answering machine, voice mail digitizes incoming
voice messages and stores them in a recipient’s “voice mail box” in digitized form. It
then converts the digitized versions back to voice messages when retrieved by the user.
Voice mail systems allow callers to direct their calls within an office or deliver the same
message to many people within an organization.
9
Voice Mail
Electronic Mail
10
2. Teleconferencing. Teleconferencing is a meeting among people without traveling.
They are linked by a communications device such as telephone, television or computer.
Teleconferencing can be prearranged by business users.
Teleconferencing
• Audio teleconferencing - meeting among people in different locations using the telephone
• Video teleconferencing - provided by video cameras and monitors that allow people at
different locations to see and hear one another
• Document teleconferencing - meeting participants not only see and hear one another but
also work on text and graphics projects at the same time
11
• Shared resources - allows people to share equipment that would be unaffordable for
one microcomputer.
• The Virtual office - is an often nonpermanent and mobile office run with computer
and communications technology.
5. On-line Information Services - an on-line information service provides access to all kinds
of databases and electronic meeting places to subscribers equipped with
telephone-linked microcomputers.
• Research
• Electronic mail
• Games
• Travel services
• Shopping
• Information gathering
• E-mail
• Discussion and news group
12
Nevertheless, this signifies the direction of ease of use in which computers and
communications presumably are headed.
• Set-top boxes
• Picture phones
• The TV/PC
Introduction to Information Technology
Module IV
Lesson 1
SELF-PROGRESS CHECK TEST
Test I. Multiple Choice
Directions: Write the letter representing your answer on the blank provided for before the
number
_____ 1. It is a new generation switching device similar to old time telephone switchboard
a. Interactive Television
b. Electronic Bulletin Board
c. On-line Information Service
d. Data PBX
_____ 2. Device used to convert computer compatible signals to signals suitable for data
communication facilities and vice versa
a. Modem
b. V-Mail
c. PBX
d. EDI
13
_____ 5. Sends and receives documents over transmission lines
a. EDI
b. PBX
c. FAX
d. VAN
_____ 7. A combination of software and hardware that permits networks using different
communication protocols to talk one another
a. Connectivity
b. Gateway
c. Internet
d. Data communication
_____ 9. Not any one of the wireless transmission for data communication
a. radio
b. microwave
c. satellite
d. telephone lines
_____ 10. Computer network which involves a centralized host computer that is connected to
a number of smaller computer systems
a. Star Topology
b. Ring Topology
c. Bus Topology
d. Complex Topology
14
Introduction to Information Technology
Module IV
Lesson Objectives:
The use of internet has changed the life of the people. The advances in technology
rapidly change the configurations of businesses, lifestyle, knowledge, research, and learning
environment. There were 31 million users were connected to the Internet in 1996 and more
than 150 million are expected by the year 2000. The number of servers will grow to 5 million
by the year 2000. Today, internet is essentially a self governing and non-commercial
community offering the public as a tool in the information gathering, electronic mail,
advertising, video conferencing, and worldwide presence.
The word “Net” is derived from the word “network”. A network in information technology
is a group of computers and associated facilities that are linked together to enable the sharing
of resources among computers.
There are three types of nets, namely: Internet, Intranet, and the Extranet.
Internet was first conceived in 1957 when the United States recognized the need for a
special group to level its competition with Russia in the heat of the race for space. With the
formation of Advanced Research Project Agency (ARPA), the first successful US Satellite
focused on communication technology and computer networking, the interactive use of
computer transpired them in the formation of internet. In 1983, the Domain Naming System
(DNS) was established for the people to easily access on other servers.
There are different benefits of internet depending on the type of business. Some of
them are as follows:
Individuals and organizations connected through the internet are exposed to the danger
of four major threats such as:
• Denial of service - Due to busy telephone line, defective server, systems malfunction, and
due to inability to communicate others, network or service is ineffective.
16
Theoretically and practically, the internet is advantageous to individuals and
organizations. However, some web hackers could not be prevented. The risk can be
safeguarded and reduced by security implementation, data encryption, firewalls and proper
authentication.
The World Wide Web (WWW) was released by the European laboratory dedicated for
particle physics. World Wide Web is based on the concept of Multimedia and Hypertext; a
language that provides single view of information regardless of its location or format. Various
applications of WWW are given on the next page:
• Software Distribution and Retrieval - New releases of software and updates to existing
software can be retrieved rapidly by the user.
• Video Conferencing - Allows a long distance conferencing and facilitates the outsourcing of
projects to third parties.
• Telecommuting - Allows employees to conduct business from a remote site. The web
provides business the international presence and strengthens ties between clients and
suppliers.
• Marketing - On-line feedback forms can be created to solicit marketing information about the
customer’s preference with their products and services.
• Technical Support - The webs provide a good medium to post technical support solutions
and product updates that can be accessed worldwide.
17
The World Wide Web and Internet are the latest technology and infrastructure that
changed the routine operations of business and communications. Not only in business, the
technology has captured the awareness of individuals and this will continue to expand in the
future.
Electronic mail or e-mail is the use of computers to send and retrieve text messages or
documents addressed to individual people or locations. This electronic technology became
popular in 1980 for effective communication. It is effective in sending message to a person,
getting feedback and response from somebody, requesting for product ideas simultaneously,
distributing requests, and obtaining specific information directly from people throughout the
organization.
The e-mail user is identified by an individual account, usually based on person’s name
and also serves as the person’s e-mail address. The general format is:
President@whitehouse.gov
billg@microsoft.com
crisost@pworld.net.ph
The sender uses a word processor to a create a message and then addresses it to a
distribution list. The distribution list might be an individual account number or a group of
numbers. The recipient can read the message immediately or wait when he has the time. The
e-mail message can be printed, saved, erased, or forwarded to someone else.
• Social context - Communication using e-mail seems to be less caring than personal
communication
• Privacy and confidentiality - Confidentiality problems may arise because messages can be
read by anybody whoever is near the machine.
• Information overlooked - Normality, e-mail generates higher overloads, more stress, and an
inability to get away from work.
18
E-mail offers confidentiality by entering password or secret word that limits access.
Our country has the most number of Internet Service Provider (ISP) in the Asia-Pacific
Region next only to Japan (PSICOM, Jan. 1999). There are more than 200,000 Filipino users
of internet and it will further increase in the next ten years.
In choosing an ISP, it is important to consider the service features and the price.
Expensive price does not guarantee a quality service. In the Philippines, subscription ranges
from P1,500 to P5,000 and monthly prices range from P550 to P3,500 a month. Direct access
to the internet using either Serial Line Internet Protocol or Point-to-Point Protocol (SLIP/PPP)
provides minimal charge since you do the connection by yourself and there is no need to use
the service provider system. Direct connection initializes a high speed modem of at least
9,600 baud per second (bps) and an internet browser.
Majority of the Philippine’s access providers uses Bulletin Board System (BBS). The
system offers greater opportunity for mass market for internet access because of multiple
telephone lines. Aside from internet access, BBS is a pin-up system for e-mail exchange, file
download, and conference chatting.
19
Introduction to Information Technology
Module IV
Lesson 2
Test I
Test II
4. Enumerate at least ten (10) internet service providers here in the Philippines
20
Introduction to Information Technology
Module IV
Lesson Objectives:
The Electronic Commerce (e-commerce) means “doing business on-line through web
store fronts. It could be either selling or buying products. Products being traded may be
physical products like books or services such as medical consultancy, virtual education, etc.
Some of the knowledge-based products include news, audio and video, database, software
and other digital products.
Electronic market refers to on-line trading and auctions such as stock market, trading
firms, on-line auctions for computers and other goods. Electronic market place refers to the
converging economy where products intermediaries, and consumers interact digitally or
electronically.
• Establish a presence - People will get to know your business since there are hundred million
people worldwide have an access to WWW.
• Make business information available - You can keep your customer more informed about
your business anytime
• Serve customers - Instead of calling customers through telephone, this is an alternative way
of servicing them
• Heighten public interest - Company write-ups can be done through web page address
• Stay in contact with salespeople - Your employees can be easily monitored for further
up-to-date information
21
• Easily get feedback from customers - You can easily response to customer’s feedback and
questions within a 24-hour service.
The e-commerce bill recently introduced in Congress by Senator Juan Flavier intends to
facilitate the use of modern means of communication and storage of information such as
Electronic Data Interchange (EDI) e-mail telecopy. However, the issue is still subject for
debate since not all relevant legal issues are being addressed. Some of these issues are
given below:
• Formation of contracts - Contracts should be in writing and in public document. The rule of
evidence needs proper authentication and identification of signature. Proper authentication
cannot be done with electronic communication.
These issues become more complicated when business have no physical presence or
operations in a country.
A computer virus is a program or software code that gets into a machine via a disk or an
electronic message. Prior to 1988, computer viruses are designed to protect disk programs
and software from being copied and tampered. They are usually hidden as code segment of
the larger program and have the ability to replicate itself and move from one computer to
another. These viruses remain in the host’s resources and cause destruction of files, alter the
logic of a program, and bring troubles to systems operations such as disk access problems,
keyboard failures, systems problems, monitor-producing garbage, data corruption and loss of
data.
There were about 5,600 PC viruses, 150 Amiga viruses, 100 Acorn Archimedes viruses,
45 Macintosh viruses, four Unix viruses, two OS/2 viruses, three MSWindows viruses, and
several Atari and Apple viruses.
The internet is a ground where viruses can be easily scattered. Lately, the macro virus
has invaded the computer system. Faster than the file infector and boot viruses, it hides inside
macros, the programs inside MSWord and Excel. The first macro virus known as “Concept”
came in 1995. Recently, the “Melissa” virus destructed thousands of computer in March 26,
1999. There are about 2,000 macro viruses delivered through e-mail in an attached Word
document. The e-mail contains the subject line, “Important Message for User Name” or “Here
is that document you asked for... don’t show anyone else...” Melissa’s real damage is network
traffic. Users find hard time browsing the internet and their e-mails are taking so long to arrive.
The Anti Virus Emergency Response Team (NAI AVERT) was able to write a clean-up program
against this virus. To prevent this virus, the attached document should not be opened and
delete the mail immediately.
22
Another recent virus is CIH or “Chernobyl”. It caused severe damage to a relatively
small number of computers. This virus swept last April 26, 1999.
A new e-mail borne computer virus entered the internet last June 10, 1999 that led to
the shutdown of some corporate e-mail systems. The new infection is called “Explore Zip
Worm” that erases files. This worm virus combines the speed of Melissa with the destructive
payload of Chernobyl virus. It disguises like an e-mail that appears to be a response to an
earlier message as “I received your e-mail, and I shall reply ASAP. Till then, take a look at the
zipped docs.”
Some of the common virus hoaxes discovered by the virus experts are as follows:
23
Introduction to Information Technology
Module IV
Lesson 3
Test I
1. E-Commerce
2. Net Virus
3. Electronic Market
4. Virtual Education
5. Virus Hoaxes
Test II
1. Melissa
2. Chernobyl
24
Introduction to Information Technology
Module IV
Lesson 1
Test I
1. d
2. a
3. a
4. b
5. c
6. c
7. a
8. d
9. a
10. a
Lesson 2
Test I
1. Internet is a vast network of computers or a network of networks while Intranet is
a closed, business-wide computer network connecting a set of clients through
computers using standard internet protocols.
2. Electronic Mail (E-Mail) is the use of computers to send and retrieve messages
or documents addressed to individual people or locations while Voice Mail
(V-Mail) digitizes incoming voice messages and stores them in a recipient’s voice
mail box in digitized form then converts the digitized versions back to voice
messages when retrieve by the user.
3. Video Conferencing is a type of teleconferencing which is provided by video
camera and monitors that allow people at different locations to see and hear one
another whle teleconferencing is a meeting among people without travelling.
4. Web Hackers are the people who can be called the threats in IT, who in a way
can be called the criminals on the web by hacking different information while
Web Virus is a program or software code that gets into a machine via a disk or
an elecronic message.
5. World Wide Web is based on the concept of Multimedia and Hypertext while
Electronic Mail (E-Mail) is the use of computers to send and retrieve messages
or documents addressed to individual people or locations.
25
Test II
1. The World Wide Web and Internet are the latest technology and infrastructure
that changed the routine operations of business and communications.
2. There are four major threats in using the internet, namely: the Denial of
information; Unauthorized access to systems and applications; Loss of
information integrity and the Denial of service.
3. On the internet open your e-mail account and click the inbox to retrieve your
e-mail.
Lesson 3
Test I
1. E-Commerce means doing business on-line through web store fronts. It could be
either selling or buying products.
2. Net Virus is a program or software code that gets into a machine via a disk or an
electronic message.
3. Electronic Market refers to on-line trading and auctions such as stock market,
trading firms, on-line auctions for computers and other goods. It is the
converging economy where products intermediaries, and consumers interact
digitally or electronically.
5. Virus Hoaxes refer to program or software that gets into a computer via disk or
electronic message that cause destruction of files, alter the program logic and
bring troubles to a system.
Test II
1. Melissa causes network traffic or users find hard time browsing the internet.
2. Chernobyl causes severe damage to small computers where files are erased and
destroyed.
MODULE IV TEST
a. E-mail
b. WWW
c. ISP
d. BBS
e. bps
f. SLIP/PPP
g. E-commerce
h. CIH
2. Aside from the different types of viruses enumerated in this chapter, identify at least 7
other viruses
27