Bld.316 1
Bld.316 1
Bld.316 1
This concept involves transfer and use of all kinds of information. ICT is the foundation of
economy and a driving force of social changes in the 21st century. Distance is no longer an
issue when it comes to accessing information; for example, working-from-home, distance
learning, e-banking, and e-government are now possible from any place with an Internet
connection and a computing device.
HARDWARE
HARDWARE BASICS
The concept of hardware includes computer components, the physical and tangible parts of the
computer, i.e. electrical/electronic and mechanical parts which comprise a computer.
Computer working principle: data are entered into a computer via input devices, then are
processed and stored in a system unit, and are finally displayed by the output device.
PERSONAL COMPUTER
Personal computer (PC), as the name suggests, is intended for personal use. If you do not
intend to move your computer frequently from one place to another, and at the same time you
want maximal price/performance ratio, then you should use a desktop computer. In
2
HND I BLD 316 INFORMATION AND COMMUNICATION TECHNOLOGY FPTB
LAPTOP OR TABLET PC
Laptop or tablet PC is used by individuals who have the need to travel with a computer.
Laptop computers, as opposed to tablet PCs, Data entry is done via keyboard and mouse,
while the tablet PC data entry is done via touch screen.
Unlike desktop computers, notebooks and tablet PCs are optimized for portability, low power
requirements at the expense of performance and can be used (for a limited period of time-i.e.
until the batteries are depleted) without connection to the power grid. In order to prepare a
laptop or a tablet computer for use without a power connection, it is necessary to recharge the
batteries.
Mobile phone is a portable electronic device used for distant communication. In recent years,
mobile phone has evolved from simple communication device into a multi-functional device.
Additional functions, such as short text messaging (SMS), electronic mail, Internet access,
contact registration, calculator, clock, alarm, recording and photograph displaying, recording
and playback of video clips, sending/ receiving multimedia messages (MMS), audio recording
and playback, etc. has turned the mobile phone into an extremely useful device, whose
absence would make active involvement and participation in a modern society not possible.
3
HND I BLD 316 INFORMATION AND COMMUNICATION TECHNOLOGY FPTB
Smartphone is a device that merges functionality of phones, PDAs, cameras, camcorders and
computers. To function properly, Smart phones use operating systems, which are the basis for
application development. Some smart phones can be connected to an external screen and
keypad, which creates a working environment, similar to that of a laptop or a desktop
computer. Some operating systems for Smartphone are: Google Android, Symbian,
Blackberry, and Windows Phone.
Basic computer working principle: data is entered into a computer via input devices,
processed and stored in a system unit, and displayed by the output device.
SYSTEM UNIT
The system unit (case) contains a computer's vital parts. There are two basic types of cases:
Motherboard, MBO is computer's basic circuit, to which all computer components are
connected, directly or indirectly. Devices are connected to the motherboard through a system
bus. System bus connects all devices, ensures data flow and communication between different
devices using predefined protocols.
Central Processing Unit (CPU or processor) is a central part of a computer (and can be
referred to as the computer’s “brain”). It manages all other computer parts, monitors their
mutual communication and performs arithmetic-logical operations. Processor speed is
4
HND I BLD 316 INFORMATION AND COMMUNICATION TECHNOLOGY FPTB
measured in hertz (or megahertz or gigahertz). Most famous manufacturers for personal
computer processors are Intel and AMD.
Cache is a small capacity memory which allows quick access to data. By storing data from
working memory in cache, the speed of communication between processor and RAM is
increased. Microprocessors use three levels of fast cache, L1, L2 and L3, used to store often
used data.
ROM (Read Only Memory) is a type of permanent internal memory that is used solely for
reading. BIOS (Basic Input/Output System), a program which is located in a separate ROM
on the motherboard, and defines the basic input/output system. Please note that not all BIOS
programs are stored in ROM.
RAM (Random Access Memory) is a working memory in which analyzed data and programs
are stored, while computer runs. It allows reading and writing data, and is deleted/cleared
when the computer shuts down.
Hard Disk Drive (HDD) is a device for permanent data storage (it does not delete/clear when
computer shuts down). Its features are: large capacity, faster performance in comparison to
optical devices but slower in comparison to RAM and are used for permanent data storage.
We can distinguish between internal and external hard drives.
Floppy Disk Drive is used for storing and reading data stored on a floppy disk. Disk capacity
is 1.44MB. Before memory stick and a wider usage of CD recorders, it was used as data
carrier. 'Modern memory sticks have a memory capacity measured in GB while floppy disks
only have memory capacity of 1.44MB, indicating that floppy disks are becoming obsolete.
DVD drive is used for reading DVD discs. DVD disc capacity ranges from 4.7 to 18GB.
Soundcard is a device used for sound creation and production by means of computer
speakers.
5
HND I BLD 316 INFORMATION AND COMMUNICATION TECHNOLOGY FPTB
Graphics card is responsible for image processing and displaying it on a monitor. It has its
own graphics processor and memory. Image quality depends on the strength of these
components.
Modem enables computers to communicate via telephone lines. They connect computers to
the Internet.
Connectors/ports are slots visible in the back and the front side of a computer.
Universal Serial Bus (USB) is used to connect various devices (mouse, keyboard, USB
memory).
Serial port is used for example in connecting a mouse (labeled COM1 or COM2).
Parallel port is used for connecting a local printer (LPT1 or LPT2).
Network port is used for connecting computers to a network.
ROM (Read Only Memory) is a type of permanent, internal memory that is used solely for
reading. BIOS (Basic Input/output System), a program which is located in a separate ROM on
the motherboard, and defines as the name suggests, basic input/output system
RAM (Random Access Memory) is a working memory in which analyzed data and programs
are stored, while computer runs. It allows reading and writing data, and is deleted/cleared
when the computer shuts down.
Bit (binary digit) is the basic unit used to measure the amount of information. A byte contains
eight bits.
1 MB (megabyte)- 1024 KB
6
HND I BLD 316 INFORMATION AND COMMUNICATION TECHNOLOGY FPTB
1 GB (gigabyte) -- 1024 MB
1 TB (terabyte) – 1024 GB
CD (Compact Disc) is an optical disc used for data storage. The standard capacity of a CD is
700MB. CD-R is used for reading and writing data once, while CD-RW for reading and
writing data multiple times.
DVD (Digital Versatile Disc) is an optical disc which is, due to the larger capacity (about 4.7
GB), mostly used for video storage.
Blu-ray disc (BD)- the successor to DVD, is an optical disk storage, it comes in different
capacities, depending on how many layers it has and the capacity of each layer. Currently, the
capacity of one layer is between 27 GB and 33 GB, while the overall capacity is the product
of the number of layers and capacity of each layer.
Memory card is a type of flash memory used to store data in digital cameras, cell phones,
MP3 players etc.
USB Stick is a data storage device. It features small dimensions, relatively high capacity,
reliability and speed.
There is a difference between an internal hard disk drive, which is embedded in the computer
case, and an external hard disk drive, which is connected to a computer by using an
appropriate cable or USB port, and is usually used to transfer data from one computer to
another or for backup.
Mouse is an input device that facilitates work with the graphical user interface (GUI). The
mouse transmits hand movements and the screen displays the cursor (mouse pointer)
movements. They are divided into mechanical and optical (with respect to a transfer
movement), and wired and wireless (with respect to connection).
7
HND I BLD 316 INFORMATION AND COMMUNICATION TECHNOLOGY FPTB
Trackball, unlike a mouse, is not movable. Hand movements are transmitted to the screen by
rolling the ball which is located on the upperside of the device.
Keyboard is used for data entry and issuing commands. They can also be wired or wireless.
Scanner is used to load data (image, text, etc.) from the printed material into a computer. The
result of scanning is an image, but with special programs, if we scan the text, we can get a text
as a result. Software used to recognize text from image is called a text recognition tool.
Touchpad is used for transmission of hand movement, but unlike working with a mouse, the
user is the one who determines the position of the cursor by touching the touchpad.
Joystick: mainly used in computer games. Unlike a mouse, it has many buttons which allow
control over game objects.
Microphone is a device that converts sound into an electrical signal, which can be stored on a
computer. It is mainly used for recording sound, communication between players in online
games, in combination with a web camera in video conferencing, for converting voice into
text on a computer (speech-to-text processing (e.g., textual files or emails), etc.
Webcam is a camera that stores video signal in a format appropriate for video transfer over
the Internet in real-time.
Output devices:
Monitor displays images from the computer, it enables us to see, work and control computers.
In other words, working on a computer without a monitor would be inconceivable.
Projector is a device used to project a computer image or other images from independent
devices, such as DVD players, Blu-ray player, etc. onto canvas or a wall.
8
HND I BLD 316 INFORMATION AND COMMUNICATION TECHNOLOGY FPTB
Printer is a device used for printing data from a computer onto a paper. We distinguish
between local printer (connected directly to the computer) and network printer (connected
directly to network using a network card). Also, printers also differ according to print
technology: laser, inkjet, thermal printer and plotter.
Laser printers are similar to photocopy devices when it comes to technology. They
have exceptional print quality, speed and are quiet. Downsides of laser printers are their high
price and high price of toners.
Inkjet printers have a high print quality (somewhat lower in comparison with laser
printer), they are quiet while printing, and have low initial investment. Ink price, especially
color ink, can cost as much as the printer itself. Printing technology is based on ink dispersion
from container onto paper.
Plotter is used for printing large drawings (up to A0). They are extremely expensive
and used only for professional purposes, such as in designing firms for printing technical
drawings (blueprints).
Thermal printer, as its name states, leaves a print on the paper by utilizing heat. They
use paper sensitive to heat, feature small dimensions; they are quiet while printing and
relatively cheap. They are usually used for printing receipts, and owing to that they are called
POS printer (printer of sale). Also, they are used as calculator printers and due to their small
dimensions, as portable printers.
Storage devices due to necessity for writing and reading data, they are classified as
input/output devices. Touch screen (i.e. monitor sensitive to touch) is an output device while
displaying computer image, and at the same time input device while receiving manual orders.
SOFTWARE
Software is, unlike hardware, intangible part of the computer. It consists of a sequence of
commands, written according to strict rules. Programs are written by programmers, in various
programming languages.
9
HND I BLD 316 INFORMATION AND COMMUNICATION TECHNOLOGY FPTB
Software types:
System Software (Operating system) is a program which manages computer hardware. First
computers did not have operating systems; they had programs that were directly loaded into
the computer (e.g. punchcards). Today, computers have an operating system which loads into
the computer's memory during its startup. Computer functions are based on its operating
system. Within operating system, drivers (responsible for the functioning of a computer) and
various utility programs (responsible for the functionality of a computer) are installed. The
most famous operating systems are:
Application Software (Utility programs) are all programs that users use to perform different
tasks or for problem solving. Users, according to his/her needs, install the appropriate utility
software. Computer functions and tasks that computers can perform are defined by the
installed utility software. Utility software can often cost more than computer hardware unless
the software is open source.
Text processing software is used for creating and forming text documents and nowadays,
they can contain images, charts and tables. Examples of such programs are OpenOffice.org
Writer (open source software) and MicrosoftWord (proprietary software).
10
HND I BLD 316 INFORMATION AND COMMUNICATION TECHNOLOGY FPTB
a "slide show” by using a projector. Examples of such programs are OpenOffice.org Impress
(open source software) and MicrosoftPowerPoint (proprietary software).
Software for creating and managing database helps to manage a collection of structured
data. Examples of such programs are OpenOffice.org Base (open source software) and
MicrosoftAccess (proprietary software).
- Internet browser: Mozilla Firefox, Microsoft Internet Explorer, Opera, Safari etc.
- programs for image editing: Adobe Photoshop, Canvas, CorelDraw, Draw etc.
3. NETWORK
Computer network falls into two main architectures: client/server network architecture and
peer-to-peer network. A client/server network uses one or more dedicated computer as server
to share the files, printers, and applications. A peer-to-peer network allows any user to share
files with any other user and doesn’t require a central, dedicated server.
11
HND I BLD 316 INFORMATION AND COMMUNICATION TECHNOLOGY FPTB
A Simple Network
Network Classification
The major categories used for classifying networks are geographical coverage,
internetwork connection method and functional relationship (network architectures)
12
HND I BLD 316 INFORMATION AND COMMUNICATION TECHNOLOGY FPTB
Internet
Classification of networks by Connection method
Computer networks can also be classified according to the hardware technology
that is used to connect the individual devices in the network such as Optical
fibre, Ethernet, Wireless LAN, Home PNA, or Power line communication.
Ethernet uses physical wiring to connect devices. Often deployed devices are
hubs, switches, bridges, and/or routers.
Wireless LAN technology is designed to connect devices without wiring. These
devices use radio waves as transmission medium.
13
HND I BLD 316 INFORMATION AND COMMUNICATION TECHNOLOGY FPTB
Client/Server Network
Advantages of a client/server Network
Centralized - Resources and data security are controlled through the server.
Scalability - Any or all elements can be replaced individually as needs increase.
Flexibility - New technology can be easily integrated into system.
Interoperability - All components (client/network/server) work together.
Accessibility - Server can be accessed remotely and across multiple platforms.
14
HND I BLD 316 INFORMATION AND COMMUNICATION TECHNOLOGY FPTB
15
HND I BLD 316 INFORMATION AND COMMUNICATION TECHNOLOGY FPTB
This term is most often used to discuss the implementation of networks for a
contiguous area. This should not be confused with a Controller Area Network.
A LAN connects network devices over a relatively short distance.
A networked office building, school, or home usually contains a single LAN,
though sometimes one building will contain a few small LANs (perhaps one per
room), and occasionally a LAN will span a group of nearby buildings. In TCP/IP
networking, a LAN is often but not always implemented as a single IP subnet.
NETWORK DEVICES
16
HND I BLD 316 INFORMATION AND COMMUNICATION TECHNOLOGY FPTB
Computer network devices also known as communication devices and they comprise a data
communication network. These devices are routers, switches, hubs, LAN cards, modems. In an
Ethernet or WAN network, the data communication cannot be performed without these
devices. Being an IT/Business professional or a network administrator, you must have the
good understanding of these devices.
1. LAN Cards
LAN cards or network adapters are the building blocks of a computer network. No computer
can communicate without a properly installed and configured LAN card. Every LAN card is
provided with a unique MAC address. An UTP/STP cable connects a computer with the hub or
switch. Both ends of the cable have the RJ-45 connectors one is inserted into the LAN card
and one in the hub/switch.
A LAN Card
2. Hub
The central connecting device in a computer network is known as a hub. Every computer is
directly connected with the hub. When data packet arrives at hub, it broadcast them to all the
LAN cards in a network and the destined recipient picks them and all other computers discard
the data packets. Hub has five, eight, sixteen, thirty-two and more ports and one
port is known as uplink port, which is used to connect with the next hub.
3. Switch
17
HND I BLD 316 INFORMATION AND COMMUNICATION TECHNOLOGY FPTB
A switch is an intelligent device that maps the IP address with the MAC address of the LAN
card. Unlike the hubs, a switch does not broadcast the data to all the computers, it sends the
data packets only to the destined computer. These are used in the LAN, MAN and WAN. In an
Ethernet network, computers are directly connected with the switch via twisted pair cables.
4. Router
A router is a communication device that is used to connect two logically and physically
different networks, two LANs, two WANs and a LAN with WAN. Routers provides the
connectivity between the enterprise businesses, ISPs and in the internet infrastructure.
5. Modem
A modem is a communication device that is used to provide the connectivity with the internet.
Modem comes in two shapes: Internal Modem (which is a card, installed in a slot, inside the
computer), and External Modem (which is a hardware device, found outside the case of
computer).
NETWORK TOPOLOGY
The way in which devices are interconnected to form a network is called network topology.
Some of the factors that affect choice of topology for a network are −
Cost − Installation cost is a very important factor in overall cost of setting up an
infrastructure. So cable lengths, distance between nodes, location of servers, etc. have
to be considered when designing a network.
Flexibility − Topology of a network should be flexible enough to allow
reconfiguration of office set up, addition of new nodes and relocation of existing
nodes.
Reliability − Network should be designed in such a way that it has minimum down
time. Failure of one node or a segment of cabling should not render the whole network
useless.
18
HND I BLD 316 INFORMATION AND COMMUNICATION TECHNOLOGY FPTB
Bus Topology
Data network with bus topology has a linear transmission cable, usually coaxial, to which
many network devices and workstations are attached along the length. Server is at one end
of the bus. When a workstation has to send data, it transmits packets with destination
address in its header along the bus.
Bus Topology
The data travels in both the directions along the bus. When the destination terminal sees the
data, it copies it to the local disk.
19
HND I BLD 316 INFORMATION AND COMMUNICATION TECHNOLOGY FPTB
Ring Topology
In ring topology each terminal is connected to exactly two nodes, giving the network a
circular shape. Data travels in only one pre-determined direction.
When a terminal has to send data, it transmits it to the neighboring node which transmits it to
the next one. Before further transmission data may be amplified. In this way, data reverses the
network and reaches the destination node, which removes it from the network. If the data
reaches the sender, it removes the data and resends it later.
20
HND I BLD 316 INFORMATION AND COMMUNICATION TECHNOLOGY FPTB
Star Topology
In star topology, server is connected to each node individually. Server is also called the
central node. Any exchange of data between two nodes must take place through the
server. It is the most popular topology for information and voice networks as central
node can process data received from source node before sending it to the destination
node.
21
HND I BLD 316 INFORMATION AND COMMUNICATION TECHNOLOGY FPTB
Tree Topology
Tree topology has a group of star networks connected to a linear bus backbone cable. It
incorporates features of both star and bus topologies. Tree topology is also called hierarchical
topology.
22
HND I BLD 316 INFORMATION AND COMMUNICATION TECHNOLOGY FPTB
THE INTERNET
It is difficult to define the internet simply because it is not a single entity. Instead, it is an
immensely complex combination of thousands of technologies and dozens of services used by
tens of millions of peoples around the world each day. While overly simplistic definition like
“Internet is a network of networks” is technically accurate. Internet mean INTERnation
Network, a network of all the computer networks above the globe. So, Internet is a network of
networks, made by joining computer networks together. These different computers and
networks are united with the common thread of protocols like Internet Protocol (IP) and
Transmission Control Protocol (TCP).
INTRANET
An intranet is a computer network that uses Internet Protocol (IP) technology to securely
share any part of an organization’s information within that organization. It is the connection of
computer networks in a local area. Sometimes, the term refers only to the organization’s
internal Website, but may be a more extensive part of the organization’s information
technology infrastructure. It may host multiple private websites and constitute an important
component and focal point of internal communication and collaboration. Any of the well-
known Internet protocols may be found in an intranet, such as HTTP (web services), SMTP (e-
mail), and FTP (file transfer protocol). Internet technologies are often deployed to provide
23
HND I BLD 316 INFORMATION AND COMMUNICATION TECHNOLOGY FPTB
modern interfaces to legacy information systems hosting corporate data. An intranet can be
understood as a private analog of the Internet, or as a private extension of the Internet.
EXTRANET
An Extranet is the extension of an Intranet to include public access. An Extranet can allow
public access to employees, customers, clients or partners. The Extranet uses Internet protocols
so users can navigate with a browser, but resides on the company’s private server rather than
on a public Internet server. Extranet access from the Internet can be controlled through various
architectures that are password or username specific. In other words, areas of the Extranet will
be available according to password credentials. This limits users to Extranet pages relevant to
the business they might be conducting, while keeping other areas of the Extranet private and
secure.
World Wide Web (WWW)
Is one of the services that can be used on Internet which enables us to view and search contents
in a form of web-pages
DATA TRANSER
Download is a term that implies taking a copy of digital data from a network computer to a
local computer, and upload means placing digital content on a network computer from a local
computer. For example, when you saved a copy of a document from a web site to your
computer (download). Likewise, when you finish preparing a document and placed it on the
network computer (upload).
Bitrate represents speed at which data is transferred through a network. It is measured in bps
(bit per second). The number of bits transferred in one second tells us how many bits can be
transferred through a network in one second.
1,000 bit/s rate = 1 kbps (one kilobit or one thousand bits per second)
1,000,000 bit/s rate = 1 Mbps (one megabit or one million bits per second)
1,000,000,000 bit/s rate = 1 Gbps (one gigabit or one billion bits per second)
Dial-up: Internet access method uses a modem (56k) and a telephone line.
24
HND I BLD 316 INFORMATION AND COMMUNICATION TECHNOLOGY FPTB
IM (Instant Messaging) service is used for instant message exchange and real time
communication. Besides textual communication and video conferencing, they allow file
transfer as well. Some of the popular IM services are: WindowsLiveMessenger, Skype, and
GoogleTalk.
VoIP (Voice over Internet Protocol) is a term for technology that enables digitalization and
transfer of sound (and multimedia sessions) over the Internet. Therefore, it enables sound
communication much like the telephone call. In short, VoIP protocol enables audio/video
communication between users.
Blog (web log) is a form of Internet media in which users can re-post or write their opinion on
any topic. It can be personal (a form of Internet diary), thematic, or in the form of journals.
Blogs are popular because end-users do not need to have advanced computer knowledge, or
knowledge of webpage creation, in order to be present on the Internet and write about various
topics, i.e. state their opinion. Blogging has greatly facilitated the exchange of interests, ideas,
opinions, and contributed to realization of human right to free expression. Some use blogs to
share their art, personal aesthetic, or to collect virtual clippings from websites online.
25
HND I BLD 316 INFORMATION AND COMMUNICATION TECHNOLOGY FPTB
Entries published on blogs are called posts, which may allow a space below for visitors to
leave their comments. Besides text, it is possible to exchange multimedia files, such as photos
or videos. In order to share your texts, pictures, video clips, etc., it is necessary to create a
personal account on websites that offer this type of service. In case you simply wish to
browse the content, it is not necessary to open a personal account.
Social Networks are free online services that provide users with various forms of presentation
and communication. Some of the more popular social networks are: Facebook, Twitter,
Google+, Whatsapp etc.
Forum is a service that allows users to exchange opinions. It can be compared to bulletin
boards on which participants leave their messages, while others leave their comments.
Examples of forums are: Reddit, TED Conversations.
26
HND I BLD 316 INFORMATION AND COMMUNICATION TECHNOLOGY FPTB
User authentication involves user identification, so individuals can gain access to a certain
content (data). For example, to check e-mail via browser, i.e., access an account, it is
necessary to enter a username and password. If the required information is entered correctly,
access is granted. Passwords should, for security reasons, be kept confidential. Password is a
key (like a key to access your home or a car) that allows access. As you would not share your
apartment or car keys with just anyone, you should not share your password either.
Nowadays, many people have home security doors with locks whose keys are difficult to
copy, with the aim of blocking unauthorized home intrusion. Passwords should be created
with the same caution. The more complex your password is, the harder it will be to break
through (crack it), therefore it is less likely that someone will gain unauthorized access to
your data.
• characters that follow the order given on a keyboard: 123, qwert, etc.
• Select a sentence:
• Add numbers:
27
HND I BLD 316 INFORMATION AND COMMUNICATION TECHNOLOGY FPTB
By choosing a password, such as: 7I.iPoCEwOA3, you will have a secure password, which is
difficult to break through and one you can easily remember. It is a combination of numbers,
uppercase and lowercase letters, and has 12 characters.
DATA SECURITY
The term backup signifies the process of making a copies of the original data (files,
programs). This help protect data in the event of damage to the original data source or its loss.
Data can be stored on another server, magnetic tape, hard disk, DVD or CD, etc.
Firewall is a software (or network device) that is used to control authorized access and protect
against unauthorized access to your computer. Figuratively speaking, computers are
connected via network port. In the computer world, the term port is used to describe the
network of connections through which computers can connect to a computer network, or
someone can connect to your computer from outside of your network. All data traffic between
a computer and the rest of network is done through ports. Control port controls data flow from
our computers to the network and vice versa. Control is done through a firewall; some ports
are opened, some closed, and some allow temporary traffic.
To protect data from unauthorized access and theft, we use a username and password to
confirm our identity, and prevent unauthorized data access. Similarly, in case we need to
briefly step away from a computer, it is necessary to lock it. Computers can be locked by
opening the Start menu, clicking the arrow next to the Shut Down button and selecting the
Lock command.
MALICIOUS PROGRAMS
Malware (malicious + software) is a software which infiltrates an operating system in a
seamless manner, whether by human mistake or due to shortcomings of the operating system
and software support with malicious intentions. Malicious software includes:
28
HND I BLD 316 INFORMATION AND COMMUNICATION TECHNOLOGY FPTB
Depending on what malicious code it contains, it may cause more or less damage to your
computer.
Worms: like viruses, they possess the ability of self-replication, however they cannot infect
other programs. Their usual intent is to take control of your computer and allow remote
control by opening, the so-called, 'backdoor'.
Trojan horses: can be presented in the form of games or files in e-mail attachments, with
different purposes, such as to allow remote control to your computer, delete data, allow
spreading of viruses, send spam from the infected computer, etc. Unlike viruses and worms, it
does not replicate and it needs to be executed, that is, it is not autonomous.
Spyware: is a program that secretly collects data about computer users (passwords, credit
card numbers, etc.), therefore it spies on users. The most common spyware infections usually
occur while visiting suspicious sites with illegal or pornographic content.
Adware: is a program that uses collected data about a user in order to display advertisements
in a way regarded as intrusive. It usually manifests itself in the form of many pop-up windows
that display ads.
Hoax: is a false message being spread by e-mail in order to deceive users. Their goal is to
obtain data of, for instance, a bank account, or persuade users to pay some fees in order to win
the lottery (which they never applied for), or pay costs of money transfers from an exotic
prince to help him withdraw money from a country that is falling apart and, in return, will
receive an impressive award, etc.
LEGAL REGULATIONS
Copyright is a right which is used to protect the author's intellectual property. If someone
wants to use such copyrighted work, they must respect the conditions under which the author,
29
HND I BLD 316 INFORMATION AND COMMUNICATION TECHNOLOGY FPTB
as the owner, has allowed the use of his/her work (payment of fees, referencing the original,
etc.). The use of copyrighted works is defined by the license and the user is bound by EULA.
EULA (End User License Agreement) is a software license agreement for end users. EULA
will be displayed during program installation and by pressing an "I agree" button you agree to
terms of use and are legally bound to respect contract conditions.
Product identification number (PID) is a number that comes with legally purchased software
and it certifies the origin of the program.
Every software publisher has a specific method of verifying the legality of a piece of software
you purchased. It mostly comes down to checking via the Internet, i.e., activation and/or
registration, updates via the Internet etc. One of the advantages of legally purchased or
acquired software is quality customer service that people with unlicensed software cannot
have.
Proprietary software is software licensed under the exclusive legal right of the copyright
holder. The licensee is given the right to use the software under certain conditions, but
restricted from other uses, such as modification, further distribution etc.
Shareware is a term that implies free software use (trials) for a specified time period, after
which it is necessary to buy the product.
Open Source is software whose code is available to users; it can be freely used, modified and
distributed.
30