Professional Documents
Culture Documents
Chapter 1 - System Fundamentals
Chapter 1 - System Fundamentals
1.1.3 Outline compatibility issues resulting from situations including legacy systems or
business mergers
Ø Legacy system = old technology, hardware, computer system or application program
Ø Such a system may still be in use because its data can’t be upgraded to newer formats,
or its applications can’t be upgraded, but this involves many maintenance challenges
Ø Business merger = the combining of 2+ business entities
Ø The main reason businesses merge is to reduce costs
Ø During this process, all departments of both companies need to ensure that all
subsystems are compatible
Ø 4 strategies of integration:
o Keep both information systems, and develop them to have the same
functionality (high maintenance cost)
o Replace both information systems with a new one (increased initial cost)
o Select the best information system from each company and combine them
(difficult for employees to work with information systems from another
company)
o Select 1 company’s information systems and drop the other companies’
(policy problems)
Ø Language differences increase communication problems, even if individuals have
some knowledge of the others language
Ø Software incompatibility is a situation when different software entities can’t operate
satisfactorily, cooperatively or independently, on the same computer, or on different
computers linked by a LAN/WAN
1.1.4Compare the implementation of systems using a client’s hardware and hosting systems
remotely
Ø Business software can operate installed on a client’s infrastructure and premises or hosted on
dedicated servers that belong to a company that provides such services
Ø A locally hosted system is the most appropriate solution for larger and complex systems
Ø A remote hosted system is the most appropriate solution where there is no necessary
hardware equipment in place or in cases where the administration wants to outsource
responsibilities for maintenance, support, backups, security etc.
Ø SaaS (Software-as-a-Service) is a contemporary delivery method that allows software and
data to be hosted and managed centrally on a remote datacenter
Ø Users pay to access the services provided on a subscription basis
Ø SaaS solutions are on the cloud and need a web browser and a broadband internet connection
to be accessed
Ø SaaS is less expensive as it has a low initial cost and requires few investments in installation,
maintenance and upgrading
Ø Companies only have to pay for the SaaS subscription (cheaper in medium to long-term)
Ø Provides a scalable solution, since a company has only to adjust its monthly SaaS
subscription as required
Ø SaaS requires few IT personnel and all software updates take place far away from company’s
premises
Ø Considered a safe solution – apps and data are on the cloud service of the providers
datacenter
Ø If the provider goes out of business, there might be data loss
Ø Low performance – compared to software running locally or over LAN
Ø SaaS integration with other SaaS solutions/software’s installed locally is difficult
Ø The remote host may be in a different time zone and this can have significant effects on end-
users
Ø PAAS – Platform as a Service – where the SaaS is stored
1.1.13 Describe a range of methods that can be used to prevent data loss
Ø Regular backup of files using hard disks or magnetic tapes
Ø Firewall installation
Ø Data storage in 2+ locations (offsite storage)
Ø Removed hard copies (printed versions of data)
Ø Installation of an antivirus program for antivirus protection
Ø Human error reduction techniques and/or failsafe (accidently deleted files)
Ø Online auto save backup (iCloud, Dropbox)
Ø Redundancy – duplication of storage devices and stored data of a computer system
to secure the stored data, is a failsafe method
Ø Removable media – e.g. diskettes, Blu-ray discs, CDs, DVDs, USB etc., used for
fast data backup and data storage, can store data permanently, are non-volatile
Ø A failover system - company system which is on standby capable of switching to a
spare computer system upon hardware failure, network failure, or any other type of
error e.g. software malfunction
Ø Difference between failover and switchover is the degree of needed human
intervention.
Ø A failover is automatic and handles abnormal situations without human interference
Ø In a failover, when the primary server fails, the standby server is made primary
Ø In a switchover system, the primary and secondary system interchange the primary
role
Ø Critical systems allow for failover to take place on system failure to provide
reliability and continuous availability
1.2.2 Describe the roles that a computer can take in a networked world
Ø A computer can function as a client, server, e-mail server, domain name server (DNS
server), router or firewall
Ø A dumb terminal
o Usually consists of a keyboard, monitor and a network cards that is connected
to a server/powerful computer
o Depends entirely on the computer that it’s connected to for computations, data
processing and data management
Ø A thin client
o Relatively low performance terminal
o Heavily, but not entirely, depends on the server that it’s connected to
Ø A client
o Receives data via the network
o A server may be a program or a computer that has saved data on it and
provides services requested by clients connected over a network, but a client
is an average computer/terminal used to access a computer system
Ø An email-server
o Manages the flow of email in and out of the network
o Check that and email address is valid, allows users to access their email etc.
Ø A router
o Networking device that accepts incoming data packets (information), reads
their destination address and distributes them across networks, according to a
routing table/policy
o It identifies the destination of the messages and sends them via an appropriate
route
o Used to forward data packets between networks
Ø A domain-name system server (DNS server)
o Attributes names of networks addresses and resolves names by assigning them
to the appropriate network entity
o Allows you to type names into the address bar of the web browser and the
web browser then finds that address on the Internet
o It is a protocol within TCP/IP
o Used for managing public names of websites
o To bypass a DNS lookup, you can enter the IP address directly into a browser
Ø Firewall
o Hardware or software network infrastructure that controls data flow access
among network entities
o Used to offer protection and limit access to a network
o Consist of hardware and software components
Ø Client-server
o Software network architecture system where clients request information and
servers perform tasks in order to provide information
o At least 1 server machine is required
o Servers share their resources, whereas clients don’t – main difference
1.2.3 Discuss the social and ethical issues associated with a networked world
Ø Reliability – how well the system functions – could case data loss, times loss, money
loss, injury and maybe death
Ø Integrity – protecting the completeness and accuracy of data – data lacks integrity is
its incomplete, out-of-date or has been altered
Ø Inconsistency – if information is duplicated or only 1 copy is updated
Ø Security – protection of hardware, software, peripherals and networks from
unauthorized access. Common security systems: biometrics, passwords, firewalls,
locks. Authenticity – a person has to prove their identity to gain access to the system.
1+ factors are required to increase the difficulty to provide false credentials
Ø Privacy – ability of control how and to what extent data is used and disseminated to
others. Issues: how long data is stores, who has access to data, how it is used.
Ø Anonymity – e.g. when someone uses and IT system to conceal their true identity to
cyber-bully someone, commit illegal crimes, hack computers etc.
Ø Intellectual property – ideas, discoveries, photos, films, essays, artworks –
copyright laws are designed to protect these from unauthorized/illegal reproduction.
Copy-and-paste and file-sharing make it easy to break these laws
Ø Digital divide and equality of access – use of IT systems has not developed at the
same rate in all parts of the world. Lack of access to IT infrastructures, online
services, finance, education, basic resources the main reasons for this divide
Ø Surveillance – using IT to monitor people with/without their knowledge/permission –
gov’t’s, law enforcements, employers etc. may do this
Ø Globalization and cultural diversity – IT helps diminish the importance of
geographical, political, economic and cultural boundaries while speeding up the
global spread of news. Traditional cultures and values may diminish eventually
Ø IT Policies – promote the appropriate use of computers, networks, information
systems and technology. Gov’t’s, public authorities etc. develop these policies
Ø Standards and protocols – predefined technical rules that hardware/software
developers should follow – they allow for compatibility, proper communication and
interoperability
Ø People and machines – internet addiction, the use of AI in military/law enforcement
Ø Digital citizenship – appropriate behavior in a digital world – using IT ethically, in a
way that respects society, the law and doesn’t put humans in danger or violate human
rights
Cause Positive effects
Constant exposure to communication technology • Citizens better informed about the world
Internet • Email, WWW
• Easier communication in emergencies
Use of smartphone
• Use of useful apps e.g. GPS
Gaming • Better hand-eye coordination
• Easier communication with family
Mobile Phones
• Easier communication in emergences
Cause Negative effects
• Psychological impacts e.g. stress, poor concentration,
Constant exposure to communication technology short attention span
• Obstacle to personal one-to-one relationships
• Neglected life
Internet
• Social media obsession
• Anxiety
Use of smartphone
• Increasing expense of hardware
• Lower levels of concentration due to lack of sleep
Gaming • Social desensitization
• Neglected education and personal development
• Possible health consequences
Mobile Phones
• Possible car accidents
1.2.6 Describe appropriate techniques for gathering the information needed to arrive at a
workable solution
Ø Examining current systems – detailed examination of the current system, analysis of
its functions/procedures, study the business and system documents e.g. current order
documents, logistics documents etc.
Ø Literature search – identification, retrieval and management of various sources in
order to find information on a topic, areas that may be interesting of various sources
to find info on a topic, derive conclusions and develop guidelines for practices
Ø Examining competing products – analysis of competitive factors, benefits,
vulnerabilities, successful characteristics, break-through’s, design features,
stakeholders’ acceptance
Ø During the design and analysis phases, all critical organizational capabilities (e.g.
sense-making, decision making, asset availability etc.) that are essential to support
the effective planning and developing of the new IT system should be identified
Ø A successful IT system should result in a competitive advantage
Ø A modern information system should be planned to:
o Increase client trust
o Preserve brand strength
o Preserve organization reputation
o Maintain corporate resiliency
o Enhance organization piece
Ø Structure Charts
o Describes functions and sub-functions of a system, and the relationships
between modules of a computer program
o The organization of it a structure chart is straight-forward – allows the analyst
to split a large problem into smaller ones
o Each module performs a specific function and each layer in a program
performs specific activities
o Makes modular design development much easier
o Modular design is the process of designing system modules individually and
then combining the modules to form a solution to an overall problem
o Module is a complete and independent part of a program or an algorithm
o Modular programming is the
method of partitioning a computer
program into separate sub-
programs. Each sub-program can
be easily modified and maintained
without the necessity to alter other
sub-programs of the program
o Modular language is a language
that supports modular
programming
1.2.8 Describe the purpose of prototypes to demonstrate the proposed system to the client
Ø A prototype is a working or non-working preliminary version of the final product or a
simple version of the final system that is used as a part of the design phase to
demonstrate how the final product will work
o It attracts the attention of the client – encourages them to use it and ‘get a feel
for it’
o Provides just enough of the concept for the investors to decide if they want to
fund the full production or not
o Encourages active participation between users and developers
o Gives an idea of the final product
o Helps in the identification of problems with the efficiency or the design
o Increases system development speed
1.2.10 Explain the possible consequences of failing to involve the end-user in the design
process
Ø For a system to be successful, the analysis and the design must involve all key
stakeholders including the client and the end-users
Ø Involvement, collaboration and active participation are essential because a project
with poorly-defined stakeholder goals is unlikely to be successful
Ø The developed system may either solve a different problem, or deal with issued that
are outside of the project’s scope
1.2.11 Discuss the social and ethical issues associated with the introduction of new IT systems
Ø Machines are replacing humans in many tasks, forcing millions into unemployment
Ø Could be said that jobs don’t vanish, but change
Ø Could create social disturbance
Ø Social interaction is an essential element of social change that affects ideas, beliefs,
moral values etc.
Ø Continuous development of computerized systems may absorbs people and cause
them to drift apart from the physical world and become enclosed in virtual
environments
Ø This may completely disorient some users, or deprive them of socialization and
interaction opportunities
Ø In a business environment, the introduction of a new improved IT system places more
stress on the personnel because they have to study, learn and familiarize themselves
with the new system while doing their regular duties
1.2.13 Identify a range of usability problems with commonly used digital devices
Ø 8 quality components on usability
o Complexity/simplicity
o Effectiveness
o Efficiency
o Error
o Learnability
o Memorability
o Readability/Comprehensibility
o Satisfaction
GPS/Navigation Systems Tablets
• Small screen • Accidental touches leads to undesired
• Low-quality speakers results
• Poor performance antenna • Difficult to learn different gesture features
• Inaccurate geographical data of various manufacturers
• Outdated street data • Bad/poor scaling and zoom control
• Inefficient routing software • Difficult-to-use control features
• Small side buttons
• Poorly written instructions
Game Consoles PC’s
• Relatively small screens • Excessive keyboard use = RSI
• Small buttons • Excessive use of screen = eyesight
• Difficult to use outdoors (insufficient problems
brightness) • Poor room lighting conditions = distracting
• Short battery life reflection on screen
• Mouse on PC is for right-handed people
(difficult to use for left-handed people
Digital Cameras MP3 devices
• Incorrect calibration of touch screen menus • Tiny buttons
• Need to hold camera vertically (no auto- • Insufficient memory
rotate) • Fragile
• All cameras don’t have flash – need to buy • Lack of screen in ‘micro’ devices
extra hardware • People need to familiarize themselves with
• Small buttons the device – others can’t use it
• Some cameras require specific software to • Use of sensors/gesture control to enhance
connect them with a computer and functionality e.g. shake device to change
store/transfer files song
Mobile phones
• Too small keyboard
• Some users don’t need all the special features
1.2.14 Identify methods that can be used to improve the accessibility of systems
Issue Input methods and devices Output methods and devices
Visual impairment, • Braille input devices • Speech output devices
from blindness to • Touch type with standard • Speech synthesizers to convert
color vision deficiency keyboards text to speech
• Braille display
• Adjust color of display
Hearing and speech • No problem with commonly used • Replace sound signals with visual
impairments devices effects
• Use subtitles to replace audio
speech track
Cognitive problems • Special software provides active participation, multi-sensory
and learning experiences, strong interaction, positive re-re-enforcement,
disabilities personalized interaction, and repetition – useful in skill building
• Basic word processor for a dyslexic person
Mobility impairments, • Specialized disk guides • No necessity for different output
limited hand mobility, • Pointing device instead of devices
Parkinson disease keyboard
• Left- and right-hand keyboards
for those who can’t use one hand
• Wearable computer interfaces
• Expanded keyboards
• Morse code using special knobs
• Voice-recognition
• Word-prediction software
Ø Scheduling systems:
Usability quality component Usability Considerations
Complexity/Simplicity Unclear instructions on how to use the system, lack of built-in
help
Effectiveness Other apps have better synchronization capabilities
Efficiency System may be difficult to understand
Errors Time to reschedule a wrong appointment (entry)
Learnability Complicated menus
Easy to remember Difficult to remember the optimal way to add a task
Readability/Comprehensibility Very small characters
Satisfaction Ideal for another country with different time/date/unit formats
Ø The digital divide exists between high and low income households and even
countries
Ø Technology e.g. laptops, tablets etc. are part of everyday life for the fortunate, but
just a dream for many more
Ø The consequences of the digital divide result in increasing inequality and reduced
opportunities for education, entertainment and income.
Topic 2: Computer Organization
Word processors
Ø Software application used for the production of any sort of document
Ø Includes tools for the composition, editing, formatting and printing of documents
Ø Word processing is the action of creating documents using a word processor
Ø Most common software application
Ø E.g. Microsoft Word, Pages
Spreadsheets
Ø Software application that is used for the organization and analysis of data
Ø The data in a spreadsheet application is represented as cells, organized in rows and columns
Ø These cells may contain numbers, text, or results of formulas that calculate the display values
automatically on the basis of the contents of other cells
Ø Allows for the fundamental operations of arithmetic and mathematical functions, provides
common financial and statistical operations, can display graphical data
Ø Used in any context that requires arithmetic data to be entered, processed and presented
Ø E.g. Microsoft Excel
Web browsers
Ø Software application used to access, retrieve and present content on the WWW
Ø The content can be web pages, images, videos, or other files and is identified by a URI
(Uniform resource identifier)
Ø The web browser needs the URI to connect to the appropriate web servers and request the
wanted information
Ø The web servers send back the information which the web browser then displays to the user
Ø E.g. Microsoft Internet Explorer, Google Chrome, Safari, Mozilla Firefox
Email
Ø Software application that allows for the exchange of digital messages from a single author to
1 or more recipient(s)
Ø The author and recipient(s) don’t need to be online simultaneously to exchange the email
Ø The author send the email to the email server of the recipient(s), and when the recipient(s)
connect to the server, they will receive the message
Ø An email consists of 3 elements: envelope, header, body
Ø For an email to be transferred from the author to the recipient(s), the simple mail transfer
protocol (SMTP) is used – it communicates delivery parameters using the message envelope
Ø The message header contains the addresses of the sender and recipient(s), subject field and
data/time stamp
Ø The message body contains the actual message which is to be sent
Ø Email software applications can be web-based or as a software to be installed
Ø Web-based email can be accessed by any computer that supports a web browser, but needs an
internet connection
Ø E.g. Microsoft Outlook, Google Gmail
Ø A toolbar is a GUI element on which buttons, icons, menus, or other input/output elements
are placed
Ø A menu is a GUI element that displays a list of commands that can be chosen by the user to
perform various functions, e.g. a menu can display operations related to creating, opening,
closing and saving a file
Ø A dialogue box is a GUI element that is used to communicate information to the user and
allows them to respond by choosing an option from a list of specific choices
Ø GUI’s are described using WIMP (Windows, Icons, Menus, Pointers)
Ø Some common GUI elements (WIMP) are provided by the OS
Ø Some features are provided by the application software – saves time for programmer,
minimizes the possibility of confusion and provides a smoother learning curve for each new
software application
ASCII
Ø A – Z = 65 – 90
Ø a – z = 97 – 122
Ø Special symbols = 91 - 96
2.1.11 Define the Boolean operators: AND, OR, NOT, NAND, NOR and XOR
Boolean operators
2.1.13 Construct a logic diagram using AND, OR, NOT, NAND, NOR and XOR gates
Simplification of Boolean expressions
Chapter 3 – Networks
3.1.1 identify different types of networks
➢ A computer network is a group of computer system and other computing devices that are connected
together and able to communicate and exchange data with each other.
➢ There are 2 key terms in computer networks
• Server – a server is a computer system or a software application that provides data to other
computer systems that are connected to the same network.
• Client- A client can either be a computer system or a software application that requests a
service from a server connected to the same network.
➢ In summary, a server computer system is a host running server software application and sharing its
resources with clients that make requests. A client, on the other hand, does not share any of its
resources but requests content from a server.
➢ The main 3 network components that play a crucial role are hub, switch and router.
• Hub – A hub is the connection point for devices on a single network. Network devices and
computer systems connected to a hub using Ethernet cables that attach to a port. When a
network device wishes to send data to some other device on the network, it sends the data
to the hub. The hub then copies the data and sends it to all devices connected to its ports.
The device waiting to receive the data accepts the data. All the other devices just ignore it.
• Switch – switch is similar to a hub the only difference is that it can identify which network
device is connected to which port. This allows the switch to transmit data to the exact port.
• Router -It is used to join multiple networks and serve as an intermediary between these
networks so that data can be exchanged effectively and efficiently between network devices
of those networks.
➢ As stated, a hub or a switch and a router are commonly integrated into a single box, allowing the
creation of a wired or wireless network, as well as the connection of that network to other networks,
such as the Internet.
➢ Types of networks
➢ LAN – (local area network) LAN covers a local area which includes a local office/building and homes.
Whether wired or wireless, nearly all modern LANs are based on Ethernet, a set of protocols for
exchanging data.
➢ WAN – (wide area network) like the name this network has a larger range. The distance can range
from a network connecting multiple building or college campus to satellite connecting office in
different countries.
➢ VLAN – A virtual local area network (VLAN) is a logical group of workstations, servers and network
devices that appear to be on the same LAN despite their geographical distribution. A VLAN allows a
network of computers and users to communicate in a simulated environment as if they exist in a
single LAN. VLANs are implemented to achieve scalability, security and ease of network management
and can quickly adapt to changes in network requirements and relocation of workstations and server
nodes.
➢ SAN- A storage area network (SAN) is a secure high-speed data transfer network that provides access
to consolidated block level storage. An SAN makes a network of storage devices accessible to
multiple servers. SAN devices appear to servers as attached drives, eliminating traditional network
bottlenecks.
➢ WLAN- A wireless local area network (WLAN) is a wireless distribution method for two or more
devices that use high frequency radio waves and often include an access point to the Internet. A
WLAN allows users to move around the coverage area, often a home or small office, while
maintaining a network connection. Also known as WIFI network, but can include other transmission
technologies.
➢ Internet- The internet is a globally connected network system that uses the TCP/IP protocols to
transmit data via various types of media. The internet is a network of global exchanges – including
private, public, business, academic and government networks – connected by wired, wireless and
fibre-optic technologies. he terms internet and World Wide Web are often used interchangeably, but
they are not exactly the same thing; the internet refers to the global communication system,
including hardware and infrastructure, while the web is one of the services communicated over the
internet
➢ Extranet- An extranet is a controlled private network allowing customers, partners, vendors,
suppliers and other businesses to gain information, typically about a specific company or educational
institution, and do so without granting access to the organization's entire network. It is restricted to
select users through user IDs, passwords and other authentication mechanisms on a login page.
➢ VPN- It uses the internet to allow people to log into a network remotely and access its resources, but
encrypts the connection to thwart eavesdroppers. This makes VPN a popular way to support remote
workers, especially in fields where privacy is paramount, such as health care.
➢ PAN- (personal area network) a network covering a very small area, usually a small room. The best-
known wireless PAN network technology is Bluetooth, and the most popular wired PAN is USB. You
might not think of your wireless headset, your printer or your smartphones as components in a
network, but they are definitely talking with each other. Wi-Fi also serves as a PAN technology, since
Wi-Fi is also used over a small area (especially in cars)
➢ P2P- Peer-to-peer is a network model in which computers or hardware devices exchange files.
3.1.3 Describe how communication over networks is broken down into different layers
➢ In our world we have various different computer system manufactures and a wide variety of different
types of computer. Although hardware in this computer system differs, we may need these different
computer systems to communicate with each other. To achieve this, a specific standard has to be
followed by all manufactures.
➢ Software application developer have to abide by some standard in order to develop application
capable of communicating with other software over WAN (internet). Imagine a simple program that
ask for services from an online database. This process requires the program to:
1. Pass the request through different layers
2. Obtain an answer through different layers
➢ The layers serve different function and use different protocols for information exchange. This makes
the process less complex because any problem is broken down into distinct modules.
➢ There is a common format that is universally understandable by all software application.
➢ Large data is broken down into packets. Each packet contains small amount of data, as well as other
important information as the designation of the packet. The packets then travel through the network
and reach their final destination. Various procedures handle the routing of packets across a network
through
➢ Advantages of layers
• Easy to manage.
• Greater understanding of each layer.
• Common language for each layer.
• Makes protocol design easier.
• A manufacturer can focus on technologies of a particular layer.
• Products of different manufacturers can work together.
• Technology advances of a layer are independent of technology advancements of other layers
(wireless technology advances are not dependent on advances of media NP‘WPP’N!‘ format
compression (GIF))
➢ VPN benefits
1. Communication is easier
2. Companies take advantage of the Internet to provide secure connections
3. Decreases operational costs versus traditional Wide Area Networks
4. Employees work as if they were directly connected to the company’s network
5. Extends connections across numerous geographic sites without the use of a leased line
6. Improves overall productivity 7. Improves productivity of remote employees
8. Improves security
9. Offers the flexibility to employees to take advantage of the company’s Intranet over an existing
Internet connection
10. Offers flexibility to remote offices
11. Offers global networking opportunities
12. Provides teleworker support
13. Reduces environmental footprint
14. Reduces travel times and traveling costs for remote users
15. Simplifies network topology for administrators and companies
16. Positive changes in working patterns
3.1.6 Define the terms: protocol, data packet (done in the intro)
➢ Without predefined rules, communication would be impossible. The rules of communication are
called protocols. Consider them as strict predefined rules.
➢ Some of the protocols required for communication to take place include":
1. The presence of an identified sender
2. The presence of an identified receiver
3. The presence of an agreed-upon method of communicating (email, IM, smartphone,
gestures, face—to-face, telephone, fax, letter, photograph, etc.)
4. The presence of a common language
5. The presence of a common grammar
6. The presence of an agreed-upon speed and timing of delivery (”Slow Down, You're Talking
Too Fastl")
7. The presence of confirmation or acknowledgment requirements (for example, “Does that
make sense?” ”No, please explain!”)
➢ Computer Network Protocols also provide:
➢ We measure data transfer speed in bps (bits per second), kbps (kilobits per second) or Mbps (millions
of bits per second/megabits)
➢ Bandwidth describes the maximum data transfer rate of a network or internet connection. It
measures how much data can be sent over a specific connection in a given amount of time. For
example, a gigabit Ethernet connection has a bandwidth of 1,000 Mbps (125 megabytes per second
➢ There are various factors that affect the bandwidth (interferences, traffic, the number of connected
devices and errors).
➢ Factors that affect speed of data transmission
3. interferences
4. Malicious software
9. Slowest segments
11. Time required for user authentication and various security checks that take place
➢ all network has limited bandwidth. Data compression reduces the size of files transmitted over a
network making it easier to store and faster to send. Compressed data takes up less bandwidth thus
reducing the size of the file making the time required to send the file over a network a lot less. Data
compression is basically reducing the number of bits present in that file.
➢ There are 2 types of data compression
➢ Lossy data compression: with this type of compression method there is some loss of data information
that can’t be recovered. Lossy data compression is a method in which the system removes the
unnecessary/unused information from the system. Images that are in a website follow lossy format.
• Example) some audio files consist of data in the ultrasonic frequency range, but we humans can’t
hear that so we discard that file to reduce the size of the file. This is also used when we make a
phone call. You can reduce the size of an image by merging some similar coloured pixels, this will
drastically reduce the size of the image but the image will have a similar look to it.
➢ Loss less compression: this compression method uses algorithms to save the file with its original
quality. Loss less has a limit capability thus it won’t reduce the size drastically but it will still have the
same quality. images that are print uses loss less because the quality of the image has higher priority
than size.
https://www.youtube.com/watch?v=OtDxDvCpPL4&feature=youtu.be
https://www.youtube.com/watch?v=2Qo5prktYNQ
➢ Wired communication
• Copper cable: cooper cable is the most common kind of cabling in computer network
• Coaxial cable: It consists of two copper conductors. It was used in computer networks, as well as
to carry TV signals. Low cost of installation.
• Unshielded Twisted Pair Cable (UTP): Very popular in LANs. Easy to install. Prone to electrical
interference. Low cost of installation. Good for short distances between repeaters. Used in
telephone networks. Very secure.
• Shielded Twisted Pair Cable: More difficult to install than UTP. Reduced interference.
• Fiber Optic Cable: Optical fiber carries a beam of light. expensive. Offers higher speeds. Needs
fewer repeaters. Extremely secure. It is used for data transmission and telephone lines.
➢ Wireless communication
• Microwave Radio: Used extensively for mobile telephone networks and LANs. Information is
carried through air. Microwave signals offer high bandwidth (but lower than cables). For
optimum results no buildings and other structures should be between the transmitter and
the receiver. Weather conditions affect the performance. Difficult to guarantee reliability.
Less secure than wired communication
• Satellites: Use microwave signals.
• Infrared: Used only for very short distances. Infrared transmission cannot pass through
objects and it is directional. A line of sight is required. Advanced security.
• RFID: Uses various radio technologies. Active RFID needs internal power. Passive
• RFID needs no internal power source.
• Bluetooth: Bluetooth devices use microwave radio to exchange data. They transmit at very
low power levels. Their frequencies change regularly.
• Free Space Optics: Use of lasers for wireless computer communication.
➢ Packet switching is a method of transmitting information over a computer network. The information
is broken down into smaller pieces, the packets that are then transmitted across the network.
➢ Every packet contains:
Advantages:
▪ Because the single packets are small, waiting times are low and because packets can travel
through multiple channels independently, the network will be utilized better.
▪ Resources will be given fairly to participants in the network.
▪ Because of small packet size transmitting errors can be detected fast.
▪ High resistance against fallouts. If part of the network falls out packets can route around the
broken down transmission lines.
Disadvantages:
▪ Because transport routes are not fixed, overloading can occur at transmitting stations.
▪ Packets don't arrive in order (because they can take separate ways).
▪ All participants have to use the same network protocols.
▪ No constant bandwidth can be guaranteed and big fluctuations in bandwidth can happen.
3.1.12 outline the advantages and disadvantages of wireless networks
Advantages:
Hardware components:
▪ Antenna
▪ Networking interface card
Software components:
▪ Drivers providing the abstraction required by the operating system and implementing functions
▪ Firmware of the network card implementing transport-oriented protocols
➢ WiFi:
▪ Also called Wireless LAN (WLAN)
▪ Used in laptops to connect wirelessly to home network
▪ Most preferred network type to implement a home network
▪ Allows relatively slow to fast data transmissions (depending on the version)
▪ Backwards compatible with most older WiFi standards
▪ Small transmitting radius makes it suited for homes
➢ WiMAX:
➢ Data encryption: information is scrambled using a set of mathematical rules and passwords so that it
is only readable by the communicating parties. Examples are AES and RSA.
➢ userID: a userID and password are used to identify the user. Usually, traffic after identification is
handled using some type on encryption method.
3.1.16 Evaluate the advantages and disadvantages of each method of network security
➢ Encryption types:
Advantages:
▪ Often, users are lazy and take a password that is easy to guess
▪ The password needs to be transmitted over the network to receiver to allow them to read the
message
▪ Some encryptions are designed to have backdoors built in
➢ userID:
Advantages: