Documente Academic
Documente Profesional
Documente Cultură
Computers in a
Networked Society
Unit 2 Computer
Technology
in Action
Contents
Unit overview 1
Unit objectives 2
Objectives 3
Introduction 3
Data representation 43
Objectives 49
Introduction 49
System software 49
Objectives 74
Introduction 74
Objectives 88
Introduction 88
References 113
Glossary 114
Unit Overview
Knowing how to use a computer is not sufficient. It is also vital to know
and understand each component of a computer. A computer is similar to
a human body; each part of the body has its function and purpose and
so has each part of a computer. In the first section of this unit, computer
hardware and software will be discussed, focusing on the various forms of
input, output and storage devices. The system unit and how it manages
data will be explained.
The fourth section explores the important topic of computer security. There
are many different ways that computer security can be compromised.
You need to know how to protect your computer and to ensure that it
runs reliably.
The final part of this unit covers two applications in MS Office: Excel
and PowerPoint. The applications will be explained in a separate manual
called the Lab Guide.
Introduction
As computers have become such a big part of our lives, it is important
for us to understand the various devices and software that are related
to them. Hardware refers to the physical elements of a computer.
Software consists of programs or applications that tell the hardware
how to accomplish a certain task. This section discusses hardware and
software, focusing on input and output devices, storage devices, and
the computer system unit.
Hardware
Hardware Software
Input devices
The primary purpose of input devices is to allow you to insert data and
to give commands to a computer. Data can be entered in various ways,
such as by clicking, keying in or scanning.
Keyboard
The keyboard is the main input device for keying-in data. There is no rule
that dictates the number of keys a keyboard should have; nevertheless,
almost every keyboard has 104 keys as the de facto standard. Some
models have a different number of keys, depending on the manufacturer.
Each key on a keyboard has various functions to perform and sends
different signals to the central processing unit. Certain keyboards use
images as alternatives to numbers, alphabets and symbols. For instance,
McDonald’s uses images like the Big Mac on its keyboards.
There are also enhanced keyboards which have extra keys such as
media or control keys that can open a Web browser, a search window
or electronic mail through a single keystroke.
Users can also interact with computers and tablets by using radio
frequency (RF), infrared (IR) or Bluetooth technology-enabled wireless
keyboards. These keyboards use radio or infrared-beam technology
to transfer data to a computer via a receiver that is plugged into the
computer.
Mouse
The second most essential input device apart from the keyboard is the
mouse, which falls under the category of pointing device. The mouse is
a handheld input device which is used to control a cursor displayed on
the computer screen. The cursor can be used to select and move icons
on a Graphical User Interface (GUI). It can also be used to select text,
files and folders displayed on a computer screen. For desktop Personal
Computers (PCs), a mouse is usually situated on a flat surface like a
mouse pad or desktop in front of the PC screen. The mouse uses a ball,
light or laser to track movement. Nowadays, smartphones and tablets
use a touch screen as their primary input device, and therefore your
finger acts like a mouse on these devices.
There are various types of computer mice and pointing devices. Today,
for a desktop computer the most common type of mouse is the optical
mouse, which connects to the computer’s USB port and is also known as
a USB mouse. The scroll mouse (Figure 2.5) has a wheel between the left
The most common type of pointing device for laptop computers is the
touchpad (Figure 2.6). It is also referred to as a glide pad, glide point
or pressure sensitive tablet. Instead of using an external mouse you
can use the touchpad. To operate the touchpad, you drag your finger
across the flat surface of the touchpad. The on-screen cursor will then
move in the same direction as your finger. Like a computer mouse, the
touchpad has two buttons which allow you to click on icons displayed
on a computer screen.
A type of computer mouse that allows users to control the mouse cursor
with their feet is the footmouse. The purpose of this technology is to
permit users to keep their hands on the keyboard and, at the same time,
use a mouse.
Joystick
Output devices
Once data is entered into a computer via an input device, computer users
then require devices to output processed information so that they can
use it, for example, in a presentation or for decision making. Information
can be presented in many ways, for instance, by displaying it, printing it
or emitting sounds. The most frequently used computer output devices
are display monitors and printers.
Monitor
Monitors (Figure 2.13) are also referred to as Video Display Units (VDUs).
They display video images to computer users. They have electronic
circuitry, a screen, buttons to adjust screen settings and a casing to hold
all the other components. The first computer monitors applied Cathode
Printer
Printers are output devices that can retrieve stored data from a computer
or other devices and generate a hard-copy of the data. They are frequently
used and can print text and images. There are two types of printers:
impact and non-impact printers.
Non-impact printers print without making contact with the paper; they do
not strike the paper. They are generally quieter and more efficient than
impact printers. Examples of non-impact printers are inkjet and laser
printers. Currently, the most common printers are inkjet and laser printers.
All-in-one or multifunction printers can print, fax and scan. They are
usually based on inkjet or laser printers.
Dot matrix printers or pin printers (Figure 2.16) use dots to create text
or images. The quality of the text or image is dependent on the number
of dots per inch (dpi) that the printer can place on paper. These printers
use print heads to strike an ink ribbon such that hundreds to thousands
of little dots are placed onto a piece of paper to create text and images.
They are now rarely used due to their lower quality printout compared
to inkjet and laser printers.
• Drum plotters (Figure 2.17) use a drum revolver to move the paper
during printing while the pen performs the printing.
• Flatbed plotters use an arm to move a pen over the paper rather
than making the paper move under the arm.
Thermal impact printers (Figure 2.18) use heated pins to burn text or
images onto heat-sensitive paper. Although such printers produce
low-resolution printouts, they print relatively fast and are inexpensive.
Braille display
Primary storage devices have lower access times and faster performance
because they hold data for short periods while your computer is
processing data. Examples of primary storage are Random Access
Memory (RAM) and cache memory.
Secondary storage devices are non-volatile devices which keep data until
it is removed or overwritten. They are about two orders of magnitude
cheaper than primary storage devices. Examples of secondary storage
are HDDs and SD cards.
Hard Disk Drives (HDDs) are non-volatile memory storage devices. They
store data permanently and allow computers to retrieve it whenever
needed. HDDs consist of one or more metal platters that are placed in
an air-sealed casing and magnetic heads to write data onto the platters.
Internal HDDs are located in a drive bay and connected to the computer’s
motherboard via ATA, SCSI or SATA cables (refer to the Glossary). They
are powered by the power supply unit (PSU) of the computer. They can
store data, pictures, videos, text documents and other files. Furthermore,
these drives store the OS and software programs which are executed on
Platter
Spindle
Actuator
Floppy Disk Drives (FDDs) fall under the category of magnetic storage
devices. In 1971, the first FDD was introduced. It was an 8-inch disk
drive (Figure 2.22). However, 5¼-inch FDDs were used in the first desktop
computers. They stored between 360 KB and 1.2 MB of data. They were
later replaced by 3½-inch FDDs that could store between 360 KB and
1.44 MB of data. Today, computers no longer use FDDs, due to their
limited capacity. This technology has largely been replaced by CD-R
(compact disk — recordable), DVD-R (digital versatile disk — recordable)
and flash drives.
The Blu-ray optical disk was first introduced at the Consumer Electronics
Show (CES) in 2006. It was jointly developed by consumer electronics
and computer companies, namely Dell, Hewlett-Packard, LG, Panasonic,
TDK and Hitachi. Blu-ray can store up to 25 GB of data on a single-
Fujio Masuoka invented the first flash memory in 1980 while working in
Toshiba. The first commercial flash memory was marketed in 1984. Flash
memory does not require constant power to hold data because it stores
data in integrated circuit memory chips, but it is slightly more expensive
than magnetic storage. It is now widely used in mobile phones, SSDs,
cameras and tablets.
Portable flash memory drives are referred to as pen drives, USB flash
drives, jump drives and thumb drives (Figure 2.24). These drives are
portable storage devices which use a USB port to connect to a computer.
They come in capacities ranging from 2 GB to 1 TB. Flash memory is
also used in memory cards and memory sticks.
Flash drive
Memory card
Memory stick
Activity 2.1
A. Enhanced keyboard
B. Ergonomic keyboard
C. Wireless keyboard
D. Standard keyboard
A. Trackball mouse
B. Scroll mouse
C. TrackPoint mouse
D. Standard mouse
A. OCR
B. Barcode reader
C. MICR
D. OMR
A. OCR
B. OMR
C. OICR
D. MICR
A. Line printer
B. Dot matrix
C. Inkjet printer
D. Daisy wheel
A. line
B. dot matrix
C. laser
D. plotter
A. RAM
B. Cache
C. SRAM
D. Hard disk drive
A. Blu-ray
B. Magneto-optic
C. Solid state drives
D. Digital versatile disk-recordable
Motherboard
Secondary storage
Stores data and programs
Processing
1 4
Fetch Store
Memory
Memory
RAM
RAM modules
The old Pentium and x86 computers used SIMM, as did certain
laser printers. SIMM consisted of a small circuit board which
held from 2 to over 32 RAM chips and sockets. It had an 8-bit
or 32-bit data path. However, SIMM is an old technology and
DIMM has replaced it.
DIMM
SODIMM
Cache memory
Data travels within a computer via an electrical path called the bus.
The role of the bus is to interface the CPU with memory and peripheral
devices. The types of bus that connect peripheral devices to the CPU
are called expansion buses. The various kinds of expansion buses are:
Figure 2.30 shows some of the common ports and connectors for desktop
computers.
5. Parallel port
6. USB port
Apart from the ones already mentioned, there are various other kinds of
ports, for example, HDMI port, monitor port, modem port, network port,
keyboard port, Infrared Data Association port and game port.
Data representation
A computer does not recognise regular characters, punctuation and
numbers; therefore, it requires a unique code to interpret them. A
computer sees text and images as numbers. For instance, the sentence
“I love WOU” is seen by a computer as a sequence of ones and zeros
(Table 2.3).
I 0100 1001
L 0110 1100
O 0110 1111
V 0111 0110
E 0110 0101
W 0101 0111
O 0110 1111
U 0101 0101
Table 2.3 Comparison of what a human sees and what a computer sees
Table 2.4 shows how the binary number system functions and compares
it to the base 10 (decimal) number system. For instance, the base 10
symbols are 0, 1, 2, 3, 4, 5, 6, 7, 8 and 9. Every number is called a digit;
this means that 10 is a two-digit number. To build two-digit numbers,
you need to use the numbers 10 – 99 and to create three-digit numbers
requires the numbers 100 – 999.
Binary numbers are made up of only two symbols: 0 and 1. From Table
2.3, you can see how base two (binary) numbers are created. For example,
the binary number 1012 is the same as the decimal number 510 (the
subscripts of these numbers show you which number system they are
from). The number 1012 is made up of three digits which when added up
results in the equivalent of the decimal number 5. The addition is carried
out in the following way: 1012 = 1 × 22 + 0 × 21 + 1 × 20 = 4 + 0 + 1 = 510.
A bit (binary digit) is the smallest unit of data in computing. It can only
have one of two values: 0 or 1. Computers can only recognise and use
0s or 1s. A byte is made up of eight bits. It is used by most computers
to represent one alphanumeric character. Half a byte is called a nibble.
Every character in the sentence “I love WOU” is represented by one
byte of data.
The terms “bit” and “byte” are now commonly used in our daily lives. For
example, modem data transfer rates are given in bits per second (bps).
You should be familiar with broadband service advertisements that offer
“100 Mbps” or “500 Mbps” data rates; the “M” here stands for Mega or
million. Data storage capacities of HDDs are given in bytes; for example,
there are 500 Gigabyte (GB) and 1 Terabyte (TB) HDDs in computers.
Character codes
Summary
Self-test 2.1
Feedback
Activity 2.1
1. B
2. A
3. C
4. B
5. C
6. D
7. B
8. D
9. A
10. C
Introduction
This section discusses system software and its various functions. The
computer booting (start up) process is also discussed in this section.
Since application software plays a significant role in our daily lives, a
brief discussion of such software is also provided.
System software
System software maintains and controls the operations of a computer
and its peripherals. The computer’s Operating System (OS) is part of
system software. Examples of system software are Microsoft Windows
and system utilities such as antivirus programs.
Functions of an OS
2. Managing applications
3. Managing memory
A cold boot occurs when you first switch on your computer. A warm boot
happens when you restart your computer that is already on — this is
vital especially after installing new software or if your computer suddenly
stops functioning. Once booting begins, the computer starts to copy
the kernel and other important parts of the OS from the HDD into RAM.
The parts of the OS that are loaded will remain in RAM as long as the
computer’s power is on.
The six steps in the booting process are shown in Figure 2.31.
2.
Power-on self-test (POST) is
3. completed
Operating system is
loaded 4.
System configuration is
accomplished
5.
System utilities are loaded
6.
User is authenticated
The moment you turn on your computer, electricity flows from the power
supply to the CPU and it starts to search for the BIOS. The BIOS is part
of system software and it is permanently stored in the ROM located on
the motherboard of your computer. The BIOS provides your computer
with the instructions required to receive input from input devices and to
send output to the monitor or printer. You can access the BIOS setup
program by pressing a key during the booting process. Some computers
display a message telling you which key to press to enter the BIOS setup
program (e.g., F1, F2, F10 or Del).
The POST is a sequence of tests carried out once the BIOS is loaded
into RAM. The purpose of this test is to ensure that the computer and its
associated peripherals are functioning correctly. The components that
are tested are the main memory (RAM), HDD, floppy disk drives (if any),
keyboard and mouse. During this test, a “beep” sound will be heard and
an error message will be displayed on the screen if an error or failure
is detected. If this happens, the computer will stop further execution.
One possible way to rectify this failure is to ensure that the components
mentioned above are connected properly.
Sometimes, the errors are severe and the computer may be unable to
display an error message; it may only emit “beep” sounds. If this happens,
it is time for you to get some expert technical support. Always write down
the number of beeps you heard and any error message you may have
seen on the screen before complete failure occurred. This information
will be useful to technical support personnel.
The moment the POST is completed successfully, the BIOS will start to
look for the OS. A setup program determines where the BIOS can find
the OS. Usually, the BIOS first searches the computer’s HDD to locate
the OS. Once it is found, the kernel of the OS will be loaded into RAM.
From that moment, the OS takes charge of the computer and starts to
load system configuration details. Although the system configuration
settings on the computer are set by default, you are allowed to modify
some of them.
In the Microsoft Windows OS, there is a database called the registry. The
registry stores a computer’s configuration details, such as settings for
installed software and peripherals. It also stores configuration choices
such as mouse and screen settings. The moment the kernel is loaded,
it inspects the system’s configuration to decide which utility programs
and drivers are required. For instance, if the driver for a peripheral device
is already installed on the system, it will load automatically when the
device is detected by the OS. However, if the drivers are missing, the
OS will prompt you to insert a disk or other storage device that contains
the driver or to supply the driver in another way (e.g., by downloading
it from the Web).
After the OS completes the system configuration process, it will load the
system utilities. The system utilities consist of programs like antivirus
software and speaker volume control.
Managing applications
When you start an application, the CPU loads the application from
secondary storage (usually the HDD) into RAM. Older OSs were single-
tasking, which meant that they could only run one application at a time.
To switch between applications, the application which was running had
to be stopped before a new application was started. Today, computers
use multitasking OSs which enable you to run multiple applications
simultaneously (Figure 2.33).
Excel
Managing memory
Word
Excel
Data
The OS receives “interrupt” signals from input and output devices which
inform it that some event has occurred; for instance, a document has
finished printing or a user has pressed a key on the keyboard. Each
interrupt signal from a device has a related interrupt handler (a block of
program code that is part of a device’s driver). Whenever an interrupt
occurs, the relevant interrupt handler will be executed immediately by
the OS to take the necessary action. Interrupt request (IRQ) lines handle
the interaction between devices and the CPU. Almost every PC has 16
IRQ lines numbered from 0 through 15. An IRQ conflict occurs if two
devices are configured to use the same IRQ but are not sharing the IRQ
line; this leads to system failure. The solution to this problem is to shut
down the computer and unplug the peripheral devices one after another
to determine which devices are causing the conflict.
Dialogue
box
OS utilities
Utility Description
Category Examples
Stand-alone OSs used by single DOS (Disk Operating System) for the
users original IBM PC.
Windows (3.x, 95, 98, 2000 Professional,
ME, XP, Vista, 7, 10), MAC OS X, Unix,
Linux
Server OSs used in client/server Windows (NT Server, 2000 Server, Server
network environments 2003, Server 2008), Unix, Linux, Novell
Netware, Solaris, Red Hat Enterprise
Server
Embedded OSs found on ROM Windows CE (variations are Windows
chips in portable or dedicated Mobile, Pocket PC), iOS, Palm OS,
devices BlackBerry OS, Embedded Linux,
Google Android, Symbian OS
Activity 2.2
Productivity programs
Category of
productivity Programs Developers Purposes
program
Word Pages, Apple, Corel, Format, create and
processing WordPerfect, Google, Microsoft produce reports
Documents, Word and documents
Spreadsheet Numbers, Quattro Apple, Corel, Insert and work
Pro, Spreadsheets, Google, Microsoft with figures by
Excel using formulas
Database FileMaker Pro, Apple, Corel, Administer and
Paradox, Access Microsoft link data among
correlated tables
to create queries,
forms and reports
Presentation Keynote, Slides, Apple, Google, Produce
PowerPoint Microsoft presentation slide
shows
2. Document
Internet-based software
These applications are specially designed for users based on their specific
needs. They often cost more than general-purpose applications because
of their development costs. Tailor-made or custom software is made
based on the explicit requirements of an individual or a business. For
example, if you are an engineer, you may hire a programmer to develop a
custom software programme for your simulation needs. Custom software
differs from packaged software such as Microsoft Office, which is usually
general-purpose.
Summary
Self-test 2.2
Feedback
Activity 2.2
Introduction
Mobile technology is more significant than ever before because many
people prefer to use their mobile phones than their laptops or PCs to
perform various tasks. Mobile technology enables people to access
the Internet through mobile devices no matter where they are. Mobile
devices are used for social media purposes and for electronic commerce
transactions. Mobile technology has also begun to replace television
and radio because it allows people to watch movies and listen to music
while they are travelling.
Figure 2.43 Martin Cooper with his 1973 prototype handheld mobile phone
in 2007
Source: Wikimedia Commons
This file is licensed under the Creative Commons Attribution-ShareAlike 3.0
Unported license.
The first mobile phone to have a touchscreen and also the first to have
feature apps was the IBM Simon Personal Communicator. It was released
in 1994 but its phone feature only worked in 15 American states.
In 1998, the first 3G networks were launched and in the following year,
the Wireless Application Protocol (WAP) was made available for mobile
devices. Blackberry’s business phone empire began in 2000 when the
Blackberry 857 that supported Web browsing and email was introduced.
The Samsung SCH-V200, released in 2000, had a built-in camera but
users had to plug it into a computer to see the photos it took; thus, it was
not a true camera phone. It is claimed that the world’s first true camera
phone was the Sharp J-SH04, which was first sold in 2000. However,
it was only available in Japan. The first camera phone available in the
US was the Sanyo SCP-5300 (in 2002). It allowed users to view photos
on-screen.
The Casio G’zOne (2005) was a chunky flip phone with a 1.3 megapixel
camera; it was the first waterproof phone. In 2005, Android Inc., the
company that created the Android mobile OS, was acquired by Google.
This was done to show that Google was serious about developing mobile
technology. While Google was busy with its Android, Apple was working
hard to launch its first smartphone, which had features such as a finger-
input touchscreen, no keyboard, an intuitive interface and apps. When
the Apple iPhone went on sale in 2007, it revolutionised the mobile phone
world (Figure 2.48). In the same year, Google released its Android OS for
free development and use.
The first Android phone, the T-Mobile G1 (also called the HTC Dream),
was introduced in 2008 but it had limited touchscreen capabilities and
included a slide-out keyboard (Figure 2.49). In the same year, the Apple
App Store was launched featuring 552 apps, 135 of which were available
for free. In 2009, the WhatsApp instant messaging service, which is
hugely popular now, was launched on the Apple App Store.
Motorola launched what was then the world’s thinnest (7.1mm thick)
mobile phone in 2011. In the same year, Samsung became the leading
smartphone vendor in the world. In 2012, five years after the original
iPhone went on sale, the iPhone 5 was released (Figure 2.50). The Candy
Crush game was launched on iOS in the same year. In 2013, Apple started
selling the iPhone 5S, which featured a fingerprint authentication sensor.
Apple also revamped its mobile OS with the release of iOS 7 in that year.
We have indeed come a long way since the introduction of the first
commercial mobile phone in 1983. A compressed summary of the evolution
of mobile phones (by year, model and manufacturers) is given in the
graphic below (adapted from: http://www.computersciencedegreehub.
com/cell-phone/).
Native apps
Smartphone apps are native mobile apps that are coded using the
Objective-C programming language for iOS or Java for Android. Such
apps perform faster, provide a high degree of reliability and are able to
access your phone’s address book and camera. Furthermore, users
are able to access certain native apps without an Internet connection
(offline). To develop this type of app is costly because it is dependent
on one type of OS. This forces companies that create such apps
to produce multiple versions to cater to the various OS platforms.
Nevertheless, most video games for mobile devices are native apps.
Native apps are installed from an app store such as Google Play or Apple
App Store.
Mobile web apps are actually websites which look like native applications.
However, the implementation of these apps is not the same as that of
native apps. Mobile web apps operate in a browser and are typically
written in HTML5, JavaScript and CSS (Cascading Style Sheets). You
can access these apps in the same way you access a Web page using a
URL (Uniform Resource Locator). You have the option of “installing” them
on your smartphone home screen as a bookmark. Mobile web apps can
Hybrid apps
Hybrid apps are a combination of native apps and web apps. These
apps are available in app stores and take advantage of mobile device
features. Hybrid apps are built using Web technologies such as HTML,
CSS and JavaScript. Companies often develop hybrid apps as a cover
for their Web page. This is a technique for obtaining a presence in an
app store without expending a lot of effort on developing a separate app.
The cross-platform development of hybrid apps reduces development
cost, and this makes hybrid apps popular. Developers can use tools
like PhoneGap and Sencha Touch to design and code across platforms
using HTML. Hybrid apps run in WebView (a simplfied browser) and
are able to access the camera, accelerometer and other devices on a
smartphone.
Native, mobile web and hybrid apps each have their strengths and
weaknesses and the choice to use which type of app will depend
almost entirely on business needs. The apps that provide greater
product experience on mobile devices are the native and hybrid apps.
Unfortunately, these apps are more expensive to develop than web
apps.
In this activity, you are required to search the Web for the following
and then to describe them:
Summary
3. The first mobile phone that featured a touch screen and apps
was the IBM Simon.
5. The first Android phone was called the G1 and it had limited
touchscreen capabilities.
Feedback
Activity 2.3
You are required to go to the following Web page to find out more
about the apps listed in this activity:
http://www.businessinsider.com/best-new-apps-updates-
march-2017-3/
Introduction
You use your computer to access services like banking, online shopping,
email and online chat. You do not want a third-party to access your
computer and use it to read your email, access your private information
or to attack someone else’s computer. For that reason, you must
understand and be aware of computer security. Computer security
involves procedures to prohibit and detect unauthorised access to your
computer. This section explains various types of computer security,
attacks and hackers. It also looks at methods to protect computers from
attacks.
There are several reasons why you should care about computer security.
We now depend on computers for almost everything including shopping,
investing, banking and communicating. The government, military,
hospitals and businesses compile and store an enormous amount of
confidential data on computers daily. All this data is transmitted across
networks to other computers. With the rising sophistication of computer
network attackers, we need constant vigilance to protect this data.
There are also intruders such as hackers, attackers or crackers who are
interested in gaining control of computers to attack other computers.
For instance, controlling and using your computer enables hackers to
hide their actual location when they launch their attacks.
1. Integrity
3. Availability
1. Network security
2. Software security
3. Physical security
2. Smurf attack
3. Man-in-the-middle attack
4. Packet sniffing
5. DNS hijacking
8. Dictionary attack
Besides the various types of attacks, there are also various kinds of
computer viruses. A computer virus is a piece of code or program which
is inserted into your computer without your knowledge and permission
to do something, usually malicious, when it executes. Viruses can also
1. Creeper virus
3. Virus hoax
4. Polymorphic virus
6. Stealth virus
Activity 2.4
There are many types of malware programs which can harm your
computer, such as worms, viruses and Trojans. List and explain
at least three recent Trojan programs by doing a Web search.
There are other methods and precautions which can be used to protect
your computer. For instance, many of us like to play computer games
which might not be legitimate copies and thus use game cracks and
keygens to install them. Be aware that game cracks and keygens can
contain Trojans. In addition, prevent your Web browser from running
programs like Word through email programs because Word and other
programs similar to it can run macros. Some macros can be viruses. Set
up your browser to open attachments in WordPad or Notepad instead.
Self-test 2.4
A. Active
B. Passive
C. Rootkit
D. Cracker
A. Denial-of-service
B. Smurf
C. Main-in-the-middle
D. Packet sniffing
A. Packet sniffing
B. Man-in-the-middle
C. DNS hijacking
D. Phishing
A. Virus
B. Worm
C. Trojan horse
D. Creeper
A. Virus hoax
B. Cluster virus
C. Stealth virus
D. Polymorphic virus
A. stealth
B. Creeper
C. boot sector
D. cluster
Feedback
Activity 2.4
You may list and explain any new Trojan programs based on your
Web search. The following are examples of Trojans:
Summary
Feedback
Self-test 2.1
Self-test 2.2
1. F
2. T
3. T
4. F
5. T
6. F
7. T
8. T
9. F
10. T
Self-test 2.4
1. B
2. D
3. A
4. B
6. C
7. B
8. D
9. A
10. B
Feedback
1. Functions of an OS:
MCS Test Equipment (2017) 1876 to 2015 — The History of the Mobile
Phone, https://mcs-testequipment.com/story/1876-to-2015-the-history-
of-the-mobile-phone/ (Accessed 14 Aug 2017).
COURSE COORDINATOR
Ms. Tan Cheng Peng
PRODUCTION
In-house Editor: Mr. Yeap Hock Aun
Graphic Designer: Ms. Audrey Yeong
Wawasan Open University is Malaysia’s first private not-for-profit tertiary institution dedicated to
adult learners. It is funded by the Wawasan Education Foundation, a tax-exempt entity established
by the Malaysian People’s Movement Party (Gerakan) and supported by the Yeap Chor Ee Charitable
and Endowment Trusts, other charities, corporations, members of the public and occasional grants
from the Government of Malaysia.
The course material development of the university is funded by Yeap Chor Ee Charitable and
Endowment Trusts.
All rights reserved. No part of this publication may be reproduced, stored in a retrieval system or
transmitted, in any form or by any means, electronic, mechanical, photocopying, recording or
otherwise, without prior written permission from WOU.