BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6...

136
BUSINESS ADMINISTRATION, MANAGEMENT & COMMERCIAL SCIENCES INFORMATION SYSTEMS 512 Year 1 Semester 2

Transcript of BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6...

Page 1: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

BUSINESS ADMINISTRATION, MANAGEMENT &

COMMERCIAL SCIENCES

INFORMATION SYSTEMS 512

Year 1 Semester 2

Page 2: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

2

Previously

LEARNER GUIDE

BUSINESS INFORMATION SYSTEMS 512 (2nd SEMESTER)

1: COMMUNICATIONS NETWORKS 2: THE INTERNET AND THE WORLD WIDE WEB 3: OPERATING

SYSTEMS AND SYSTEMS SOFTWARE 4: DATA MANAGEMENT AND DATABASES 5: INFORMATION

SYSTEMS 6: INFORMATION SYSTEMS DEVELOPMENT 7: PROGRAMME DEVELOPMENT AND

PROGRAMMING LANGUAGES 8: SECURITY PRIVACY AND ETHICS 9: MULTIMEDIA 10: ADDENDUM

FOR CASE STUDY

Page 3: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

3

SECTION

SUBJECT MATTER

1: COMMUNICATIONS NETWORK

1.1 DEFINING COMMUNICATION

LESSON1

1.2 COMPONENTS OF COMMUNICATION

1.3 TELECOMMUNICATION

1.4 DATA COMMUNICATION

1.5 USES OF COMMUNICATION TECHNOLOGIES

1.6 THE TELECOMMUNICATION SYSTEM MODEL

1.7 WIRELESS TRANSMISSION MEDIA TYPES

1.8 COMMUNICATION CHANNELS

1.9 TRANSMISSION MODES

1.10 DIRECTION OF TRANSMISSION

1.11 COMMUNICATION SOFTWARE

1.12 COMMUNICATION EQUIPMENT

LESSON2

1.13 COMMUNICATION NETWORKS

1.14 NETWORK CONFIGURATIONS

1.15 COMMUNICATION PROTOCOLS

2: THE INTERNET AND THE WORLD WIDE WEB

2.1 HISTORY OF THE INTERNET

LESSON3

2.2 EXPLORING THE INTERNET

2.3 HOW THE INTERNET WORKS

2.4 HOW A WEB PAGE WORKS

2.5 WEB BROWSER SOFTWARE

2.6 MULTIMEDIA ON THE WEB

2.7 SEARCH ENGINES

2.8 INTRANETS AND FIREWALLS

LESSON4

2.9 OTHER INTERNET SERVICES

2.10 NETWORK COMPUTERS FOR BUSINESS

2.11 CONNECTING TO THE INTERNET AND THE WORLD WIDE WEB

2.12 DOING BUSINESS ON THE WORLD WIDE WEB

3: OPERATING SYSTEMS AND SYSTEMS SOFTWARE

3.1 SYSTEMS SOFTWARE

LESSON5 3.2 OPERATING SYSTEMS

Page 4: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

4

3.3 POPULAR OPERATING SYSTEMS

3.4 UTILITIES SOFTWARE

4: DATA MANAGEMENT AND DATABASES

4.1 DATA MANAGEMENT LESSON6

4.2 THE HIERARCHY OF DATA

4.3 TYPES OF FILE ORGANISATION

4.4 DATA FILE MAINTENANCE

4.5 DATABASES

4.6 DATABASE MODELS

LESSON7

4.7 DATABASE MANAGEMENT SYSTEMS

4.8 DATABASE ADMISSION

4.9 GUIDELINES FOR DESIGNING DATABASE FILES

4.10 WORK: DATA WAREHOUSE AND DATA MINING

5: INFORMATION SYSTEMS

5.1 IMPORTANCE OF INFORMATION TO AN ORGANISATION

LESSON8

5.2 LEVELS OF MANAGEMENT

5.3 FUNCTIONAL AREAS IN AN ORGANISATION

5.4 QUALITIES OF VALUABLE INFORMATION

5.5 TYPES OF INFORMATION SYSTEMS

5.6

THE ROLE OF PERSONAL COMPUTERS IN INFORMATION

SYSTEMS

5.7 THE CYBER CORPORATION

6: INFORMATION SYSTEMS DEVELOPMENT

6.1 EXPLORING THE SYSTEM DEVELOPMENT LIFE CYCLE

LETCURE 9

6.2 GUIDELINES FOR SYSTEMS DEVELOPMENT

6.3 PARTICIPANTS IN THE SYSTEM DEVELOPMENT LIFE CYCLE

6.4 PROJECT MANAGEMENT

6.5 FEASIBILITY ASSESSMENT

6.6 DATA AND INFORMATION GATHERING TECHNIQUES

6.7 INITIATING FACTORS OF THE SYSTEM DEVELOPMENT LIFE CYCLE

6.8 PLANNING PHASE

LESSON10 6.9 THE ANALYSIS PHASE

6.10 DESIGN PHASE

6.11 THE IMPLEMENTATION PHASE

Page 5: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

5

6.12 SUPPORT PHASE

7: PROGRAMME DEVELOPMENT AND PROGRAMMING LANGUAGES

7.1 DEFINING A COMPUTER PROGRAM

LESSON11

7.2 THE PROGRAM DEVELOPMENT LIFE CYCLE

7.3 INITIATION FACTORS OF THE PROGRAM DEVELOPMENT LIFE CYCLES

7.4 DEFINING A PROGRAM LANGUAGE

7.5 OBJECT-ORIENTED PROGRAM DEVELOPMENT

7.6 POPULAR PROGRAMMING LANGUAGES

7.7 HOW TO SELECT A PROGRAMMING LANGUAGE

7.8 PROGRAM DEVELOPMENT TOOLS

7.9 APPLICATION GENERATORS (PROGRAM GENERATORS)

LESSON12

7.10 MACROS

7.11 RAD TOOLS: VISUAL BASIC, DELPHI, AND POWERBUILDER

7.12 HTML

7.13 SCRIPTS, APPLETS, AND SERVLETS

7.14 JAVA AND PERL

8: SECRUITY PRIVACY AND ETHICS

8.1 COMPUTER SECURITY: RISKS AND SAFEGUARDS

LESSON13

8.2 COMPUTER VIRUSES

8.3 VIRUS DETECTION AND REMOVAL

8.4 UNAUTHORISED ACCESS AND USE

8.5 WHAT DO YOU UNDERSTAND BY IDENTIFICATION AND AUTHENTICATION?

8.6 DEVELOPING A COMPUTER SECURITY PLAN

8.7 INFORMATION PRIVACY

LESSON14 8.8 ETHICS AND THE INFORMATION AGE

8.9 INTERNET SECURITY AND PRIVACY ISSUES

8.10 INTERNET ENCRYPTION

8.11 OBJECTIONABLE MATERIALS ON THE INTERNET

9: MULTIMEDIA

9.1 DEFINING MULTIMEDIA

LESSON15 9.2 MULTIMEDIA APPLICATIONS

9.3 ELECTRONIC MARKETING AND SALES

10: ADDENDUM 512 (A): CASE STUDYS LESSON16

Page 6: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

6

INTERACTIVE ICONS USED IN THIS LEARNER GUIDE

Learning

Outcomes

Study

Read

Writing

Activity

Think Point

Research

Glossary

Key Point

Review

Questions

Case Study

Bright Idea

Problem(s)

Multimedia

Resource

Web

Resource

Page 7: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

7

___________________________________________________________

1. COMMUNICATIONS NETWORKS

____________________________________________________________

Page 8: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

8

Learning Outcomes

1. Discuss the components required for a successful communication 2. Define telecommunication and data communication 3. Describe uses of computer communication technologies 4. Identify various physical and wireless transmission media 5. Discuss different communication equipment 6. Discuss communication networks, configurations and

communication protocols

1.1 DEFINING COMMUNICATION

Communication refers to a process whereby a signal is transmitted from a sender

to a receiver through a Communication medium . The signal contains a message

composed of data and information. This signal will go through the communication

med ium from the sender to the receiver. A Communication medium Is anything that

carries the signal between the sender and the receiver for example, when people

are talking to each other air becomes the communication or transmission medium.

Illustration of communication model

Transmission medium

E.g. cable

1.2 COMPONENTS OF COMMUNICATION

The components of communications can easily be recognised if we consider human

communication. When we talk to one another face to face, we send messages to

each other. A person who speaks at a particular time becomes the sender of the

message and the one l istening is the receiver of the same message. The transmission

medium between these two entities is the air that carries the message from the

sender to the receiver. Hence in human communication we can identify three basic

communication components namely: The sender, the receiver and air.

Sender

Receiver

Signal

ON

E |

CO

MM

UN

ICA

TIO

NS

NET

WO

RK

Page 9: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

9

NB:For communication to be effective, both the sender and the receiver must

understand the signal and must agree on the ways they are to be interpreted. For

example if the sender speaks in a language that the receiver does not understand,

effective communication will not take place. All of the above represents an ordinary

communication that can occur between two or more people, but we are more

interested in an aspect of communication called Telecommunication.

1.3 TELECOMMUNICATION

Telecommunication refers to the electronic transmission of signals from the sending

unit to the receiving unit through a telecommunication medium.

Telecommunication has the potential to create profound changes in business

because it lessens the barriers of time and distance. Telecommunication may change

not only the way business operates, but may alter the nature of commerce itself.

This is possible because as networks are connected with one another and

information is transmitted more freely, a competitive market-place will make

excellent quality and services imperative for success. However, there is a subset of

telecommunication that is of great importance to our study of this called Data

communication.

1.4 DATA COMMUNICATION

Data communication is a specialized subset of telecommunication that refers to the

electronic collection, processing and distribution of data between computer systems

hardware devices. It is very important to note at this stage that to a certain degree,

Data communication is accomplished through the use of telecommunication

technology.

1.4.1 The Telecommunication System Model

For a successful telecommunication system, the following components are very

essential to note:

i) A sending unit: A sending unit is a device that originates the message to be sent.

Such a device could be a computer or a terminal ii) A Telecommunication device: A

telecommunication device is a hardware component that allows electronic

communication to occur more efficiently. This device performs a number functions

which include converting the signal from one type to another. An example could be

a modem iii) A Telecommunication medium: A telecommunication medium is

anything that carries an electronic signal and interfaces between a sending device

and a receiving device. An example could be a network cable between a computer

and a network point IV) a receiving unit: A receiving unit is a device that receives the message/signal. An

example could another computer

ON

E

| C

OM

MU

NIC

ATI

ON

S N

ETW

OR

K

Page 10: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

10

1.5 USES OF COMMUNICATION TECHNOLOGIES

1.5.1 Electronic Mail (E-mail)

This is the transmission of messages and files via a computer network. Today it is used

as one of the primary methods of communication for business and personal needs. By

using an e-mail program you can create, send, receive, forward, store and print

messages. Popular e-mail programs include Microsoft Outlook and Lotus Notes. In

order to use an e-mail program you must have an e-mail address, which is made up of

a username and a domain name.

E.g. [email protected]

Username Domain Name

When you receive e-mail your message is stored in a mailbox, which is the actual

storage space for your messages.

1.5.2 Voice Mail

Voice mail functions like an answering machine by allowing callers to leave a voice

message for the receiving party. Unlike an answering though a computer voice-mail

system converts the analogue voice to a digital form so that it can be stored in a voice

mailbox.

1.5.3 Facsimile (Fax)

A fax machine is a device that sends and receives documents through the use of

telephone lines. The fax document can contain handwritten or typed text,

illustrations, graphics and photographs. Today, many people are moving towards

using their computer as a fax machine simply by installing a fax modem. Faxes can

then be stored in an electronic format and printed to hardcopy when needed.

1.5.4 Telecommuting

This is a work arrangement in which employees work away from the office but

communicate with the workplace using some sort of communication technology. The

user at home can connect to the network at the office using his personal computer

which would be configured with specific hardware and software needed for

telecommuting. Once connected to the network the user will be able to use its

resources as if he were at the office. Advantages of telecommuting:

• Reduces the time taken to travel to the office

• Eliminates the need to travel to work in unsafe weather conditions

• Provides for as convenient and comfortable work environment for disabled employees or workers

recovering from illness or injury

ON

E

| C

OM

MU

NIC

ATI

ON

S N

ETW

OR

K

Page 11: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

11

• Employees can combine personal responsibilities and work, like child care for an

example

1.5.5 Videoconferencing

This technology involves using video and computer technology to conduct a meeting

between 2 or more people in separate geographical locations. Video conferencing can

be used for technical support, job interviews, distance learning and telecommuting.

It requires the use of computers with microphones, speakers, video cameras and

communication devices. The voice and images can be transmitted across ordinary

telephone lines and therefore the Internet is used as the communication channel.

1.5.6 GroupWare

GroupWare is a software application that helps groups of people work together on

projects and share information over a network. GroupWare is a component of a broad

concept called workgroup computing, which include network hardware and software

that enables group members to communicate manage projects, schedule meetings

and make group decisions. To assist with these activities most groupware have

Personal Information Manager (PIM) functions, which include electronic appointment

calendar, appointment book, address book and a notepad.

1.5.7 Electronic Data Interchange (EDI)

This is an inter-company application to application communication of data in standard

format permitting the recipient to perform a standard business transaction and the

transmission of business documents or data over communications media. Many

companies use EDI to transmit routine documents such as invoices, purchase orders

or shipping information.

1.5.8 Global Positioning System (GPS)

A GPS consists of one or more earth-based receivers that accept and analyze signals

sent by satellites in order to determine the receiver’s geographic location. It is often

used to locate a person or an object, ascertain the best route between two points,

monitor movement of the person or object and even create maps. GPS’s are used

confidently by scientists, farmers, pilots, and rescue workers and even for travel and

recreational activities. Major car manufacturers are including GPS systems in their

motorcars to be used as navigation systems.

1.5.9 Bulletin Board Systems (BBS)

An electronic BBS is a computer that maintains a centralised collection of electronic

messages. You access a BBS by using your computer to connect to the main BBS

computer. Once connected you can add or delete messages, read existing messages

or upload and download software.

1.5.10 Online Services

It is defined as an organisation that has a permanent connection to the Internet and provides temporary

connections to individuals and companies for a fee. Like an ISP, an online service provides Internet access,

ON

E

| C

OM

MU

NIC

ATI

ON

S N

ETW

OR

K

Page 12: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

12

but such online services also have a members-only feature that offer a variety of special content and

services including

news, weather, legal information, financial data, hardware and software guides and travel guides. For this

reason online service fees are slightly higher than those of an ISP. Online services like The Microsoft

Network (MSN) have thousands of POPs all over the world and large customer and technical support.

Page 13: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

13

Materials to send communications signals

1.5.11 The Internet

The Internet is a worldwide collection of networks that links together millions of

businesses, government offices, educational institutions and private individuals

through the use of modems, telephone lines, satellites and other communications

devices and media. Most users connect to the Internet through an Internet Service

Provider (ISP) or an online service. The Internet runs on the TCP/IP protocol, which

was originally developed for Unix computers, but today all computers logging on to

the Internet use it efficiently.

1.6 THE TELECOMMUNICATION SYSTEM MODEL

As we have already indicated in Lesson unit 1 that the communication system model

consists of the following:

• A sending device that originates the signal

• A communic ation device that converts the data into a form that can be carried

through the communication channel

• A communication channel or path over which data are sent

• A communication device that receives the data and converts into a form that is

understood by the receiving device

• A receiving device that accepts the data.

Let us now examine these components individually.

1.6.1 Transmission Media

Transmission media are the devices that are capable of carrying electronic signals and

interfaces between a sending device and a receiving device. These media are available

in 2 types:

• Physical transmission media – Use wire, cable or other tangible (tou chable)

ON

E

| C

OM

MU

NIC

ATI

ON

S N

ETW

OR

K

Page 14: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

14

• Wireless transmission media – send communication signals through the air or space

using radio, microwave and infrared signals.

1.6.2 Types Of Transmission Media

Twisted pair cabling consists of pairs of twisted wires. A typical cable consists of two

or more twisted pairs of wire, usually copper. Proper twisting of the wire keeps the

signal from “bleeding” into the next pair and thereby creating electrical interference.

Because these twisted pair wires are insulated, they can be placed closed together

and packed into one group.

There are two types of twisted-pair wire cables: shielded and unshielded. Shielded

twisted-pair (STP) wire cables have a special conducting layer within the normal

insulation. This conducting layer makes the cable less prone to electric interference

or “noise”. Unshielded twisted-pair (UTP) wire cables do not have this special

insulation shield. These types of cables have historically been used for telephone

services and to connect computer systems and devices.

b) Coaxial Cable

Coaxial cable, or coax, is an electrical cable with an inner conductor surrounded by

a flexible, tubular insulating layer, surrounded by a tubular conducting shield. The

term coaxial comes from the inner conductor and the outer shield sharing the same

geometric axis. Coaxial cable was invented by English engineer and mathematician

Oliver Heaviside, who first patented the design in 1880. Coaxial cable is used as a

transmission line for radio frequency signals, in applications such as connecting radio

transmitters and receivers with their antennas, computer network (Internet)

connections, and distributing cable television signals. One advantage of coax over

other types of transmission line is that in an ideal coaxial cable the electromagnetic

field carrying the signal exists only in the space between the inner and outer

conductors. This allows coaxial cable runs to be installed next to metal objects such

as gutters without the power losses that occur in other transmission lines, and

provides protection of the signal from external electromagnetic interference. Coaxial cable differs from

other shielded cable used for carrying lower frequency signals such as audio signals, in that the dimensions

of the cable are controlled to produce a repeatable and predictable conductor spacing needed to function

efficiently as a radio frequency transmission line.

a) Twisted Pair Cable

ON

E

| C

OM

MU

NIC

ATI

ON

S N

ETW

OR

K

Page 15: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

15

Coaxial cable consists of a single copper wire surrounded by three layers:

a) An insulating material

b) A woven or braided metal

c) A plastic outer coating

Cable television wiring often uses coaxial cable because it can be cabled over longer

distances than twisted pair cable. Coaxial cable is more heavily insulated than twisted

pair, thus it is less susceptible to noise.

c) Fibre Optic Cable

The core of fibre optic cable consists of dozens or hundreds of thin strands of glass or

Plastic that use light to transmit signals. Fiber - Optic communication is a method of

Transmitting information from one place to another by sending pu lses of light through

An optical fiber. The light forms an electromagnetic carrier wave that is modulated to

Carry information. First developed in the 1970s, fiber - Optic communication systems

Have revolutionized the telecommunications industry and have pla yed a major role

In the advent of the Information Age. Because of its advantages over electrical

Transmission, optical fibers have largely replaced copper wire communications in core

Networks in the developed world.

ON

E

| C

OM

MU

NIC

ATI

ON

S N

ETW

OR

K

Page 16: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

16

The process of communicating using fibre-optics involves the following basic steps:

Creating the optical signal involving the use of a transmitter, relaying the signal along

the fibre, ensuring that the signal does not become too distorted or weak, receiving

the optical signal, and converting it into an electrical signal.

Fibre optic cable has many advantages over coaxial or twisted pair cable, such as:

• Capable of carrying significantly more signals than wire cables

• Faster data transmission

• Less susceptible to noise (interference)

• Smaller in size as the cables are thin and light

However there are a few of disadvantages as well:

• Fibre optic costs are much higher than that of twisted pair or coaxial

• It is relatively difficult to install

1.7 WIRELESS TRANSMISSION MEDIA TYPES

a) Microwaves Transmission

This involves the sending and receiving of microwave signals over a microwave link.

This microwave link is made up of a string of microwave radio antennas located at the

top of towers at various microwave sites. Microwave transmission is considered a

'Line of Site' technology. This is because the proper functioning of microwave

transmission requires that the airspace between two microwave towers in clear of

mountains, buildings, and other objects that could possibly block signals from being

intercepted by the towers. Microwave transmission is limited by this need for a clear

line of sight, in addition to being susceptible to attenuation by the atmosphere.

For these reasons, microwave transmission

is only widely used in areas inaccessible by

LAN or other transport methods. Microwave

Equipment can be used to transmit both analog and digital microwave signals.

Analog microwave transmission is often a more cost-effective solution for

microwave site operators because it doesn’t require the purchase of any new

equipment, or training staff on new transport systems. An additional benefit of

familiar analog microwave transmission is that your operators know its exact

transport capacity.

Users of digital microwave transmission find it easier to obtain support and

Equipment for their systems, because digital transmission is the newest, most

advanced form of microwave communication. Digital microwave transmission

methods can support more verbose protocols, enabling increased data exchange

ON

E

| C

OM

MU

NIC

ATI

ON

S N

ETW

OR

K

Page 17: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

17

along the microwave network. The increased speeds will also provide faster

microwave system polls.

b) Broadcast Radio

Broadcast Radio is a wireless transmission medium that distributes radio signals

through the air over a long distance such as cities, regions and countries and short

distances such as within an office or home. For radio transmissions, one needs a

transmitter to send the broadcast radio signal and a receiver to accept it. To receive

this signal, the receiver has an antenna that is located in the range of the signal.

c) Cellular Transmission

This is when local area such as a city is divided into cells, such that if a car/vehicle with

a cellular device such as a phone moves from one cell to another the cellular system

passes the connection from one cell to another.

d) Infrared Transmission

This sends transmissions through the air via light waves; it requires a line-of-sight

transmission and a short distance. This can be used to allow handheld devices to

transmit data and information to larger computers in the same room. (e.g. connecting

printers, mouse, scanners, etc)

1.8 COMMUNICATION CHANNELS

A communication channel is the path that the signal will follow in a communication

system. The most important aspect of any communication channel is Bandwidth which

is a critical parameter of any communications system; bandwidth characterizes its

information-carrying capacity. Access to the Internet, for example, is much faster via

a broadband than a dial-up connection. This is mainly because a broadband connection

uses higher frequencies to convey digital data. In general, bandwidth is defined in

terms of the range of frequencies that can be carried by a communication channel.

Widening the bandwidth means increasing the frequency range, thereby enabling

more information to be delivered through that channel. The wider the bandwidth the

more data and information the channel can transmit.

1.8.1Types of Signal

There are 2 types of signals that can be used depending on the types of devices that

you are using. They are digital and analog.

a) Digital

Digital signals consist of patterns of bits of information. These patterns can be

generated in many ways, each producing a specific code. Modern digital computers

store and process all kinds of information as binary patterns. All the pictures, text. Sound and video stored

in this computer are held and manipulated as patterns of binary values. The main advantage of digital

signals over analogue signals is that the precise signal level of the digital signal is not vital.

ON

E

| C

OM

MU

NIC

ATI

ON

S

NET

WO

RK

Page 18: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

18

This means that digital signals are fairly immune to the imperfections of real

Electronic systems which tend to spoil analogue signals. As a result, digital CD's are

Much more robust than analogue LP's.

Codes are often used in the transmis sion of information. These codes can be used

Either as a means of keeping the information secret or as a means of breaking the

Information into pieces that are manageable by the technology used to transmit the

Code, e.g. The letters and numbers to be sent by a Morse code are coded into dots

And dashes. Computers process data as digital signals, which are individual electrical

Pulses that represent the bits grouped together into bytes.

b) Analog

An Analogy or analogue signal is any continuous signal for which the time varying

feature (variable) of the signal is a representation of some other time varying

quantity, i.e., analogous to another time varying signal. It differs from a digital signal

in terms of small fluctuations i n the signal which are meaningful. Analogy is usually

thought of in an electrical context; however, mechanical, pneumatic, hydraulic, and

other systems may also convey analogue signals.

An analogue signal uses some property of the medium to convey the s ignal's

information. For example, an aneroid barometer uses rotary position as the signal

to convey pressure information. Electrically, the property most commonly used is

voltage followed closely by frequency, current, and charge.

Any information may be conveyed by an analogue signal; often such a signal is a

measured response to changes in physical phenomena, such as sound, light,

temperature, position, or pressure, and is achieved using a transducer.

ON

E

| CO

MM

UN

ICA

TIO

NS

NET

WO

RK

Page 19: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

19

For example, in sound recording, fluctuations in air pressure (that is to say, sound)

strike the diaphragm of a microphone which induces corresponding fluctuations in the

current produced by a coil in an electromagnetic microphone, or the voltage produced

by a condenser microphone. The voltage or the current is said to be an "analogue" of

the sound.

An analogue signal has a theoretically infinite resolution. In practice an analogue

signal is subject to noise and a finite slew rate. Therefore, both analogue and digital

systems are subject to limitations in resolution and bandwidth. As analogue systems

become more complex, effects such as non-linearity and noise ultimately degrade

analogue resolution to such an extent that the performance of digital systems may

surpass it. Similarly, as digital systems become more complex, errors can occur in the

digital data stream. A comparable performing digital system is more complex and

requires more bandwidth than its analogue counterpart. In analog systems, it is

difficult to detect when such degradation occurs. However, in digital systems,

degradation can not only be detected but corrected as well.

1.8.2 Advantages

The main advantage is the fine definition of the analog signal which has the potential

for an infinite amount of signal resolution. Compared to digital signals, analog signals

are of higher density.

Another advantage with analog signals is that their processing may be achieved more

simply than with the digital equivalent. An analog signal may be processed directly by

analog components, though some processes aren't available except in digital form.

1.8.3 Disadvantages

The primary disadvantage of analog signalling is that any system has noise – i.e.,

random unwanted variation. As the signal is copied and re-copied, or transmitted over

long distances, these apparently random variations become dominant. Electrically,

these losses can be diminished by shielding, good connections, and several cable types

such as coaxial or twisted pair.

The effects of noise create signal loss and distortion. This is impossible to recover,

since amplifying the signal to recover attenuated parts of the signal amplifies the noise

(distortion/interference) as well. Even if the resolution of an analog signal is higher

than a comparable digital signal, the difference can be overshadowed by the noise in

the signal. Most of the analog systems also suffer from generation loss.

1.8.4 Modulation

Another method of conveying an analog signal is to use modulation. In this, some base

signal (e.g., a sinusoidal carrier wave) has one of its properties modulated: amplitude modulation involves

altering the amplitude of a sinusoidal voltage waveform by the source information, frequency modulation

changes the frequency. Other techniques, such as changing the phase of the base signal also work.

ON

E

| C

OM

MU

NIC

ATI

ON

S N

ETW

OR

K

Page 20: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

20

Analog circuits do not involve quantization of information into digital format. The

concept being measured over the circuit, whether sound, light, pressure,

temperature, or an exceeded limit, remains from end to end.

1.9TRANSMISSION MODES

When 2 devices exchange data, the data flows between the devices as a continuous

stream of bits. As the bits flow between the sending and receiving devices, these

devices extract bytes from the bit stream. Two basic transmission techniques are used

to separate the groups of bits:

a) Asynchronous Transmission

This is the communication in which the receiver gets the message in minutes, hours

or days after it is sent e.g. posting a letter or sending an e-mail over the internet.

Transmissions are not synchronized – that is, transmission does not occur at

predetermined or regular intervals such as when you enter data. A sending device

thus can transmit bytes at any time, and the receiving device must be ready to accept

them as they arrive. To help the receiving device identify each byte, a start and stop

bit marks the beginning and end of a byte. An additional parity bitis sometimes

included at the end of each byte to allow for error checking. It usually involves

communication where data can be transmitted intermittently and not a steady stream

thus transmission can be slow.

b) Synchronous Transmission

This is the communication in which the receiver gets the message instantaneously.

E.g. voice and phone communication. This involves sending large blocks of bytes at

regular intervals without any start and stop signals. It does require that the sending

and receiving devices be synchronized before any bytes are transmitted. Timing

signals synchronize the sending and receiving devices thus eliminating the need for

start and stop bits for byte. Synchronous transmission requires more sophisticated

and expensive communication devices than asynchronous transmission but it

provides much higher speeds and greater accuracy.

1.10 DIRECTION OF TRANSMISSION

The direction in which data flows along transmission media is classified in one of

three types:

a) Simplex Transmission

Data flows only in one direction – from the sending to the receiving device. It is only used when the sending

device does not require a response from the receiving device. Used for security systems and fire alarms.

ON

E

| C

OM

MU

NIC

ATI

ON

S N

ETW

OR

K

Page 21: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

21

b) Half Duplex Transmission

Data can flow in either direction - from sender to receiver and back - but only in one

direction at a time. Commonly used in Citizens Band (CB) radio where communication

can only take place in one direction at a time.

c) Full Duplex Transmission

Data can flow in both directions at the same time. A regular phone line makes use of

this technology where both parties can speak at the same time. It is used for

applications with intensive computing requirements or those with heavy traffic.

d) Transmission Rate

The speed with which a transmission medium carries data is its transfer rate. Transfer

rate usually is expressed in bits per second (bps) – that is the number of bits that can

be transmitted in one second. The transfer rate of a transmission medium depends

on the medium’s bandwidth and its speed. Bandwidth is the range of frequencies that

a transmission medium can carry in a given period of time.

1.11 COMMUNICATION SOFTWARE

This is software that provides a number of important functions in a network, such as

error checking, data security, and message formatting. The software also indicates

what is wrong and provides suggestions on possible solutions.

The basic communication model includes communication software, which consists of

programs that manage the transmission of data, instructions and information

between computers. For 2 computers to communicate, they must have compatible

communications software.

Communication software helps you establish a connection to another computer and

manage the transmission of data between computers. It resides in the main memory

of the 2 computers while the connection is established. The software usually includes

the following features: dialing, file transfer, terminal emulation, and Internet access.

These are any kind of hardware devices capable of transmitting data, instructions and

information between a sending device and a receiving device.

1.12 COMMUNICATION EQUIPMENT

These are any kind of hardware devices capable of transmitting data, instructions and

information between sending device and receiving device.

ON

E

| C

OM

MU

NIC

ATI

ON

S N

ETW

OR

K

Page 22: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

22

1.12.1 Modem

The word modem is derived from a combination of the words, modulate (to change

an analog signal) and demodulate (to convert an analog signal to digital). Both the

sending and the receiving computers require a modem to communicate. Computers

use digital signals so modems are needed to convert those signals to analog so that

they can be transmitted over telephone lines. When the signals reach the receiving

computer that modem must convert the signal back to digital so the computer can

understand it.

A modem can be an external or internal device. External modems connect to the serial

port on the back of the computer whilst an expansion slot connects internal modems.

1.12.2 Multiplexes

A multiplexer (MUX) is a device that combines the signal of two more input signals

from various devices into a single stream of data and then transmits it over a single

medium. By combining the separate data streams into one, a multiplexer increases

the efficiency of communication and reduces the need for, and cost of, using separate

transmission medium. Both the sending and receiving devices need a multiplexer.

1.12.3 Network Interface Cards (NIC)

It is an expansion card that fits the expansion slot on your computer. NIC’s are

sometimes referred to as LAN Adapter. A NIC coordinates the transmission and

receipt of data, instruction to and from the devices containing the NIC. There is an

attachment point on a network card that allows you to connect to different

transmission medium such as twisted pair, coaxial or fibre optic or infrared. A network

interface card is designed to work with different protocols such as Ethernet or Token

Ring.

1.12.4 Hubs

A hub is a central point of connectivity for network cables in a star topology. They are

sometimes referred as a concentrator or multistation access unit (MAU). Hubs usually

contain ports for 8 to 24 computers and other devices.

1.12.5 Gateways

It is a combination of hardware and software that connects networks that use

different protocols. For example, connecting a network of Windows computers with

a network of Apple Macintosh computers. Gateways are also used between e-mail

systems so that users on different e-mail systems can exchange messages.

1.12.6 Bridges

A bridge is a device that connects two LANs using the same protocol, such as Ethernet.

Sometimes it is more efficient to use a bridge to connect 2 LANs rather than combine them into 1 big LAN.

To use a bridge the transmission media of the LANs does not have to be the same. One LAN can use coaxial

cable whilst one LAN can have UTP cable.

ON

E

| CO

MM

UN

ICA

TIO

NS

NET

WO

RK

Page 23: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

23

1.12.7 Routers

A router is a device that connects multiple networks – including those using different protocol. It is an

intelligent communications device that sends (routes) communication traffic to the appropriate network

using the fastest available path. In case of network failure routers can calculate alternate routes to send

the data. Routers are widely used on the Internet to reliably send data, information and instruction to the

correct destination.

1.12.8 3G Data Cards

3G technology refers to the third generation in wireless digital network standards. It is an upgrade to

previous 2G networks, providing faster download speeds and greater reliability. It offers greater security

and a wider range of application as well, such as streaming TV and video conferencing. A 3G data card is

a wireless card that can be inserted into a lap top or desk top computer to allow it high-speed access to

the Internet from any location near a 3G tower.

The primary benefit of a 3G data card is its transportability. Location does not limit

Users—no wireless hot spots are required to connect to the Internet. It also frees the user of bulky

equipment, such as Ethernet cables, that must physically plug into modems. 3g data cards wirelessly

access the 3G broadband networks established by carriers through interconnecting cellular towers. These

towers transmit Internet data across electromagnetic wavelengths, known as spectrum, between devices.

Page 24: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

24

Users can download information, check e - mail, visit Web sites, and watch television

on their lap tops while riding in a car, sitting in an airport, or spending the day on a

boat. These cards may be especially useful for people who don't have traditional

cable or DS L nternet service at their homes, but can receive cellular service from I

nearby towers.

Most wireless carriers sell a 3G data card; the speed and reliability generally will vary

based on each carrier’s network. Most wireless carriers offer different types of 3G

cards, often referring to them as 3G PC cards, air cards, and e 3 G mobil c ards. These

cards may inte rface differently with the computer. For example, some may require a

PC card slot, while others may use a USB port. The wireless access the cards provide

also typically requires the purchase of a digital data plan as well. Most wireless

carriers offer plan s for their 3G data cards that provide tiered levels of data

downloading or, generally for a higher price, unlimited Internet access.

1.13 COMMUNICATION NETWORKS

1.13.1 Local Area Network (LAN)

This is a network that connects computers in a limited geographical area, such as

business office or floor of a building. A LAN consists of a communications channel,

networked computers and a network interface card and an operating system to

support networ king features. LANs provide high - speed reliable connections, which

range from 10 Mbps to 2 Gbps.

1.13.2 Wide Area Network (WAN)

A Wide Area Network is a network that covers a large geographical area such as a

city, country or continent using a c communication’s channel that includes telephone

lines, microwaves and satellites. Today WANs are made up of multiple LANs

connected by routers that ensure reliable delivery of data and information. These

computers connect via a public network such as the tel ephone lines or by dedicated

lines or satellite. The Internet is the world’s largest wide area network.

ON

E

| C

OM

MU

N IC

ATI

ON

S N

ETW

OR

K

Page 25: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

25

1.14 NETWORK CONFIGURATIONS

1.14.1 Star Topology

In the star network all the devices in the

network connect to a central device,

thus forming a star Also known as a star

network, a star topology is one of the

most common network setups where

each of the devices and computers on a

network connect to a cen tral hu b . A

major disadvantage of this type of

network topology is that if the central

hub fails, all computers connected to

tha t hub would be disconnected. Below

is a visual example of a simple computer

setup on a network using the star

topology?

The central device is called a hub. All data transfer must pass through the hub.

Because each device has its own connection to the hub, failure of one computer does

not affect any other computers. However if the hub fails the entire network is

inoperable until the hub is repaired.

1.14.2 Bus Topology

A bus network uses a multi - drop transmission medium, all node on the network share

a common bus and thus share communication. This allows only one device to

transmit at a time. A distributed access protoco l determines which station is to

transmit. Data frames contain source and destination addresses, where each station

monitors the bus and copies frames addressed to it.

ON

E

| C

OM

MU

NIC

ATI

ON

S N

ETW

OR

K

Self - Quiz

Find the true statement, and rewrite the false ( statement so that they are true)

1 . A wireless LAN is a LAN that uses physical wires. 2 . An intranet is an internal network that uses video conferencing technologies 3 . Five types of digital dial - up lines are ISDN lines, DSL, FTTP, T - carrier lines and ATM. 4 . A client/server network, servers on the network access resources on the client.

Page 26: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

26

A ring network is designed so a cable forms a closed ring, or loop with all the computers and devices

arranged in a ring. Data transmitted in the ring topology travels from device to device around the entire

A typical bus topology ( )

A bus topology connects each computer (nodes) to a single segment trunk (a

communication line, typically coax cable that is referred to as the 'bus'. The signal

travels from one end of the bus to the other. A terminator is required at each to

absorb the si gnal so as it does not reflect back across the bus. A media access method

called CSMA/MA is used to handle the collision that occurs when two signals placed

on the wire at the same time. The bus topology is passive. In other words, the

computers on the bus simply 'listen' for a signal; they are not responsible for moving

the signal along.

a) Advantage

Failure of one of the station does not affect others. Good compromise over the other

two topologies as it allows relatively high rate of data transition. Well suited for

temporary networks that must be set up in a hurry. Easy to implement and extend.

b) Disadvantage

Require a network to detect when two nodes are transmitting at the same time. It

does not cope well with heavy traffic rates and difficult to administer/troubleshoot.

It has also limited cable length and number of stations. A cable brake can disable the

entire network; no redundancy. Maintenance cost may be higher in the long run.

Performance degrades as additional computers are added. The bus network consists

of a single cabl e, to which all computers and other devices connect. The bus is the

physical cable that connects the devices. Data transmission occurs in both directions

but only one device can communicate at a time. Failure at a single point does affect

the entire networ k however failure of the bus itself will cause the entire network to

be inoperable.

1.14.3 Ring Topology

Also known as a ring network, the ring topology is a type of computer network

configuration where each network computer and device is connected to each other

forming a large circle (or similar shape). Each packet is sent around the ring until it

reaches its final destination. Today, the ring topology is seldom used. Below is a visual

example of a simple computer setup on a network using a ring topolo gy.

ON

E

| C

OM

MU

NIC

ATI

ON

S N

ETW

OR

K

Page 27: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

27

ring in one direction only. If a device on a ring network fails all devices before the failed device are

unaffected, but those after the failed device cannot function.

CASE STUDY

Celanese Chemicals employs over 5000 employees located globally in seven different countries. It

produces chemicals used in making paints and coatings, textiles, plastics and adhesives, and its products

are used heavily in the housing and automotive industries. Previously, sales reps had to make

extraordinary efforts to respond to customer calls. They had no access to current information and had

to call a home-office customer service rep that did have network access. After retrieving the necessary

product information, the customer service rep would then call the sales rep back, who would then call

the customer with the information. The whole process took from four hours to over a day. Now, thanks

to a revamping of its telecommunications network, sales reps can now use their handheld computers

linked wirelessly to corporate networks, the Internet, and a web-based enterprise resource planning

system to get real-time information and provide it to customers on the spot. This system empowers

the sales reps and often results in faster, higher-quality customer service. Celanese expects customer

satisfaction to rise as a result of the fast response times and greatly improved one-on-one service.

In addition to external communications, telecommunications technology also helps business coordinate

activities and integrates various departments to increase operational efficiency and support effective

decision making. The far-reaching developments of telecommunications are having and will continue

to have a profound effect on business information systems and on society in general. Source: Ralph M.

Stair and George W. Reynolds. Principles of Information Systems

Questions

1. Describe how telecommunications network helped Celanese Chemicals improve their customer

service

2. Explain how the sales reps would link to their customers wirelessly

3. What are the possible advantages that Celanese Chemicals enjoyed through using

telecommunications networks?

4. Briefly discuss how the company would coordinate activities and integrate various departments

to increase efficiency

Page 28: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

28

1.15 COMMUNICATION PROTOCOLS

A protocol is a set of rules and procedures for exchanging information among

computers. Protocols define how the communications channel is established, how

information is transmitted and how errors are transmitted and corrected.

1.15.1 Ethernet

Ethernet is a LAN protocol that allows personal computers to contend for access to

the network. Ethernet can be used in both a bus and star topology. If 2 computers

attempt to send data at the same time a collision between the packets occurs and the

data has to be resent. To avoid collisions an Ethernet network we can use an access

method called:

a) Carrier Sense Multiple Access/Collision Detection

(CSMA/CD)

This access control technique attempts to detect possible collisions. If a computer

with data to transmit senses that data is already on the network, it waits a random

amount of time before attempting to retransmit the data thus helping to avoid

collisions. Ethernet can works with the transmission rate of 10Mbps. Fast Ethernet

works at 100Mbps whilst Gigabit Ethernet provides an even higher transmission rate.

1.15.2 Token Ring

A token ring protocol controls access to the network by requiring that a special signal

called a Token is shared or passed among network device. Only the device with the

Token can transmit data. Therefore only one computer can transmit data at a time.

Token ring is based on the ring topology but it can be used on a star topology. Token

ring using UTP can operate at 4Mbps and at 16Mbps while when using STP. Token ring

networks are more complicated than Ethernet networks but access to the network is

more equitable because each device has an equal chance to transmit.

1.15.3 TCP/IP Protocol

The Internet Protocol Suite is the set of communications protocols used for the

Internet and other similar networks. It is commonly also known as TCP/IP, named

from two of the most important protocols in it: the Transmission Control Protocol

(TCP) and the Internet Protocol (IP), which were the first two networking protocols

defined in this standard. Modern IP networking represents a synthesis of several

developments that began to evolve in the 1960s and 1970s, namely the Internet and

local area networks, which emerged during the 1980s, together with the advent of

the World Wide Web in the early 1990s.

The Internet Protocol Suite, like many protocol suites, is constructed as a set of layers. Each layer solves a

set of problems involving the transmission of data. In particular, the layers define the operational scope

of the protocols within.

ON

E

| CO

MM

UN

ICA

TIO

NS

NET

WO

RK

Page 29: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

29

Often a component of a layer provides a well-defined service to the upper layer protocols and may be

using services from the lower layers. Upper layers are logically closer to the user and deal with more

abstract data, relying on lower layer protocols to translate data into forms that can eventually be

physically transmitted.

The TCP/IP model consists of four layers (RFC 1122). From lowest to highest, these

are the Link Layer, the Internet Layer, the Transport Layer, and the Application Layer.

ASSESSMENT QUESTIONS 1. What is communication channel? Identify three types

2. Illustrate and explain the telecommunication system model

3. Identify and explain the communications equipment

4. Discuss the direction of transmission types

5. Briefly describe the two transmission models that you have learned

Page 30: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

30

_________________________________________________________________

2. THE INTERNET AND THE WORLD WIDE WEB

_________________________________________________________________

Learning Outcomes

1. Discuss the history of the internet

2. Explain how to access and connect to the

internet

3. Analyze an IP address

4. Identify the components of a web browser

5. Explain the purpose of a web browser

6. Describe the types of web sites

7. Discuss the benefit of internet to businesses

2.1 HISTORY OF THE INTERNET

The Internet has its roots in a networking project started by the Pentagon’s Advanced Research Projects

Agency (ARPA). Their goal was:

• Allow scientists at different locations to share information and collaborate on military and

scientific projects

• Could function even if part of the network were disabled or destroyed by a disaster

ARPNET became functional in September 1969 effectively linking together scientific and academic

researchers in the United States. It originally consisted of four main computers each located at the

University of California LA, Stanford Research of Institute (SRI), University of California Santa Barbara and

the University of Utah. By 1984 ARPNET had over 1000 computers linked to the four hosts at each of these

locations.

Then in 1986 the National Science Foundation connected its huge network of five super computer centers,

called NFSnet, to ARPNET. This configuration of complex networks and hosts became known as the

Internet.

Page 31: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

31

2.2 EXPLORING THE INTERNET

The Internet can be defined as a collection of interconnected networks, all freely exchanging information.

It is regarded as the world’s largest collection of networks which links together millions of businesses,

government offices, educational institutions and individuals. The many networks that comprise the

Internet, also called the Net, are local, regional, national and international. Although each network that

Page 32: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

32

constitutes the Internet is owned by a public or private organisation, no single organisation owns or

The Internet relies on an addressing system much like the postal service to send

data to a computer at a specific destination. Each computer location on the Internet

has a numeric address called than IP Address, which consists of 4 groups of numbers

controls the Internet. Each organisation is responsible for maintaining its own

network. The Internet has more than 225 million users around the wo rld and they

connect for a variety of reasons including:

• To a information including news, weather, research and educational

material

• Conduct business or complete banking and investing transactions

• To access sources of entertainment and leisure

• To shop for goods and services

• To meet and converse with people from around the world in discussion

groups or chat rooms

• To access other computers and exchange files

• To send and receive e - mail messages

2.3 HOW THE INTERNET WORKS

Data sent over the Internet travels via networks and communication lines owned

and operated by many companies. There are various ways to connect to the

Internet:

• Internet Service Provider (ISP) – this is an organisation that has a

permanent Internet connection and provides temporary connections to individuals

and companies for free or for a fee.

• Online Services – provide Internet access as well as a variety of features

such as news, weather, legal information, financial data, hardware and software

guides and travel information. Therefore the fee using online services is slightly

higher than that of an ISP.

2.3.1 Internet Addresses

TWO

| TH

E IN

TER

NET

& T

HE

WO

RLD

WID

E W

EB

Page 33: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

33

separated by a period with each group of numbers being between 0 and 255. For example the IP Address

192.168.22.21 is difficult to remember when connecting to a computer therefore a text version of the IP

Address can be used like, www.google.comand this is called a domain name. A single domain name can

refer to various IP Addresses. Every domain name includes a top-level domain, which is an abbreviation

that identifies the type of organisation that operates the site. The following is a list of top-level domains

and their abbreviations:

Top-Level Domain Abbreviations Type of

Organisation

Com Commercial organisations, companies

Edu Educational institutions

Gov Government institutions

Mil Military organisations

Net Network provider

Org Non-profit organisations

Au Australia

Za South Africa

Uk United Kingdom

Nz New Zealand

Jp Japan

2.3.2 The World Wide Web (www)

Although people use the terms World Wide Web and Internet interchangeably, the WWW is just one of

the many services available on the Internet. The WWW or Web consists of a worldwide collection of

electronic documents that have built-in hyperlinks to other related documents. These hyperlinks or links

allow users to navigate quickly from one document to another, regardless of whether the documents are

located on the same computer or different computers in different countries.

2.4 HOW A WEB PAGE WORKS

An electronic document on the Web is called a Web Page; it can contain text, sound, graphics

and video as well as links to other pages. A collection of related Web pages that you can

access electronically is called a Web Site. Web sites have a starting point called a home page,

which is like the contents page of a book.

Page 34: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

34

Each web site has a unique address called a Uniform Resource Locator (URL), which consists of a

protocol, domain name and sometimes the specific path to that web page. Most URLs use the http://

protocol, which stands for hypertext transfer protocol.

Example: http://www.hotmail.com

Protocol service domain name top level Domain

Page 35: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

35

2.5 WEB BROWSER SOFTWARE

Web browser software is used to access and view Web pages. The more widely used

web browsers are:

• Microsoft Internet Explorer

• Novell’s Netscape Navigator

Web pages that comprise of a web site are stored on a computer called a Web

Server. A Web server is a computer that delivers requested web pages. When you

enter an URL into your browser, the browser sends a request to the server that

stores the web site of that URL. The server then fetches the requested page and

sends it to your browser.

2.6 MULTIMEDIA ON THE WEB

Most Web pages include more than just text and links. In fact some of the more

exciting Web developments involve multimedia. Combining text, audio, video,

animation and sound brings the Web page to life. Most browsers have the capability

of displaying basic multimedia elements on a Web page. Graphics were the first

media used to enhance the text based web page. Many web pages use colorful

designs and images to convey the messages. Animation is the appearance of motion

that is created by displaying a series of still images in rapid succession. Audio consists

of individual sound files that must be downloaded completely before they can be

loaded. Like audio, video files must be downloaded completely before they can be

viewed. Because movies files are often large they may take a long while to download.

2.7 SEARCH ENGINES

No single organisation controls additions, deletions and changes to Web sites, which

means that there is no central menu or catalogue of Web site content that exists. To

overcome this problem several companies provide a software program called a

search engine, which helps you to locate Web sites, Web pages and Internet files.

2.8 INTRANETS AND FIREWALLS

2.8.1 Intranets

Many companies have applied Web technologies to their own private internal

networks. Internal networks that use Internet and Web technologies are called

intranets. Intranets are sometimes called enterprise networks, which is essentially a

small version of the Internet used within the organisation. Users can post and update

TWO

| TH

E IN

TER

NET

& T

HE

WO

RLD

WID

E W

EB

Page 36: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

36

information on the intranet by creating and posting a Web page. Other users can access these pages using

a Web browser. These Web pages provide information like telephone directories, event calendars,

procedure manuals and other employee information.

2.8.2 Firewalls

As a public network, anyone with the proper connection can access the Internet.

A private corporate intranet or extranet, by contrast is restricted to specific authorised users, usually

employees, suppliers and customers. To prevent unauthorised access to data and information, an intranet

or extranet often is protected by a firewall. A firewall is a general term that refers to both hardware and

software used to restrict access to data and information on a network. Organisations use firewalls to deny

network access to outsiders and to restrict employees’ access to sensitive data such as payroll or personnel

records.

2.9 OTHER INTERNET SERVICES

2.9.1 E-mail

E-mail or electronic mail is the exchange of text messages and computer files transmitted via a

communications network such as a local area network or Internet. Communication devices, such as

modems, transfer the e-mail messages to and from computers on the same network or to separate

networks.

To send and receive e-mail messages you use e-mail software installed on your computer. When you

receive e-mail messages it is stored in your mailbox. Your e-mail software can be used to send, receive,

delete and reply to messages in your mailbox.

Page 37: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

37

2.9.2 File Transfer Protocol (FTP)

This is an Internet standard that allows you to exchange files with other computers on

the Internet. An FTP server is a computer that allows users to upload and download

files using FTP. An FTP site is a collection of files that include text, graphics, audio,

video and program files that reside on an FTP server. Some FTP sites require that users

have usernames and passwords before they can download however many sites allow

anonymous FTP, where anyone can download whatever they require.

2.9.3 Telnet

Telnet is a program or command that enables you to connect to a remote computer

on the Internet. To make a Telnet connection to the remote computer, you enter a

user name and password. Once connected your computer acts like a terminal directly

linked to the remote computer. Telnet access to many remote computers is free, while

others are accessed for a fee. Telnet usage has declined due to the popularity and

ease of use of web browsers. Telnet is also widely used for remote administration.

2.9.4 Usenet

A newsgroup is an online area in which users conduct written discussions about a

particular subject. To participate in a discussion, a user sends a message to the

newsgroup and other users in the group read and reply to the message. The entire

collection of Internet newsgroups is called Usenet, which contains thousands of

newsgroups. Some of the s discussed include recreation, science, business and

computers. A computer that stores and distributes newsgroups is called a news

server. To participate in a news group you need to use a program called a newsreader,

which is included with most browsers.

2.9.5 Chat Rooms

A chat is a real time typed conversation that takes place on the computer. Real-time

means that you and the person you are chatting to must be online at the same time.

When you enter a line of text, your words display on one or more of the participants

screens. Chat rooms are communication mediums that permit users to communicate

with each other. Some chat rooms support voice and video feeds to chat where you

can hear and see other users. You connect to a chat server using a chat client that is

usually included in your browser. Some chat clients are text based like IRC or Internet

Relay Chat, whilst some support graphical and text based chats like Microsoft Chat.

TWO

| TH

E IN

TER

NET

& T

HE

WO

RLD

WID

E W

EB

Page 38: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

38

2.9.6 Video Conferencing

A videoconference or video conference (also known as a video teleconference) is a set of interactive

telecommunication technologies which allow two or more locations to interact via two-way video and

audio transmissions simultaneously. It has also been called 'visual collaboration' and is a type of

groupware.

Videoconferencing differs from videophone calls in that it's designed to serve a conference rather than

individuals. It is an intermediate form of video telephony, first deployed commercially by AT&T during the

early 1970s using their Picture phone technology

2.9.7 Face book

Face book is a social networking website launched in February 2004 that is operated and privately owned

by Face book, Inc. with more than 500 millionactive users in July 2010. Users can add people as friends

and send them messages, and update their personal profiles to notify friends about themselves.

Additionally, users can join

networks organized by workplace, school, or college. The website's name stems from the colloquial name

of books given to students at the start of the academic year by university administrations in the US with

the intention of helping students to get to know each other better. Face book allows anyone who declares

them to be aged 13 or older to become a member of the website

2.9.8 Network Computer

For some applications, including many of the Internet services, a personal computer has more capability

than the application requires. Jobs that primarily involve entering transactions or looking up information

in a database or even viewing Web pages do not require floppy disks, CD-ROMs or large hard disks. These

extra components contribute to both the cost and complexity of the personal computer therefore many

users are turning to using network computers.

A network computer, sometimes called a thin client is a less

expensive version of the personal computer designed

specifically to connect to the network especially to the Internet.

Most thin clients cannot operate unless they are connected to

the network. Network computers usually rely on the network

server for storage so there is no need for a hard disk or a CD-

ROM drive.

Think Point Do internet databases mean the end of privacy? Why or why not? How can people change their lifestyles & behaviour so that less personal data is available in internet databases?

Page 39: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

39

2.9.9 Home Networks

If you have multiple computers in your home you can connect all of them together with

a home network. There are many advantages of a home network:

• All computers in the house can be connected to the Internet at the same time using

only a single telephone line

• Each computer can access files on every other computer

• All computers can share peripherals such as printers, scanners and even CD-ROMS

2.10 NETWORK COMPUTERS FOR BUSINESS

This is a specific type of network computer used in business applications called the

Network Personal Computer or NetPC. A NetPC primarily relies on the server for

software and storage but does have a hard disk for storing some data and programs.

2.11 CONNECTING TO THE INTERNET AND THE WORLD WIDE WEB

Most users connect to the Internet through a business or school network. In this case

these computers are usually a part of a LAN that is connected to an ISP through a high-

speed connection line leased from the local telephone company. When connecting

From home or while travelling, individuals often use dial-up connections to connect to

the Internet. With dial-up access you might use your computer and modem to dial your

ISP over regular telephone lines. Connecting over regular telephone has only one

disadvantage of the transmission rate being slow. This problem of speed can be

overcome by new technologies like ISDN – Integrated Services Digital Network, which

provide transmission that are more than twice as fast as regular telephone lines.

It is also possible to connect to the Internet wirelessly. Protocols such as WAP –

Wireless Application Protocol make it possible to connect to the Internet by using your

cellular telephone as a modem.

2.12 DOING BUSINESS ON THE WORLD WIDE WEB

When you conduct business activities online, you are participating in electronic

commerce, also known as e-commerce. These commercial activities include shopping,

investing and any other venture that represents a business transaction or uses electronic data

interchange. When a customer visits an online business through its electronic storefront, it contains a

shopping cartthat allows the customer to collect purchases. When ready complete the sale, the customer

TWO

| TH

E IN

TER

NET

& T

HE

WO

RLD

WID

E W

EB

Page 40: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

40

often enters personal and credit data through a secure web connection. If you are

uncomfortable sending your credit card information online then you use some form

of electronic currency like e-Bucks.

ASSESSMENT QUESTIONS

1. Why do people or organizations use internet?

2. What are firewalls? Explain their advantages to the organizations

3. Analyse the following Website and indicate the Protocol, Domain name,

Service and Top level domain : http://www.pctraining.com

4. What do these acronyms stands for and explain the role of each in

business company : a)ISP

b) WWW

c) ARPA

d) SRI URL

e) GTTP

5. Outline and explain the internet services that you have learnt

TWO

| TH

E IN

TER

NET

& T

HE

WO

RLD

WID

E W

EB

Page 41: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

41

Page 42: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

42

_________________________________________________________

3. OPERATING SYSTEMS AND SYSTEMS SOFTWARE

_________________________________________________________

Learning Outcomes

1. Identify the types of system software

2. Describe functions of an operating system and utility programs

3.1 SYSTEMS SOFTWARE

Systems software consists of the programs that control the operations of the computer and its devices.

Functions that systems software performs include

Page 43: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

43

• Starting up the computer

• Opening, executing and running applications

• Storing, retrieving and copying files

• Formatting disks

• Reducing file sizes

• Backing up the contents of the hard drive

Systems software serves as the interface between the user, application software and

the computer hardware. There are 2 types of systems software:

• Operating systems

• Utility programs

3.2 OPERATING SYSTEMS

An operating system (OS) is a set of programs containing instructions that coordinate

all of the activities among computer hardware resources.

• It handles input from devices such as a keyboard, mouse or microphone

• Coordinates the display of output on the monitor

• Instructs the printer how and when to print information Manages data and

instructions Manages information stored on disk.

A computer cannot function without an operating system. They also contain

instructions on how to run application software. Application software is written to run

with particular operating systems. Thus operating systems directly determines the

application you run on your computer. An operating system is usually stored on a

computer’s hard disk. The core of the operating system, called the kernel is

responsible for:

• Managing memory, files and devices

• Maintaining the computer’s clock, this contains current date and time settings

Starting applications

• Assigning computer resources

3.2.1 Functions of an Operating System

Memory Management

The purpose of memory management is to optimise use of random access memory

(RAM). RAM is often called memory and is responsible for temporarily holding items

such as data and instructions while the CPU is processing them. The OS has the

responsibility to

THR

EE

| O

PER

ATI

NG

SY

STEM

S &

SY

STEM

S SO

FTW

AR

E

Page 44: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

44

Allocate or assign these items to an area of memory while they are being

processed

Monitor the contents of the items in memory

Clear these items from memory when they are no longer required by memory

• Spooling Print Jobs

When you instruct an application to print a document such as e-mail, the document

you are printing is called a print job. Because CPUs can send documents to a printer

much faster than a printer can print them a technique called spooling is used.

With spooling, print jobs are placed in memory instead of being immediately sent to

the printer. In the case of print spooling the memory holds data waiting to be printed

whilst the printer, prints from the memory at its own rate. Thus multiple print jobs

can be sent to the printer even if the printer is busy.

• Configuring Devices

To communicate with each device in the computer, the OS relies on device drivers. A

device driver is a small program that accepts commands from a program and converts

them to be understood by different devices. Every device on a computer, such as

mouse keyboard, monitor and printer has their own device drivers that allow the OS

to utilise them. A standard known as Plug-n-Play has simplified the configuration of

devices by automatically detecting, configuring and installing drivers for devices.

• Monitoring System Performance

Operating systems usually contain a performance monitor, which is a program that

assesses and reports information about various system resources and devices. You

can monitor the CPU, disks, memory, network usage and the number of times a file

read or written. The information reported could help identify problems with resources

(bottlenecks), which can then be resolved.

• Administering Security

Most multi-user operating systems allow each user to log on, which is the process of

entering a username and password into the computer. Users select a combination of

their first and last names as a username. The password is a set of characters associated

with your username that allows you access to resources on the network. It also keeps

unauthorised users from getting access to network resources, as they will not have a

password. Some operating systems also allow you to set passwords to specific files so

that only authorised users can access them.

• Managing Storage Media and Files

Operating systems also contain a type program called a file manager, which performs functions related to

storage and file management. Some of its functions include:

THR

EE

| O

PER

ATI

NG

SY

STEM

S &

SY

STEM

S SO

FTW

AR

E

Page 45: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

45

Copying disks

Displaying a list of files on a storage medium

Checking the amount of used or free space on a storage medium

Copying, renaming, deleting, moving and sorting files

3.3 POPULAR OPERATING SYSTEMS

DOS (Disk Operating System)

This refers to several single user operating systems. DOS used a command-line

interface. Later versions included both command-line and menu-driven user

interfaces, as well as improved memory and disk management. DOS is no longer

widely used because it does not offer graphical user interface and it cannot take full

advantage of modern 32-bit microprocessor.

Windows 3.x

This refers to three earlier versions of Microsoft Windows. Windows 3.x is and

operating environment (is a graphical user interface that works in combination with

an operating system to simplify its use.

Windows 95, 98 and 2000

Windows 95 is a true multitasking operating system – not an operating environment

– with an improved graphical interface.

Windows 98 operating system is easier to use than Windows 95 and is more

integrated with the Internet.

Windows 2000 is an upgrade to Windows 98 and Windows NT. Two basic versions of

Windows 2000 exist: Windows Server family and Windows Professional.

Learners must know the difference of Windows Server Family and Windows

Professional.

Windows CE

Is an operating system designed for use on wireless communications devices and

Smaller computers such as handheld computers, in-vehicle devices, and network

computers? Because it is designed for use on smaller computing devices, Windows CE

requires less memory. It also has Multitasking, e-mail, and Internet

capabilities. Windows NT Was an operating system designed for client-

server networks.

THR

EE

| O

PER

ATI

NG

SY

STEM

S &

SY

STEM

S SO

FTW

AR

E

Page 46: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

46

Macintosh

This was the first commercially graphical user interface. It has set the standard for

operating system ease of use and has been the model for the most of the new

graphical user interfaces developed for non-Macintosh systems.

OS/2

Is IBM’s multitasking graphical user interface operating system designed to work with

32-bit microprocessors? In addition to its capability of running programs written

specifically for OS/2, the operating system also can run programs written for DOS and

most Windows 3.x programs.

UNIX

Is a multi-user, multitasking operating

system developed in Bell Laboratories.

UNIX is a powerful operating system,

capable of handling high volume of

transactions in a multi-user environment

and working with CPUs using

multiprocessing. UNIX is thus used to most

often on workstations and servers.

NetWare

Is a widely used network operating system

designed for client-server

networks. NetWare has a server portion

that resides on the network server and a

client portion that resides on each client

computer connected to the network. The

server

portion of NetWare allows you to share

hardware devices attached to the server, as well as any files or application software

stored on the server. The client portion of the NetWare communicates with the

server.

3.4 UTILITIES SOFTWARE

Utility software is a kind of system software designed to help analyze, configure,

optimize and maintain the computer. A single piece of utility software is usually called

a utility or tool.

Utility software should be contrasted with application software, which allows users to

do things like creating text documents, playing games, listening to music or surfing

the web. Rather than providing these kinds of user-oriented or output-oriented

functionality, utility software usually focuses on how the computer infrastructure (including the computer

Self-Quiz

(Find the true statement, and rewrite

the false statement so that they are true)

1. Blackberry device use Palm as

their operating system.

2. Example of embedded

operating systems include Windows server 2008, UNIX, Linux, Solaris &

Netware.

3. Mac OS X is a multitasking

operating system only available for computers manufactured by Apple.

THR

EE

| O

PER

ATI

NG

SY

STEM

S &

SY

STEM

S SO

FTW

AR

E

Page 47: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

47

hardware, operating system, and application software and data storage) operates.

Due to this focus, utilities are often rather technical and targeted at people with an

advanced level of computer knowledge.

Most utilities are highly specialized and designed to perform only a single task or a

small range of tasks. However, there are also some utility suitesthat combine several

features in one software. Most major operating systems come with several

preinstalled utilities.

3.4.1 Utility Software Categories Disk storage utilities

• Disk defragmenters can detect computer files whose contents are broken across

several locations on the hard disk, and move the fragments to one location to increase

efficiency

• Disk checkers can scan the contents of a hard disk to find files or areas that are

corrupted in some way, or were not correctly saved, and eliminate them for a more

efficiently operating hard drive

• Disk cleaners can find files that are unnecessary to computer operation, or take up

considerable amounts of space. Disk cleaner helps the user to decide what to delete

when their hard disk is full

• Disk space analyzers for the visualization of disk space usage by getting the size for

each folder (including sub folders) & files in folder or drive. Showing the distribution

of the used space

• Disk partitions can divide an individual drive into multiple logical drives, each with

its own file system which can be mounted by the operating system and treated as an

individual drive

• Backup utilities can make a copy of all information stored on a disk, and restore

either the entire disk (e.g. in an event of disk failure) or selected files (e.g. in an event

of accidental deletion)

• Disk compression utilities can transparently compress/uncompress the contents of

a disk, increasing the capacity of the disk

• File managers provide a convenient method of performing routine data

management tasks, such as deleting, renaming, cataloging, uncataloging, moving,

copying, merging, generating and modifying data sets

• Archiveutilities output a stream or a single file when provided with a directory or a

set of files. Archive utilities, unlike archive suites, usually do not include compression

or encryption capabilities. Some archive utilities may even have a separate un-archive

utility for the reverse operation

• System profilers provide detailed information about the software installed and

hardware attached to the computer

• Anti-virus utilities scan for computer viruses

• Hex editors directly modify the text or data of a file. These files could be data or an

actual program

• Data compression utilities output a shorter stream or a smaller file when provided with a stream or file

THR

EE

| O

PER

ATI

NG

SY

STEM

S &

SY

STEM

S SO

FTW

AR

E

Page 48: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

48

• Cryptographic utilities encrypt and decrypt streams and files

• Launcher applications provide a convenient access point for application software •

Registry cleaners clean and optimize the Windows registry by removing old registry

keys that are no longer in use

• Network utilities analyze the computer's network connectivity, configure network

settings, check data transfer or log events

• Command line interface (CLI) and Graphical user interface (GUI) Allows the user

• A file compression utility reduces the size of a file

• A diagnostic utilitycompiles technical information about a computer’s hardware and

certain system software programs and then prepares a report outlining any identified

problems

• A disk scanner detects and corrects problems on disk and searches for and removes

unwanted files

• A disk fragmenter reorganizes files and unused space on a computer’s hard disk so

data can be accessed more quickly and programs can run faster

• An uninstallerremoves an application, as well as any associated entries in the system

files

• A backup utility copies or backups selected files or entire hard drive onto another

disk or tape

• An antivirus programprevents, detects, and removes viruses

• A screen saver causes the monitor’s screen to display a moving image on a blank

screen of no keyboard or mouse activity occurs for a specific time period

THR

EE

| O

PER

ATI

NG

SY

STEM

S &

SY

STEM

S SO

FTW

AR

E

Page 49: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

49

ASSESSMENT QUESTIONS

1. What are the functions of systems software?

2. Outline the functions of the operating systems

3. State the responsibilities of the Kernel

4. Highlight the popularly used operating systems and explain

5. What is utilities software? Give examples.

Page 50: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

50

____________________________________________________________

4. DATA MANAGEMENT AND DATABASES

_____________________________________________________________

Learning Outcomes

1. Define data accuracy, maintenance and security

2. Know the hierarchy of data

3. Explain types of file organization

4. Discuss data file maintenance

5. Discuss databases, usage, types, organization, models,

querying, warehousing and mining

4.1 DATA MANAGEMENT

• Define data accuracy, maintenance and security

• Know the hierarchy of data

• Explain types of file organization

• Discuss data file maintenance

• Discuss databases, usage, types, organization, models, querying, warehousing and mining

4.1.1 Data Accuracy

Data without errors, accurate data or information can lead to take correct decisions.

4.1.2 Data Security

Protection of data so it is not misused or lost.

4.1.3 Data Maintenance

Procedures used keep file data current. Data maintenance procedures include adding records to, changing

records in, or deleting records from a file. (Refer to 10.4 of the prescribed textbook).

Page 51: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

51

4.2 THE HIERARCHY OF DATA

Data is organized in a hierarchy in which each higher level consists of one or more elements from the

lower level. A database contains files, a file contains records, a record contains fields, and a field is made

up of characters. The fitness centre database contains four files:

Member, Membership plans, Personal Trainer, and Training Session

• The Member file contains records about current members.

• The Membership Plans filecontains records identifying a type of membership and its monthly fee.

• The personal Trainerfile contains records about trainers at the fitness centre, and

• The Training session file contains records that identify the time and date a member has a session

with a trainer. Memberships Plans file are Membership Code, Membership Name, and Monthly

Fee. The Membership Code field contains one character. Valid entries include L(Late Shift),

M(Matinee), P(Prime Time), R(Round the Clock), and W(Weekender). Membership Code field has

a field size of 1.

• Characters: In the ASCII and EBCDIC, coding schemes, each byte represents a single character,

which can be a number (4), letter ®, Punctuation mark (?), or other symbol (&).

• Fields: A Field is a combination of one or more related characters or bytes and is the smallest unit

of data a user accesses. • Records: A record is a group of related records.

4.3 TYPES OF FILE ORGANISATION

File:The set of all occurrences of a given record structure

(OR)

Is a table containing master and transaction file records that have been deleted

from online storage?

Some types of conventional files are:

• Master File:Is a table containing records that are relatively permanent.

Example: Master Files include CUSTOMERS, PRODUCTS, and SUPPLIERS. Transaction File: Is a

table containing records that describe business events. Example: Transaction files include ORDERS,

INVOICES, REQUISITIONS, and REGISTIRATIONS.

• Document File: Is a table containing historical date.

• Table look-up File: is a table containing relatively static data that can be shared.Example: It

includes SALES TAX TABLES, ZIP CODE TABLES, and INCOME TAX TABLES.

• Audit File:Is a table containing records of updating to other files.

4.4 DATA FILE MAINTENANCE

Page 52: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

52

Adding Records: records are added to a file when you need to add additional

information. Follow the example in section 10.5 of the prescribed textbook.

Changing Records: you may change you records for the following two reasons:

• To correct inaccurate data

• To update older data

Deleting records: when you no longer require a

record in a file you remove it by deleting.

4.5 DATABASES

Databases a better way to manage and organize data

in a computer structure that houses a collection of

related data. A database contains two types of data:

1) End User data-raw facts

2) Metadata-it consists of data about data,

that is, the data characteristics and relationships.

4.5.1 An Insight to Database

Many applications require a database interface with an IVR (INTERACTIVE VOICE

RESPONSE) system. Insight provides emulation and links to many databases such as

Microsoft Access, dBase, FoxPro, SQL Sequel Server, ODBC, Informix, Oracle, and many

others. Data runs between the IVR system and the database application through

specific variables. Applications can run embedded, be created on the fly, or through

import/export facilities

4.5.2 Database Usage

Database Usage must consider the following

• No database space is wasted on storing data that is no longer used as is currently the

case

• Performance does not suffer from having to parse and carry data, which will never

be used

• The database will be easier to understand

• It may actually make it easier to develop modules

• Storing data is it makes it easy for the programmer to add new data fields because

no Database change is required

4.5.3 Types of Database Organisation

Think Point Should a database of people on parole or being released for crimes be made public? Why or why not?

FOU

R

| D

ATA

MA

NA

GEM

ENT

& D

ATA

BA

SES

Page 53: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

53

FO |

DA

TA M

AN

AG

EMEN

T &

DA

TAB

ASE

S

Organising data in a database

Because of the vast number of elements in modern businesses, it is essential that data is organized so that

it can be effectively utilized. Databases should be designed to store all relevant data and provide data

integrity, quick access and easy modification.

The following must be taken into consideration when designing a database:

Content: what data is to be collected and at what cost

Physical structure: where is the data to be physically located

Logical structure: how is the data to be arranged semantically in order to make sense

Access: what data is to be provided and to whom

4.6 DATABASE MODELS

4.6.1 The Hierarchical or Tree Database Model

This is basically a database in which data is organized in a tree like structure. Data is

organized in an inverted tree-like structure. This database has branches of parent and

child records; each child record can only have one parent record.

4.6.2 The Network Database Model

This model is similar or an extension of the Hierarchical model, except that each child

record can have more than one parent. Both the Network & the Hierarchical models

are flawed in that they are difficult to modify or create new relationships.

4.6.3 The Relational Database Model

These are quite popular models, which use tables that consist of rows and columns

to store data. All data is placed in 2 dimensional tables, called relations. The tables in

the relational database organize data in rows and columns, which helps simplify data

access and manipulation. In a relational database, each row has a primary key and

each column has a unique name. Each row in a table is referred to as a tuple and each

column is called an attribute. Tuples represent records (a collection of related facts),

and attributes represent fields. A relational database stores associations among data,

or relationships. Once data has been placed into the database, data inquiries and

manipulations can be made.

4.6.4 Object-Oriented Database Model

This model is based on an object-oriented data model. Data is stored as objects, which

contain both the data and the processing instructions needed to complete the

database transaction. The objects can be retrieved and related by an object-oriented

database management system. These databases have the ability to reuse and modify

existing objects to develop new database applications. This helps reduce errors and

increase efficiency.

Page 54: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

54

4.7 DATABASE MANAGEMENT SYSTEMS

The diagram documents the entities and relationships involved in the employee

information and payroll system. It depicts the fundamental relations like recording

personnel information, paying salary and getting a loan. The E-R Diagram for an

Employee Payroll system can be simple as well as complex. Database Management

System (DBMS) is a group of programs used as an interface between a user and a

database, or a database and application programs. The DBMS’s main function is to

control access to the database and manage the resources efficiently. The DBMS helps

reduce data redundancy, improve data integrity, allows data to be shared and reports

to be compiled more easily. DBMS’s are designed for all kinds of computers, whether

they are personal computers, or mainframe.

4.7.1 Storage and Retrieval of data from a DBMS

As mentioned above, one of the primary functions of a DBMS is to be an interface between the database

and the application program. When an application program needs data, it goes to the DBMS. It follows a

logical access path in order to do so. The DBMS then accesses the storage device, (for example a hard-

disk or tape) where the data is stored. The DBMS follows a physical access path in order to retrieve the

data from the storage device.

4.7.2 Query Languages: Access to the Database

Is basically simple, English-like statement that enables a user to specify the data he/she wants to store,

print or output?

Page 55: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

55

4.7.3 Structure Query Language

Structured Query Language (SQL) manipulates and retrieves data and is used by

relational databases. A powerful and flexible relational database software language

composed of commands that enable users to create database and table structures,

perform various types of data manipulation and data administration, and query the

database to extract useful information.

4.8 DATABASE ADMISSION

The role of the Database Administrator: is to

coordinate the use of the database so that we

can keep track and store data. This person is

responsible for the planning, organization,

control and monitoring of the centralized and

shared corporate database. The DBA is the

general manager of the database

administration department. The role of the

User in a Database System: The user needs to

first familiarize him/her with the data in the

existing database. The user should also take

active participation in designing and specifying

additions to the database.

Self-Quiz

(Find the true statement, and rewrite the

false statement so that they are true) 1. A

database is a combination of one or

more related characters or bytes

and is the smallest unit of data a

user accesses.

2. A record is a collection of

data organised in a manner that

allows access, retrieval, and use of that data.

3. Data is processed

information.

4. A coding scheme is a number

or character that is appended to or

inserted in a primary key value.

FOU

R

| D

ATA

MA

NA

GEM

ENT

& D

ATA

BA

SES

Page 56: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

56

CASE STUDY

J. Crew is a global retailer and a catalog merchant of prestige fashions with

headquarters in New York City. It offers a wide range of men’s, women’s, and

children’s apparel, shoes, accessories and personal care products through its

fast expanding retail network of 133 U.S. stores and 76 licensed stores in

Japan.

When J. Crew set up its jcrew.com site in June 1997, it was one of the first

apparel sites on the web. Today the website is J. Crew’s fastest-growing

distribution channel. Part of the reason for its huge success is that J. Crew uses

a data warehouse and software tools to identify for on-line shoppers what J.

Crew clothes, shoes and accessories customers frequently purchase together.

That information is fed to applications running the website so that when online

shoppers click on an item, the website recommends the complimentary

products that the customer might be interested in buying. Delivering dynamic,

relevant product recommendations to shoppers has increased the average

order size and raised customer satisfaction and loyalty.

J. Crew uses DigiMine’s Enterprise Analytics data mining software to analyze

sales data from its website, retail stores, and catalog sales operation. All of its

data is collected and stored in a 500-GB data warehouse running on a

Microsoft SQL Server database, which took J Crew and DigiMine six months to

develop. J. Crew combines the data generated by visitors clicking on its web

pages with product sales data from corporate systems that process order data

from catalog and retail operations.

Questions

1. How did J. Crew manage to be the fastest-growing distribution channel?

2. Give an account of how jcrew.com site operate

3. Identify some potential data privacy issues that might arise with the capture, storage, and analysis of customers’ on-line shopping data from J. Crew’s web site

Page 57: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

57

4.9 GUIDELINES FOR DESIGNING DATABASE FILES

1. Determine the purpose of the database.

2. Design the tables

3. Design the fields for each table

4. Determine the relationship among the tables

4.10 WORK: DATA WAREHOUSE AND DATA MINING

These are extremely large database that stores and managers the data required to

analyze historical and current business circumstances.

4.10.1 Data Warehouse

A database that focuses primarily on the storage of data used to generate information

required to make tactical or strategic decisions.

4.10.2 Data Mining

A method of employing automated tools to analyze the wealth of data now available

through data warehouses and other sources and to identify possible relationships and

anomalies. Data mining is a proactive methodology that is being used to uncover

business problems and opportunities.

ASSESSMENT QUESTIONS

1. What are Data Maintenance Techniques?

2. How is File Processing Different from Databases?

3. What are the Advantages of Using a Database Management system (DBMS)?

4. What are the Characteristics of Relational and Object-Orientated Database?

5. How is Query Language Used?

6. What are the Responsibilities of Data and Database Administrators?

7. What are Different Types of Information Systems?

8. Why are Data and Information Important to an Organisation?

FOU

R

| D

ATA

MA

NA

GEM

ENT

& D

ATA

BA

SES

Page 58: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

58

___________________________________________________________

5. INFORMATION SYSTEMS

___________________________________________________________

Page 59: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

59

Page 60: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

60

B. Management Levels in an Organisation

The term “ Levels of Management ’ refers to a line of demarcation between various

managerial positions in an organization. The number of levels in management

increases when the size of the business and work force increases and vice versa. The

level of management determines a chain of com mand, the amount of authority &

status enjoyed by any managerial position. The levels of management can be

classified in three broad categories:

• Top level / Administrative level

• Middle level / Executors

• Low level / Supervisory / Operative / First - line managers

Managers at all these levels perform different functions. The role of managers at all

the three levels is discussed below:

5.2 LEVELS OF MANAGEMENT

5.2.1 Top Level of Management

It consists of board of directors, chief executive or managing director. The top

Management is the ultimate source of authority and it manages goals and policies for

An enterprise. It devotes more time on planning and coordinating functions. The role

of th e top management can be summarized as follows:

a. Top management lays down the objectives and broad policies of the enterprise

b. It issues necessary instructions for preparation of department budgets,

procedures, schedules etc.

c. It prepares strategic plans & policies for the enterprise

d. It appoints the executive for middle level i.e. departmental managers

FIV

E

| INFO

RM

ATI

ON

SY

STEM

S

Page 61: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

61

e. It controls & coordinates the activities of all the departments

f. It is also responsible for maintaining a contact with the outside world

g. It provides guidance and direction

h. The top management is also responsible towards the shareholders for the

performance of the enterprise

5.2.2 Middle Level of Management

The branch managers and departmental managers constitute middle level. They are

responsible to the top management for the functioning of their department. They

devote more time to organizational and directional functions. In small organization,

there is only one layer of middle level of management but in big enterprises, there

may be senior and junior middle level management. Their role can be emphasized as:

a. They execute the plans of the organization in accordance with the policies

and directives of the top management

b. They make plans for the sub-units of the organization

c. They participate in employment & training of lower level management

d. They interpret and explain policies from top level management to lower level

e. They are responsible for coordinating the activities within the division or

department

f. It also sends important reports and other important data to top level

management

g. They evaluate performance of junior managers

h. They are also responsible for inspiring lower level managers towards better

performance

5.2.3 Lower Level of Management

Lower level is also known as supervisory / operative level of management. It consists

of supervisors, foreman, section officers, superintendent etc. According to R.C. Davis,

“Supervisory management refers to those executives whose work has to be largely

with personal oversight and direction of operative employees”. In other words, they

are concerned with direction and controlling function of management. Their activities

include:

1. Assigning of jobs and tasks to various workers

2. They guide and instruct workers for day to day activities

3. They are responsible for the quality as well as quantity of production

4. They are also entrusted with the responsibility of maintaining good relation

in the organization

5. They communicate workers problems, suggestions, and recommendatory

appeals etc to the higher level and higher level goals and objectives to the workers

6. They help to solve the grievances of the workers

7. They supervise & guide the sub-ordinates

FIV

E

| INFO

RM

ATI

ON

SY

STEM

S

Page 62: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

62

8. They are responsible for providing training to the workers

9. They arrange necessary materials, machines, tools etc for getting the things

done

10. They prepare periodical reports about the performance of the workers

11. They ensure discipline in the enterprise

12. They motivate workers

13. They are the image builders of the enterprise because they are in direct

contact with the workers

5.3 FUNCTIONAL AREAS IN AN ORGANISATION

• Marketing Management Function:

Generates income from sales and is responsible for managing the marketing process.

• Financial Management Function:

This is responsible for the acquisition, utilization and control of the funds necessary

for running the business. The main activities here are the acquisition and application

of funds for the profitability, liquidity, solvency and continuity of the organization.

• Purchasing Management Function:

This function ensures that the materials necessary for production are bought at the

right places, at the right times, in the right quantities and at the right prices.

• Production Management Function:

This focuses on the internal capabilities of the organisation rather than on the desires

and needs of the marketplace.

• Human Resource Management Function:

Pertains to the acquisition, training, utilization and retaining of a sufficient number of

competent personnel.

• Public Relations Management Function:

Maintains and cultivates a favor able and objective image of the organization among

those whose opinion is important to the achievement of the business objectives.

• General Management Function:

This function includes the activities of persons in managerial positions. These persons

in top, middle and lower management have to plan for, organize, lead and control the

organisation as a whole, as well as its individual functions. The general manager is at the head of the

management team.

• Information function:

FIV

E

| INFO

RM

ATI

ON

SY

STEM

S

Page 63: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

63

Makes available income from sales and is responsible for managing the marketing process.

• Operations function:

An operation involves the physical utilization of raw materials and their conversion into manufactured

materials and finished products, and is usually performed in a factory.

5.4 QUALITIES OF VALUABLE INFORMATION

Accurate information: The user needs to use information that is accurate as inaccurate information

could lead to wrong decisions been taken.

Verifiable: Means that you can confirm information

Timely information: Most information loses it value with as time passes therefore it is necessary

to have the information on time

Organised information: Information must be arranged to suit the needs and requirements of the

user.

Meaningful information: Information must be relevant to the user, since it can be meaningful only to

the person who requires it.

Cost-effective

information:

Costs less to produce than the value of the resulting information.

5.5 TYPES OF INFORMATION SYSTEMS

An information system is a collection of hardware, software, data, people and procedures that are

designed to generate information that supports the activities of an organisation.

5.5.1 Office Information Systems (OIS)

Uses hardware, software and networks to enhance workflow and facilitate communications among

employees. An OIS supports many administrative activities. With an OIS, users create and distribute

graphics and documents, send messages, schedule appointments, browse the web, and publish web

pages. All levels of users utilize and benefit from the features of an OIS.

An OIS uses many common software products to support its activities. Typical software in an OIS includes

word processing, spreadsheet, database, presentation graphics, e-mail, web browser, web page

authoring, personal information management, and groupware. To send text, graphics, audio, video to

others, an OIS uses communication technology such as voice mail, fax, video conferencing, and EDI. In an

OIS, computers have modems, video cameras, speakers, and microphones.

Page 64: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

64

Employees in an OIS often use other types of hard ware such as scanners, fax

machines, digital cameras, and web-enabled cellular telephones and PDAs.

5.5.2 Transaction Processing Systems (TPS)

Is an information system that captures and processes data from day-to-day business

activities. Examples of transactions are deposits, payments, orders, and reservations.

Many people initially referred to the functions of a TPS as data processing.

The first TPSs mostly used batch processing. With batch processing, the computer

collects data over time and processes all transactions later, as a group. As computers

became more powerful, system developers created online transaction processing

information systems. With online transaction processing (OLTP), the computer

processes each transaction as it is entered. Today most transaction processing

systems use OLTP. For some routine processing tasks, they also use batch processing.

Many enterprise sized organizations use batch processing to calculate pay checks and

print in voices.

5.5.3 Management Information Systems (MIS)

Is an information system that generates accurate, timely and organized information?

An MIS generates three basic types of information: detailed, summary and exception.

MIS evolved from TPSs. Managers realized the computer and its software had more

potential than just supporting a TPS. Its capability of quickly computing and comparing

data could produce meaningful information managers.

5.5.4 Decision Support System (DSS)

Is an information system designed to help users reach a decision when a decision-

making situation arises. A decision support system uses data from internal and

external sources.

• Internal sources

Data might include sales orders, MRP and MRP II results, inventory records, or

financial data from accounting and financial analyses.

• External sources

Data might include interest rates, population trends, costs of new housing

construction, or raw material pricing.

5.5.5Expert Systems

An expert system is an information system that captures and stores the knowledge of

human experts and then imitates human reasoning and decision making. They are

composed of two main components: knowledge base and inference rule. Knowledge

base is the combined subject knowledge and experiences of the human experts.

Inference rule are a set of logical judgments applied to the knowledge base each time

a user describes a situation to the expert system. Artificial Intelligence (AI) is the

application of human intelligence to computers. AI technology senses a person’s

FIV

E

| INFO

RM

ATI

ON

SY

STEM

S

Page 65: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

65

actions and, based on logical assumptions and prior experience, takes the appropriate action to complete

the task. AI has a variety of capabilities, including speech recognition, logical reasoning, and creative

responses.

5.5.6 Integrated Information Systems

It often is difficult to classify an information system as belonging to

only one of the five general types of information systems. Much of

today’s application software, such as ERP and MRP II software,

supports transaction processing and creates MIS reports. Other

applications provide transaction processing, management

information, and decision support.

5.5.7 Executive Information Systems special type of DSS, called an

executive information system (EIS), supports the strategic information

needs of executive management. An EIS presents information

As charts and tables that show trends, ratios, and statistics. An EIS typically

uses external data sources such as the Dow Jones interactive or the

internet. These external data sources provide current information about

interest rates, commodity prices, and other leading economic indicators.

5.6 THE ROLE OF PERSONAL COMPUTERS IN INFORMATION SYSTEMS

Role of personal computer is that can perform all of its input, processing,

output, and storage activities by itself and contains at least one input

device, one output device, one storage device, memory, and a processor.

5.7THE CYBER CORPORATION

This is a Corporation that provides computers with Internet access to its customers.

Self-Quiz

(Find the true statement, and rewrite

the false statement so that they are true)

1. Users can send pictures and

sound files as well as short text

messages, with text messaging.

A cybercafé is a wireless network

that provides Internet connections

to mobile computers and other

devices. 3. Web folder is a

navigation system that consists of

one or more earth based receivers

that accept and analyse signals sent

by satellite in order to determine

the receiver’s location. 4.

Receiving devices initiate an

instruction to transmit data,

instructions, or information.

Page 66: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

66

ASSESSMENT QUESTIONS

1) What are Different Types of Information Systems?

2) Explain different types of functional areas in an organization?

3) List and briefly explain the 4 management activities?

4) Give the description of different qualities of valuable

information?

Page 67: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

67

______________________________________________________________

6. INFORMATION SYSTEMS DEVELOPMENT

______________________________________________________________

Page 68: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

68

Learning Outcomes

1. List the phases in the systems development cycle

2. Identify the guidelines and factors for system development

6.1 EXPLORING THE SYSTEM DEVELOPMENT LIFE CYCLE

The systems development life cycle (SDLC) is an organized set of activities that guides

those involved through the development of an information system.

6.1.1 Phases in the Systems Development Life Cycle : This system comprises of five

phases:

1. Planning

2. Analysis

3. Design

4. Implementation

5. Support

SIX

| INFO

RM

ATI

ON

SY

STEM

S D

EVEL

OP

MEN

T

Page 69: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

69

6.2 GUIDELINES FOR SYSTEMS DEVELOPMENT

Three general guidelines:

1) Use a phased approach: this involves defining the phases of the SDLC and

determining what activities and tasks will occur in each phase.

2) Involve the users: if the system is to be successful, the user must contribute

in all stages of development.

3) Develop standards: standards are set of rules and procedures that an

organisation expects employees to accept and follow. Having standards helps

multiple people working on the same development project produce consistent

results.

6.3 PARTICIPANTS IN THE SYSTEM DEVELOPMENT LIFE CYCLE

Anyone that is affected by the information system should participate in its

development.

• A system analyst: is responsible for designing and developing an information

system. Serve as liaison between user and the programmers.

• A programmer: uses a programming language to write the

instructions necessary to direct the computer to process data into

information

• The steering committee: is a decision- making body of an organisation.

6.4 PROJECT MANAGEMENT Project management is the process of planning,

scheduling, and then controlling the activities during the system development life

cycle

Components of the Project:

• The scope; that is, the goal, objectives, and expectations of the project

• Activities to be completed

• Time estimates for each activity

• Cost estimates for each activity

• The order in which activities must occur

• Activities that may be performed concurrently

6.5 FEASIBILITY ASSESSMENT

Feasibility is a measure of how suitable the development of a system will be to the

organisation. The following four criteria are used to test feasibility of a project:

• Schedule feasibility: measures whether the established deadlines for the

project are reasonable.

SIX

| INFO

RM

ATI

ON

SY

STEM

S D

EVEL

OP

MEN

T

Page 70: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

70

• Technical feasibility: measures whether the organisation has or can obtain the

hardware, software, networks, and people needed to deliver and then support the

proposed information system.

• Economic feasibility: also called cost/benefit feasibility, measures whether the

lifetime of the proposed information system will exceed its lifetime costs.

• Documentation: is the compilation and summarization of data and information;

including reports, diagrams, and programs. Proper documentation makes it easier for

everyone involved to understand all aspects of the life cycle.

6.6 DATA AND INFORMATION GATHERING TECHNIQUES

The following techniques are used to gather information:

• Reviewing current system documentation: review data and information on the

organisation chart, memos, minutes

• Observing: can help you understand how a system functions or a task is performed

• Interviewing: it allows for face-to-face discussion

• Sending Questionnaires: questionnaires are used to obtain information from large

number of people

• Conducting JAD sessions: is a lengthy, structured group work session

• Researching: use other sources to find information or data e.g. computer magazines,

trade journals, reference books, and the WWW

6.7 INITIATING FACTORS OF THE SYSTEM DEVELOPMENT LIFE CYCLE

1. To correct a problem

2. To improve the information system

3. An Information system to require modification

6.8 PLANNING PHASE

This phase commences when the steering committee requests for a project. Four

major activities are performed:

• Review the project requests

• Prioritize the project

• Allocate the resources such as money, people, equipment

• Identify a project development team for each approved project

SIX

| INFO

RM

ATI

ON

SY

STEM

S D

EVEL

OP

MEN

T

Page 71: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

71

6.9 THE ANALYSIS PHASE

The feasibility study: also known as the preliminary investigation. The purpose is to

determine whether or not the problem or enhancement identified in a project request

is worth pursuing.

Detailed analysis: entails three major activities

• Study the existing system in depth so you thoroughly understand the current

operations, uncover all possible problems and enhancements, and determine the

causes and effects of these problems or enhancements.

• Determine the users’ requirements for the proposed system, which includes their

wants and needs

• Present alternative solutions to the problem or enhancement and then recommend

a proposed solution.

Structured analysis and design tools: one of the difficulties of analyzing any system is

documenting the findings in a way that can be understood by everyone. Structured

analysis and design addresses this problem by using graphics to present the findings.

Example of tools used (entity-relationship diagrams, data flow diagrams and project

dictionary).

Entity Relationship Diagram (ERD): is a tool that graphically shows the connections

among entities in a system. An entity is an object in the system that has data. Example:

a cybercafé might have customer, order, menu item, computer, and vendor entities.

Data Flow Diagram (DFD): is a tool that graphically shows the flow of data in a system.

The key elements of a DFD are the data flows, the processes, the data stores, and the

sources.

Example Diagram

• A line with an arrow indicates a data flow.

• A data flow shows the input or output of data or information into or out from a

process.

• A process, which is drawn as a circle, transforms an input data flow into an output data flow.

SIX

| IN

FOR

MA

TIO

N S

YST

EMS

DEV

ELO

PM

ENT

Page 72: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

72

• A rectangle with no sides is a data store.

• A data store is a holding place4 for data and information.

Project Dictionary: contains all the documentation and deliverables of a project. The project dictionary

helps everyone keep track of the huge amount of details in a system.

The build-or-by decision: the organisation decides whether to buy software or build its own.

Page 73: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

73

Packaged software: is mass-produced, copyrighted, prewritten

software available for different types of computers.

Custom software: Application software developed by the user or at the user’s

request is called custom software.

Horizontal market software: meets the needs of many different types of companies.

Vertical market software: is designed for a particular business or industry. Examples

of companies that use vertical market software include banks, schools, hospitals,

real estate offices, libraries, and insurance companies.

Difference between Horizontal and Vertical Software

Horizontal market software packages tend to be widely available because a large

number of companies use them. Thus, they typically are less expensive than vertical

market software.

Trade publication: is a magazine written for a specific business or industry.

Companies and individuals that have written software for these industries often

advertise in trade publications.

6.10 DESIGN PHASE

Acquiring essential hardware and software: once the committee decides to build its

own software, you need to buy the appropriate hardware and software. The

following tasks need to be followed in order to select the correct hardware and

software.

• Identify technical specifications

• Solicit vendor proposals

• Test and evaluate vendor proposals, and

• Make a decision

Identifying technical specifications: to identify all the hardware, software, and

networking requirements with respect to functionality, features, and performance.

Once the technical requirements have been defined, the system analyst summarizes

the requirements in either a request for quotation or proposal.

RFQ: identifies the product(s) you want. With an RFQ, the vendor quotes a price for

the listed product(s).

RFP: In this the vendor selects the product(s) that meets specified requirements and

then quotes the price. Some companies prefer to use a request for information.

SIX

| IN

FOR

MA

TIO

N S

YST

EMS

DEV

ELO

PM

ENT

Page 74: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

74

RFI: is a less formal method that uses a standard form to request information about

a product or service.

Soliciting Vendor proposals: you will find up-to-date products, prices, technical

specifications, and ordering information on the Internet. A warranty is a guarantee

that a product will function properly for a specified time period. Another means of

identifying software suppliers is to hire a computer consultant or use a value-added

reseller.

Testing and evaluating vendor proposals: a popular technique is to establish a scoring

system that you can use to rate each proposal objectively.

Making a Decision: is when you purchase hardware, you usually own it; however,

when you purchase software, you do not. With software, you purchase an end-user

license agreement, which is the right to use the software under certain terms and

conditions.

Detailed decision: The activities to be performed include developing designs for the

databases, inputs, outputs, and programs.

Prototyping: a prototype is a working model of the proposed system. The advantage

is that users can work with the system before it is completed – to make sure it meets

their needs. The process of developing applications with prototypes is a component

of rapid application development (RAD). A disadvantage is that it is documented

inadequately. Prototyping can be an effective tool if all activities within the life cycle

are followed and it should not replace or eliminate activities instead it should improve

the quality.

CASE Tools: Computer-aided software engineering products are computer-based

tools designed to support one or more activities of the life cycle is also increases the

efficiency and productivity of the project development team.

SIX

| IN

FOR

MA

TIO

N S

YST

EMS

DEV

ELO

PM

ENT

Page 75: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

75

Quality review techniques: structured walkthrough is a popular step-by-step review

of any deliverable (e.g. reports, diagrams, mock-ups, layout charts, and dictionary

entries). Walkthrough identifies errors in the delivery been reviewed which must be

corrected by the information system personnel.

6.11 THE IMPLEMENTATION PHASE

Four major activities are performed in this phase:

6.11.1 If necessary, develop programs

6.11.2 Install and test the new system

6.11.3 Train and educate users

6.11.4 Covert to new system.

6.11.1 Develop programs: The program

development life cycle follows these six steps:

Analyze the problem

Design the programs

Code the programs

Test the programs

Formalize the solution

Maintain the programs

6.11.2 Install and test the new system: all

hardware and software should be tested

thoroughly. Three types of tests are performed to test the new system:

Systems test: verifies that all programs in an application work together

properly

Integration test: verifies that an application works with other applications

Acceptance test: performed by end-users, checks that the new system works

with actual data.

6.11.3 Train and educate Users: training involves showing users exactly how they will

use the new system. Education is the process of learning new principles or theories

that help the users understand the system.

Self-Quiz

(Find the true statement, and rewrite the

false statement so that they are true) 1.

Feasibility is the process of

planning, scheduling, and then

controlling the activities during

system development. 2.

Maintaining up-to-date documents

should be an ongoing part of system development.

3. Users should not be involved in systems development.

4. The planning phase for a

project begins when the steering

committee receives a Gantt Chart.

SIX

| IN

FOR

MA

TIO

N S

YST

EMS

DEV

ELO

PM

ENT

Page 76: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

76

Conversion

strategy

Description Advantage Disadvantage

Direct

Conversion

The user stops using the

old system and begins

using the new system on

a particular date

It requires to

transition costs

and is quick to

implement.

Extremely

risky and can

disrupt

operations

Parallel

Conversion

Consists of running the

old system alongside the

new system for a

specified time period.

Results from both systems

are compared

Any problems with

the new system

can be solved

before the old

system

terminated.

It is costly to

maintain two

systems

simultaneously.

Phased

Conversion

Split into individual sites.

Each site is converted

separately at different

times using either direct

or parallel conversion

Pilot Conversion

Only one location in the

organisation uses the new

system, so it can be

tested.

6.11.4 Convert to the new system: the following conversion strategies: direct, parallel, phased, or pilot.

6.12 SUPPORT PHASE

The support phase consists of four major activities and provides ongoing assistance for an information

system and its users after implementation.

• Post-implementation review: a meeting is held with the users to find out whether the program is

performing according to their performance

• Identify errors: i.e. it does not produce correct results. These errors are caused from problems with

design (logic) or programming (syntax)

• System enhancement: involves modifying or expanding an existing application system

• Performance monitoring: the purpose is to determine if the system is inefficient at any point and if

the inefficiency is causing a problem

Page 77: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

77

ASSESSMENT QUESTIONS

1. What is project management?

2. To plan and schedule a project effectively, what

components of the project must the project leader

identify?

3. How is an unstructured interview different form a

structured interview?

4. What is a JAD session?

5. How is the horizontal application software different from

vertical application software?

6. What are trade publications?

7. How are a request for quotation (RFQ), request for

proposal (RFP), and request for information (RFI)

different?

8. What is a benchmark test?

9. What are the Phases in the System Development Life

Cycle?

10. What are Guidelines for System Development?

11. Why are Project Management, Feasibility Assessment,

Data and Information Gathering Techniques, and

Documentation Important?

12. How are Structured Tools such as Entity-Relationship

Diagrams and Data Flow Diagrams Used in Analysis and

Design?

13. Differentiate between packaged software and custom

software.

SIX

| IN

FOR

MA

TIO

N S

YST

EMS

DEV

ELO

PM

ENT

Page 78: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

78

____________________________________________

7. PROGRAMME DEVELOPMENT AND PROGRAMMING

LANGUAGES

______________________________________________

7.1 DEFINING A COMPUTER PROGRAM

A computer program is a set of instructions that directs a computer o performs the

tasks necessary to process data into information.

7.2 THE PROGRAM DEVELOPMENT LIFE CYCLE

The program development life cycle is a set of steps that programmers use to build

computer programs. This cycle consists of six steps.

• Analyze Problem

• Design Programs

• Code Programs

• Test Programs

• Formalize Solution

• Maintain Programs

Learning Outcomes

1. Discuss the program development cycle

2. Differentiate between machine and assembly languages

3. Discuss the object-oriented programming languages and program

development tools

4. Identify the uses of programming languages and program development

SEV

EN

| P

RO

GR

AM

ME

DEV

ELO

PM

ENT

& P

RO

GR

AM

MIN

G L

AN

GU

AG

ES

Page 79: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

79

7.3 INITIATION FACTORS OF THE PROGRAM DEVELOPMENT LIFE CYCLES

Companies’ requests for a new or modified program usually are made at the end of the analysis phase of

the system development life cycle. If the company decides to develop it, The design phase of the SDLC

focuses on creating a detailed set of system and program requirements for the programmer(s). These

detailed design specifications, called the program specification package. The steps of the PDLC begin and

are completed within the implementation phase of the system development life cycle.

7.3.1 Step 1 – Analyse Problem

This analysis step consists of three major tasks:

Self-Quiz

(Find the true statement, and rewrite the false statement

so that they are true)

1. An interpreter is a program that converts an entire source program into machine language

before executing it.

2. C and COBOL are examples of assembly

languages/ 3. C# is an object-oriented

programming language developed by Sun

Microsystems.

4. Delphi is an object-oriented programming language based on PowerBuilder.

5. Two types of low-level languages are

machine language and source language.

Page 80: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

80

• Reviewing the program specifications package –

contains relationships among programs in the

system, as well as the input, output, processing, and

data requirements for each program. Within the

program specifications package, these requirements

are represented as a variety of deliverables such as

charts, diagrams, reports and files. Thoroughly

reviewing these deliverables helps the programmer

understand the nature and requirements of each

program.

• Meeting with the systems analyst and users – to

understand the purpose of the program from the

user’s perspective. A programmer should never make

any change without the both the systems analyst’s

and users’ approval.

• Identifying each program’s input, output, and

processing components – to help collect and better

define these

requirements,

many

programmers use

an IOP chart

(Input Process

Output) which

identifies the

inputs, the

outputs the

program will

generate, and the

processing steps

required to

transform the

inputs into

outputs.

7.3.2 Step 2 – Design Programs

Designing programs involves the following:

• Grouping each programs activities into modules

• Devising a solution algorithm for each module

• Testing the solution algorithms

• Top-down Design

The first set (called main routine) of program specifications are broken into smaller

manageable sections (called subroutines). A module is a section that performs a single

function.

Programmers use a hierarchy chart (also called structure chart or top-down chart) to

represent these modules graphically. The approach is simple, usually reliable and easy

to read and maintain.

• Structured Design

This is an approach in which all program logic is constructed from a combination of

three control structures. These structures control the logical order in which program

instructions are executed so that actions (such as inputs, processes, and outputs, records, calculating

averages and totals, and printing) take place.

SEV

EN

| P

RO

GR

AM

ME

DEV

ELO

PM

ENT

& P

RO

GR

AM

MIN

G L

AN

GU

AG

ES

Page 81: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

81

• Sequence control structure - shows a single action or one action followed by another.

Sequence Control Structure

• Selection Control Structure

Tells the program which action to take, based on certain condition. When evaluated, its result is either

true or false. When the condition in an if-then-else control structure it results in two possibilities: true

or false. If the result is true one action is performed,

if false a different (or possibly) no action is performed.

Action 1

Actio n 2

Action 3

Page 82: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

82

Page 83: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

83

Design Tools

Three commonly used design tools are flowcharts, Nassi-Schneiderman charts, and pseudopodia.

Flowchart

Page 84: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

84

In addition to the Basic Flowchart template, Visio provides a variety of templates for more specific kinds of

diagrams, such as data flow diagrams, timelines, and software modelling.

Flowcharts are diagrams that show the steps in a process. Basic flowcharts are easy

to create and, because the shapes are simple and visual, they are easy to understand.

The Basic Flo wchart template in Microsoft Office Visio 2007 comes with shapes that

you can use to show many kinds of processes, and it is especially useful for showing

basic business processes like the proposal development process shown in the figure

below

SEV

EN

| P

RO

GR

AM

ME

DEV

ELO

PM

ENT

& P

RO

GR

AM

MIN

G L

AN

GU

AG

ES

Page 85: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

85

What the flowchart shapes represent

When you open the Basic Flowchart template, the Basic Flowchart Shapes stencil opens

too. Each shape on the stencil represents a different step in a process.

Of all of the shapes on the Basic Flowchart Shapes stencil, only a few are commonly

used. Those commonly used shapes are described here. For more information about

he less commonly used shapes open the expandable link (Less frequently used

flowchart shapes)at the end of this section.

Terminator: Use this shape for the first and last step of your process.

Process: This shape represents a step in your process.

Predefined process: Use this shape for a set of steps that combine to create a sub

process that is defined elsewhere, often on another page of the same drawing.

Decision: This shape indicates a point where the outcome of a decision dictates the

next step. There can be multiple outcomes, but often there are just two —yes and no.

Document: This shape represents a step that results in a document.

SEV

EN

| P

RO

GR

AM

ME

DEV

ELO

PM

ENT

& P

RO

GR

AM

MIN

G L

AN

GU

AG

ES

Page 86: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

86

Data: This shape indicates that information is coming into the process from

outside, or leaving the process. This shape can also be used to represent materials

and is sometimes called an Input/output shape.

FLOWCHART SHAPES

You can right-click this multi-shape to set to any of the following shapes: Process,

Decision, Document, or Data. Any text you type onto the shape, or information

you add to its Shape Data, remains with the shape.

Stored data: Use this shape for a step that results in information being stored.

On-page reference: this small circle indicates that the next (or previous) step is

somewhere else on the drawing. This is particularly useful for large flowcharts

where you would otherwise have to use a long connector, which can be hard to

follow.

Off-page reference: When you drop this shape onto your drawing page, a dialog

box opens where you can create a set of hyperlinks between two pages of a

flowchart or between a sub-process shape and a separate flowchart page that

shows the steps in that sub-process.

Less frequently used flowchart shapes

Dynamic connector: This connector draws a path around shapes it encounters.

SEV

EN

| P

RO

GR

AM

ME

DEV

ELO

PM

ENT

& P

RO

GR

AM

MIN

G L

AN

GU

AG

ES

Page 87: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

87

Line-curve connector: this connector has adjustable curvature.

Auto-height box: this is a bordered text box that adjusts to accommodate the

amount of text you type. You can set the width by dragging the sides of the shape.

Although this shape doesn't represent a step in a process, it is a handy way to add

a text box to your flowchart.

Annotation: This bracketed text box adjusts to accommodate the amount of text

you type. You can set the width by dragging the sides of the shape. Like the Auto

height box shape, this shape doesn't represent a step in a process. Use this to add

comments about your flowchart shapes.

Manual input: This is a step where a person provides information to the process.

Manual operation: This is a step that must be performed by a person.

SEV

EN

| P

RO

GR

AM

ME

DEV

ELO

PM

ENT

& P

RO

GR

AM

MIN

G L

AN

GU

AG

ES

Page 88: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

88

Internal storage: This shape represents information stored on a computer.

Direct data: This shape represents information stored so that any single record can be

accessed directly. This represents how a computer hard-drive stores data.

Sequential data: This shape represents information stored in sequence, such as

data on a magnetic tape. When data is stored in sequence, it must be retrieved in

sequence. For example, in order to access record 7 you would have to first go

through records 1 through 6.

Card and Paper tape: This shape represents a physical card or paper tape. Early

computer systems used a system of punch cards and paper tape to store and

retrieve data and to store and run programs.

Display: This shape represents information that is displayed to a person, usually on a

computer screen.

Preparation: This shape indicates where variables are initialized in preparation for a procedure.

SEV

EN

| P

RO

GR

AM

ME

DEV

ELO

PM

ENT

& P

RO

GR

AM

MIN

G L

AN

GU

AG

ES

Page 89: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

89

Parallel mode: This shape shows where two different processes can operate

Simultaneously.

Loop limit: This shape marks the maximum number of times a loop can run before it

must go on to the next step.

Control transfer: This shape indicates a step that goes to a step other than the typical

next step when certain conditions are met.

Nassi-Schneider Chart – Unlike flowcharts, an N-S chart does not use lines to show

direction, instead, NS chart use a series of rectangular boxes, one below the next, with

the flow always moving top to bottom.

Pseudo code – uses an abbreviated form of English to outline program logic. You

identify the three basic control structures by their indention: the beginning and end

of the module start at the left margin, and the action within the module are indented.

Quality Review Techniques

A review is done to check for correctness and to uncover any logic errors (is a flaw in

the design that generates inaccurate results). Two techniques used to check for

solution algorithm:

Desk checking: is the process of stepping through the logic of the algorithm with the

test. Five steps are involved:

a) Develop various sets of test data (inputs)

b) Determine the expected result (output) for each set of data, without using the solution algorithm

c) Step through the solution algorithm using one set of test data and write down the actual result

obtained using the solution algorithm

d) Compare the expected result from step 2 to the actual result from step

SEV

EN

| P

RO

GR

AM

ME

DEV

ELO

PM

ENT

& P

RO

GR

AM

MIN

G L

AN

GU

AG

ES

Page 90: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

90

e) Report steps 3 and 4 for each set of test data

If the expected result and the actual result do not match for each set of data, the

program has a logic error.

Testing data: is sample data that stimulates data the program might process when it is

implemented.

7.3.3 Step 3 – Code Programs Coding involves two steps:

• Translating the solution algorithm into a programming language

• Entering the programming language code into the computer

Many different programming languages exist. Each of these has a particular syntax, or

set of grammar and rules, that specifies how to write the instructions in an algorithm.

7.3.4 Step 4 – Test Programs

The goal of program testing is to ensure that the program runs correctly and is error

free. Errors uncovered during this step usually are one of two types:

• Syntax errors - occurs when the code violates the syntax, or grammar, of the

programming language. Misspelling a command, leaving out required punctuation, or

typing command words out of order all will cause syntax error

• Logic errors - Debugging is used to locate and correct syntax and logic errors in a

program.

7.3.5 Step 5 – Formalize Solution

• Reviewing the program code – review the program for any dead code and remove it

• Reviewing all the documentation – documentation becomes especially important if

the program requires changes at a later date

7.3.6 Step 6 – Maintain Programs

• Correcting errors – while using the program one type of maintenance occurs when

users find syntax or logic errors

• Adding enhancements – involves modifying or expanding the existing programs

SEV

EN

| P

RO

GR

AM

ME

DEV

ELO

PM

ENT

& P

RO

GR

AM

MIN

G L

AN

GU

AG

ES

Page 91: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

91

7.4 DEFINING A PROGRAM LANGUAGE

A programming language is a set of word, symbols, and codes that enables a

programmer to communicate a solution algorithm to the computer. A program

development tool consists of user-friendly software products designed to assist in the

creation of information system solutions.

• High Level Language: can run on many different types of computers and operating

systems. It is a machine Independent language. Low Level Language: is a programming

language that is machine dependent. A machine dependent language runs on only one

particular type of computer.

• Machine Languages: machine language instructions use a series of binary digits (1s

and 0s) that correspond to the on and off electrical states of computer. Machine

program languages run only on the computer for which they were developed

(machine dependent).

• Assembly languages: instructions are written using abbreviations and codes

(known as symbolic instruction codes, or mnemonics). A program called assembler

coverts the assembly language to machine language.

• Third-Generation Languages (3GL): instruction is written as a series of English-like

words. Third generation languages require that the program instructions tell the

computer what to accomplish and how to do it. The translation is performed using

either a compiler or an interpreter.

• Fourth-Generation Languages (4GL): uses English-like statements. The

programmer only specifies what the program should accomplish without explaining

how. Many 4GLs work in combination with a database and its project dictionary. SQL

is a query language enabling users and programmers to retrieve data from database

tables.

• Natural Languages: is a type of query language that allows the user to enter

requests that resemble human speech. Natural languages often are associated with

expert systems and artificial intelligence.

List the advantages and disadvantages of the above languages?

7.5 OBJECT-ORIENTED PROGRAM DEVELOPMENT

The structured program design does not provide a way to keep the data and the

program (or procedure) together. Each program has to design how it will use the data

for that particular program. This results in redundant programming code that must

change every time the structure of the data is changed, such as when a new field is

added to a table in a database. With the object-oriented approach, the programmer

can package the data and the program (or procedure) into a single unit called an

object. The procedures in the object are called methods, or operations, which contain

Page 92: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

92

activities that read or manipulate the data. The data elements are called attributes, or

variables. Encapsulation is packaging methods and attributes into a single object. A

major benefit of the object-orientated approach is the inability to reuse and modify

existing objects.

7.6 POPULAR PROGRAMMING LANGUAGES

• BASIC (Beginner’s All-purpose Symbolic Instruction Code): is a simple, interactive

problem-solving language often used in the introductory programming course.

• Visual Basic: is a programming language used to develop Windows-based

applications.

• COBOL (Common Business-oriented Language): is a widely procedural programming

language used for business applications.

• C: programming language is used to develop a variety of software, including

operating systems and operating programs.

• C++: is an object-oriented extension of the C programming language.

• FORTRAN: was one of the first high-level programming languages used for scientific

applications.

• Pascal: is a programming language created to teach structured programming

concepts.

• Ada: was originally designed for embedded computer systems.

• RPG: is a nonprocedural language used for application development on IBM

midrange computers.

Other Programming Languages

ALGOL ALGOrithmic Language, the first structured procedural

language

SEV

EN |

PR

OG

RA

MM

E D

EVEL

OP

MEN

T &

PR

OG

RA

MM

ING

LA

NG

UA

GES

Page 93: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

93

APL A scientific programming language designed to

manipulate tables of numbers.

FORTH A programming language that is similar to C and is used for

small-computerized devices.

HYPERTALK

An object-oriented programming language developed by

Apple to manipulate cards that can contain text, graphics,

and sound.

LISP LIST Processing, a language used for artificial intelligence

applications.

LOGO An educational tool used to teach programming and

problem-solving to children.

MODULA-2 A successor to PASCAL used for developing systems

software.

PILOT Programmed inquiry learning or teaching, used to write

computer aided instruction programs.

PL/1

Programming languages One, a business and scientific

language that combines many features of FORTRAN and

COBOL

PROLOG PROgramming LOGIc, used for development of artificial

intelligence applications

SMALLTALK OBJECT-oriented programming language

7.7 HOW TO SELECT A PROGRAMMING LANGUAGE

Consider the following factors:

• Standards of the organisation

• Interface with other programs

• Suitability of the language to the application

• Portability to other systems

7.8 PROGRAM DEVELOPMENT TOOLS

Are user-friendly software products designed to help both program developers and non-technical users

create solutions to information system requirements?

7.9 APPLICATION GENERATORS (PROGRAM GENERATORS)

Page 94: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

94

Is a program that allows you to build an application without writing the extensive

code required by third generation programming languages? A menu generator allows

the developer to create a menu, or list of choices, for the application options.

7.10 MACROS

Is a series of statements that instructs an application how to complete a task. Macros

are used to automate routine, repetitive, or difficult tasks in an application. One of

the following two methods can be used to create a macro:

• Record the macro

• Write the macro

7.11 RAD TOOLS: VISUAL BASIC, DELPHI, AND POWERBUILDER

Rapid application development is the process of developing software throughout the

system development process, instead of waiting until the implementation phase. A

common approach used in RAD is prototyping.

Three popular RAD tools are Visual Basic, Delphi and PowerBuilder

VISUAL BASIC: the ease of use of Visual Basic’s event-driven programming makes it a

popular RAD tool.

DELPHI: this tool offers a drag and drop visual programming environment. Whereas

Visual Basic uses only an event-driven language, Delphi provides full object-oriented

capabilities.

POWERBUILDERS: uses a proprietary language to help with rapid application

development. It creates powerful applications.

7.12 HTML

Hypertext mark-up language is a special formatting language used to create Web

pages. HTML is a language that has specific syntax rules defining the placement and

format of text, graphics, video, and sound on a web page. You can write HTML using

any text editor or a standard word processing software package. You must save the

code, as an ASCII file with an .htm or .html extension.

7.13 SCRIPTS, APPLETS, AND SERVLETS

A script is an interpreted program that runs on the client; that is, it runs on your computer, as opposed to

running on a Web server.

SEV

EN

| P

RO

GR

AM

ME

DEV

ELO

PM

ENT

& P

RO

GR

AM

MIN

G L

AN

GU

AG

ES

Page 95: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

95

|

• Applets: is the same as script except it runs faster.

• Servlets: is an applet that runs on the server

A major reason for using or using scripts, applets, and servlets is to add multimedia

capabilities to your Web pages. Examples are animated graphics, scrolling messages,

calendars and advertisements.

7.14 JAVA AND PERL

Java is similar to C++. The code segments used to create a Java application is called

JavaBeans. A JavaBean is a platform independent; that is, it can run on any computer

or operating system. Because of its simplicity, robustness, and portability, many

programmers believe that Java will be the programming language of the future.

JavaScript: is an interpreting scripting language that allows you to add functionality

to your Web pages by inserting JavaScript code within an HTML document. It allows

you to add dynamic content and interactive elements such as scrolling messages and

data input forms.

PERL (Practical Extraction and Reporting Language): is an interpreted scripting

language, especially designed for processing text. Because of its strong text

processing capabilities, has become a popular language for writing scripts

ASSESSMENT QUESTIONS

1. What are the Six Steps in the Program Development Life Cycle?

2. What is Top-Down Program Design?

3. What are Structured Program Design and Control Structures?

4. How are the Categories of Programming Languages Different?

5. What is the Object-Orientated Approach to Program Development?

6. What Programming Languages are Commonly Used Today?

7. Why are Application Generators, Macros, and RAD Tools Used?

8. What are the HTML, DHTML, and XML Web Page Development Tools

9. What are Scripts, Applets, and Servlets?

10. How is the if-then-else control structure different from the case

control structure?

11. How is the do-while control structure different from the do-until

control structure?

12. What is proper program design? What are dead code, infinite loops,

entry points, and exit points?

13. How is a logic error different from a syntax error?

14. What is desk checking?

Page 96: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

96

15. How is a compiler different from an interpreter? What is an

advantage of an interpreter?

Page 97: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

97

___________________________________________________________

Page 98: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

98

8. SECRUITY, PRIVACY AND ETHICS

Learning Outcomes

1. Describe the types of computer security risks

2. Identify ways to safeguard against computer viruses, worms, Trojan

horses, botnets, denial of service attacks, back doors and spoofing

3. Discuss information privacy issues

8.1 COMPUTER SECURITY: RISKS AND SAFEGUARDS

Any event or action that could cause a loss of or damage to computer hardware,

software, data, information, or processing capability is considered a computer

security risk.

8.2 COMPUTER VIRUSES

Is a potentially damaging computer program designed to affect, or infect, your

computer negatively altering the way it works without your knowledge or

permission?

EIG

HT

| SE

CU

RIT

Y, P

RIV

AC

Y &

ETH

ICS

Think Point Are digital facelifts ethical? Why or why not? How might some people take advantage, for god or bad, of digital facelift technology? Should publishers of photos be required to inform their audience when such technology has been applied to a photo? Why or why not? Are digital facelifts any different from photo touch - ups done for fashion magazines? Why?

Page 99: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

99

___________________________________________________________

Page 100: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

100

Viruses are a serious problem. Four main types of viruses exist:

• Boot Sector virus:replaces the boot program used to start a computer with a modified, infected

version.

• File virus: attaches itself to or replaces program files.

• Trojan horse virus: is a virus that hides within or is designed to look like a legitimate program.

• Macro virus: uses the macro language of an application.

Differentiate between a logic bomb and a time bomb?

Page 101: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

101

8.3 VIRUS DETECTION AND REMOVAL

An antivirus program protects a computer

against viruses by identifying and removing

any computer viruses found

in memory/files, on storage media and in

coming memory/files. Polymorphic is an

example of a virus that cannot be detected

easily because program code changes each

time.

Learner must understand how an antivirus

program works?

Once an antivirus program identifies an

infected file, it can remove the virus or

quarantine the infected file (i.e. the

antivirus program place the infected file in a separate area of your computer until you can remove the

virus, thus insuring that other files will not become infected.

8.4 UNAUTHORISED ACCESS AND USE

Unauthorised access is the use of a computer or network without permission whereas, unauthorized is

the use of a computer or its data for unapproved or possibly illegal activities. By using access control one

can prevent unauthorized access/use.

8.5 WHAT DO YOU UNDERSTAND BY IDENTIFICATION ANDAUTHENTICATION?

Some guidelines /precautions that can be taken when choosing a password:

• Password should be at least eight characters long (depends on software)

• Join two words together

• Mix words and numbers

• Choose words form other languages

• Choose names of promote places or family far back in your family tree

• Do not keep passwords close to your computer

• You a password that is easy for you to remember

Self-Quiz

(Find the true statement, and rewrite the false statement so that

they are true)

1. An end-user license agreement (EULA) permits

users to give copies to friends and colleagues, while

continuing to use the software.

2. Encryption is a process of converting cipher-text into plaintext to prevent unauthorised access.

3. Mobile users are not susceptible to hardware

theft. 4. Overvoltage’s can cause immediate and

permanent damage to hardware.

Two back-up security standard are Wi-Fi Protected

Access and 802.11i.

Page 102: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

102

• Do not share your passwords would others

8.5.1 Possessed Objects

Is any item that you must carry to gain access to a computer or computer facility (e.g.

badges, cards and keys). A PIN (personal identification number) is a numeric

password.

8.5.2 Biometric Devices

Authenticates a person requesting access by verifying personal characteristics such as

fingerprints, hand size, signature and typing patterns, and retinal (eye) and voice

patterns.

8.5.3 Call-back System

With a call-back you can connect to a computer only after the computer calls you back

at a previously established telephone number. To start the call back system, you call

the computer and enter a user ID and password. If the password is valid, the computer

instructs you to hang up and then calls you back at the previously established number.

8.5.4 Hardware TheftTo

help minimize theft:

• Keep doors and windows locked

• Install alarm systems

• Use cables to lock computers

• Never leave laptops unattended to in public places

Computer vandalism is in the form of deleting files, cutting cables, smashing computer

during break-ins.

8.5.5 Software Theft

• Software privacy – unauthorized or illegal duplication of copyrighted software.

Software license is an agreement that provides specific conditions for use of the

software, which users must accept before using the software. Unless otherwise

specified by a software license, you do not have the right to copy, loan, rent, or in any

way distribute software

Differentiate between site license and network site license

• Stealing of CD-ROM or floppy disks to intentional piracy of software also constitutes

software theft.

8.5.6 Information Theft

An example is unauthorized access to a computer and stealing credit card numbers

stored in an accounting department.

EIG

HT

| SE

CU

RIT

Y, P

RIV

AC

Y &

ETH

ICS

Page 103: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

103

Encryption is one method of protection. It is the process of converting readable data

into unreadable data. Once the data is encrypted the recipient needs to decrypt, it

into a readable form. The two basic types of encryption are private key (the originator

and recipient use the same encryption key to encrypt and decrypt) and public key

(uses to encryption keys: a public key known to everyone and a private key).

8.5.7 System Failure

This is the prolonged malfunction of computer Aging hardware, natural disasters and

storms can cause a system to fail. One of the more common causes of system failures

is an electrical power variation.

A brownout is a prolonged under voltage. Under voltage can cause data loss but

generally do not cause equipment damage. An overvoltage, or power surge, occurs

when incoming electricity increases significantly above the normal 120 volts. A

blackout is a complete power failure.

8.5.8 Backup Procedures

Backup is a duplicate of a file, program or disk that can be used if the original is lost

or damaged. You restore the files by copying the backed up files. You can perform

three kinds of backups:

• A full backup – this will backup all the files on your computer.

• A differential backup – duplicates only the files that have changed since the last full

backup

• An incremental backup duplicates on the files that have changed since the last full

or incremental backup.

EIG

HT

| SE

CU

RIT

Y, P

RIV

AC

Y &

ETH

ICS

Page 104: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

104

8.5.9 Disaster Recovery Plan

Is a written plan showing the steps an organisation would take to restore computer operations in the event

of a disaster?

The emergency plan is taken directly after disaster and contains the following:

• Emergency numbers (e.g. management, fire and police department)

• Steps to be followed in respect of computer equipment (equipment shutdown, power shutoff, file

removal)

• Staff evacuation steps

• Return steps; that are who can re-enter the area and what actions they can perform.

The backup plan specifies how an organisation will use backup files and equipment to resume information

processing.

• The location of backup files, supplies and equipment

• The staff responsible for getting the backup resources

• A schedule indicating the order and approximate time each application should be up and running

The recovery plan specifies the actions to be taken to restore full information processing operations

The test plan records an organisations ability to recover.

8.6 DEVELOPING A COMPUTER SECURITY PLAN

A computer security plan contains all information on the company’s safeguard procedures of information

assets. A computer security plan should do the following;

• Identify all information assets including hardware, software, documentation, procedures, people,

data, facilities, and supplies

• List al security risks that may cause an information asset loss

Page 105: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

105

• For each risk, identify the safeguards that exist to detect, prevent, and recover from

a loss

8.7 INFORMATION PRIVACY

8.7.1 Unauthorized Collection and Use of Information Common

points to note with regards to laws:

• Information collected and stored about individuals should be limited to what is

necessary

• Provisions should be made to restrict access to the data

• Personal information should be released outside the organisation with consent from

that person

• The individual should know that the data is being collected and have the opportunity

to determine the accuracy of the data.

8.7.2 Employee Monitoring

Involves the use of computers to observe, record, and review an individual’s use of a

computer, including communications such as e-mail, keyboard activity (used to

measure productivity), and Internet sites visited.

8.8 ETHICS AND THE INFORMATION AGE

Computer ethics are the moral guidelines that govern the use of computers and

information systems. Five areas of concern:

• Unauthorized use of computer systems

• Software theft (piracy)

• Information privacy

• Information accuracy

• Codes of ethical conduct

The first three has been discussed previously.

Information Accuracy: Inaccurate input can result in erroneous information and

incorrect decisions based on that information.

Codes of Conduct: Is a written guideline that helps determine whether a specific

computer action is ethical or unethical.

8.9 INTERNET SECURITY AND PRIVACY ISSUES

In addition to identification and authentication techniques intranets can use firewalls

to prevent unauthorized access to data and information.

EIG

HT

| SE

CU

RIT

Y, P

RIV

AC

Y &

ETH

ICS

Page 106: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

106

8.10 INTERNET ENCRYPTION

To provide secure transmission, many Web browsers use encryption. Two popular users of encryption

on the Internet include Secure Sockets Layer and digital signatures.

Secure Sockets Layer: provides a two-way encryption along the entire route data, travels to and from your

computer. Web pages that use SSL typically begin with the

https protocol instead of http protocol

Page 107: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

107

Digital Signatures : is an encrypted code that a person, Web site, or company attaches

to an e - mail message. Digital signatures ensure that an impostor is not participating

in an Internet transaction. A digital certificate is a notice that guarantees a user or a

Web site is legitimate. A certificate authority is an authorized company or person that

issues and verifies digital certificates.

8.11 OBJECTIONABLE MATERIALS ON THE INTERNET

The Internet contains information that can upset many people. A rating system

similar t o those used for videos can be used. Concerned parents can set the rating

limitations can prevent them from being changed using a password.

Another method is to use censor ware, which is software that can restrict access to

specified Web sites.

ASSESSMENT QUESTIONS

1. In terms of computer viruses, how is a logic bomb different from

a time bomb? What is a worm?

2. What is a virus signature? Why is a polymorphic virus difficult to

detect?

3. What conditions typically are included in a single - user license

agreement? What is the Business Software Alliance (BSA)?

4. How is private key encryption different from public key

encryption? What is the government’s key escrow plan?

5. What are some com mon points shared by federal and state laws

regarding the storage and disclosure of personal data?

EIG

HT

| SE

CU

RIT

Y, P

RIV

AC

Y &

ETH

ICS

Page 108: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

108

ASSESSMENT QUESTIONS

Match column A with column B and Answer the Questions Below:

Column A Column B

1

2

3

4 5

User ID and password

Possessed object

Personal Identification

number (PIN)

Biometric Device

Callback System

A

B

C

D

E

F

G

Authenticates by verifying a physical characteristic such as fingerprints or retinal pattern.

Word or series of characters that must match an authentication file stored on a computer.

Encrypted code that a person, Web site, or company attaches to an electronic message.

Connects to a computer only after the computer calls back at a previously established number.

Numeric password, either assigned by an organisation or selected by the user.

Item that must be carried to gain access to a computer or computer facility.

Uses special electrical components to smooth out minor

noise and provide a stable flow.

Page 109: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

109

_________________________________________________________

9. MULTIMEDIA

_________________________________________________________

Learning Outcomes

1. Identify widely used graphics and multimedia programs

2. Identify types of application software used in communication

9.1 DEFINING MULTIMEDIA

Page 110: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

110

Multimedia refers to any computer-based presentation or application that integrates one or more of the

following: text, graphics, animation, audio, and video. Interactive multimedia describes a multimedia

that accepts input from the user by means of a keyboard, voice, or pointing device.

9.1.1 Text

These are characters that are used to create words, sentences, and paragraphs. A

different font size, colour, or style, for example, often is used to emphasize certain

words or phrases.

9.1.2 Links

With many multimedia applications, you navigate through the content by clicking links

with a pointing device. Recall from the previous chapter that web pages use

hyperlinks, or links to allow users to navigate quickly from one document to another.

In a multimedia application, a link serves a similar function, allowing users to access

information quickly and navigate from one to another in a nonlinear fashion

9.1.3 Graphics

Is a digital representation of non-text information, such as drawing, chart, or

photograph? Graphic serve several functions:

• Graphics can illustrate certain concepts more vividly than text

• Graphics play a vital role in the learning process: many people understand much

faster and retain more information if they see the information presented graphically

• Graphics serve as a navigation element (i.e. applications use graphics as buttons that

link to more information).

9.1.4 Animation

Displaying a series of still graphics creates an animation, which is a graphic that has

the illusion of motion. Animations range in scope from the basic graphic with simple

motion (e.g. blinking icon) to a detailed image with complex movements.

9.1.5 Audio

Audio is music, speech, or any other sound. To store these sounds, a computer converts

the analog sound to a digital format.

9.1.6 Video

This consists of photographic images that are played back at speeds of 15 to 30 frames

per second and provide the appearance of a full motion. Videos reinforce text articles,

brings dull subjects to life. To use video in a multimedia application, you first must

capture, digitize, and edit the video segments using special video production

hardware and software.

9.2 MULTIMEDIA APPLICATIONS

NIN

E

| M

ULT

IMED

IA

Page 111: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

111

A multimedia application involves the use of multimedia technology for business,

education, and entertainment.

9.2.1 Computer-Based Training

This is when a learner learns by using and competing exercises with instructional

software. CBT training serves as an advantage for the following reasons:

• Self-paced study. Learners can learn at their own pace

• Unique content. The multimedia content appeals to many types of learners and can

help make difficult concepts simple. Various media elements used to present the same

information provide reinforcement

• Unique instructional experience. Simulations allow learners to learn skills in

hazardous, emergency, or other real-world situations

• Reduced training time. Self-paced instruction encourages learners to take the most

efficient path to content mastery

• One-on-one interaction. Trainers can spend more time with trainees, because

computers handle test delivery and grading

• Reduced training costs. Decreasing training time and eliminating travel reduces costs

9.2.2 Classroom and Special Education

Multimedia is an effective tool for delivering educational material to potential

learners, making learning more exciting and interesting. When using multimedia

applications learners become actively involved in the learning process instead of

passive recipients of information.

9.2.3 Electronic Books and References

One type of electronic book is a digital text that uses links to give the user access to

information. These books have the same features of a standard book.

An electronic reference text, sometimes called an e-text, is a digital version of a

reference book, which uses text, graphics, sound, animation, and video to explain a

or provide additional information.

9.2.4 Newspaper and Magazines

A multimedia newspaper is a digital version of a newspaper distributed on CD-ROM,

DVD-ROM, or via the World Wide Web. A multimedia magazine is a digital version of

a magazine, also distributed on CDROM, DVD-ROM, or via the World Wide Web. An

electronic magazine or e-zine is a multimedia magazine created specifically for

distribution via the Web. Multimedia newspapers and magazines usually include the

sections and articles found in their print-based versions, including departments,

editorials.

NIN

E

| M

ULT

IMED

IA

Page 112: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

112

9.2.5 Entertainment and Edutainment

Multimedia combines elements of television and interactivity, thus making it ideal for

entertainment. An example computer games, use a combination of graphics, audio

and video to create a realistic and entertaining game situation. Often the game

stimulates a real or fictitious world, in which you play the role of a character and have

direct control of what happens in the game.

9.2.6 Virtual Reality

Virtual Reality (VR) is the use of a computer to create an artificial environment that

appears and feels like a real environment and allows you to explore a space and

manipulate the environment. Telecommunication firms and others even are using

personal computer-based VR applications for employee training. As computing power

and the use of the Web increase, practical applications of VR will continue to emerge

in education, business, and entertainment.

9.2.7 Information Kiosks

A kiosk is a computerized information reference centre that allows you to select

various options to browse through or find specific information. A typical kiosk is a self-

service structure equipped with computer hardware and software. Kiosks often use

touch screen monitors or keyboards for input devices and contain all the data and

information needed for the application stored directly on the computer. Locations

such as shopping centres, airports, museums, and libraries use kiosk to provide

information on available services, product and exhibit locations, maps, and other

information. Kiosks also are used for marketing.

9.3 ELECTRONIC MARKETING AND SALES

9.3.1 The World Wide Web

Multimedia applications also play an important role on the World Wide Web, which

is the part of the Internet that supports multimedia. Using multimedia brings Web

Page to life; increases the types of information available on the web; expands the

Web’s potential uses; and makes the Internet a more entertaining place to explore.

Web-based training is an approach to computer-based training that employs the

technologies of the Internet and the World Wide Web. Web training consists of self-

directed, self-paced instruction on a . The advantage is that the content is always up-

to-date.

9.3.2 Multimedia Equipment

Multimedia hardware: selection is an important process in both the development and

delivery of multimedia products.

9.3.3 Multimedia Personal Computer

A MPC is a computer that uses specific hardware and software components to input,

process, and output the various types of media. Most multimedia personal computers

NIN

E

| M

ULT

IMED

IA

Page 113: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

113

are equipped with devices such as a microphone, a CD-ROM and/or DVDROM drive,

speakers, PC camera, and high-resolution monitor.

Sound card: is an expansion card that provides both audio input and output. The

typical sound card has three primary components: an audio digitizer, a Wavetable

synthesizer, and a mixer.

Learners must understand how the three components work.

CD-ROM and DVD-ROM Drivers: a compact disc is an optical storage medium that can

hold a tremendous amount of data. These large storage devices makes it easier for

storing and distributing multimedia applications that contain many large graphics,

audio, and video files.

PC camera: allows a home user to see people at the same time they communicate on

the Internet as well as edit videos from a video camera or VCR, create a movie from

still photographs and videos, and take digital photographs automatically at present

time intervals or when the camera detects motion.

Speakers: provide an easy and inexpensive way to play audio on a multimedia personal

computer.

Display Device: you must evaluate the monitor and video card when you choose a

display for your computer. The video card generates the output required to display

text and graphics on a monitor.

9.3.4 Television and Data Projectors

In order for an audience to see and hear a presentation clearly you require a data

projector or projection system. A large SVGA can be used for smaller groups whereas

a HDTV can be used for a larger group. Connecting a the multimedia computer to a

standard television set requires a NTSC (National Television System Committee)

converter, which converts the digital signal to an analog signal that can be displayed

on the television set. For even larger groups a data projector can be used, which is

directly connected to a computer with a cable and uses its own light source to display

a multimedia application or presentation onto a screen.

9.3.5 Video Capture Card

Is an expansion card that enables you to connect a video camera or VCR to a computer

and manipulate the video input.

9.3.6 Scanners, Digital cameras, and PhotoCDs

Multimedia developers can add colour images and photographs to multimedia

applications using colour scanners, digital cameras, and photo CDs.

NIN

E

| M

ULT

IMED

IA

Page 114: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

114

9.3.7 Laser Disks and Laser Disk Players

Laser disks and laser disk players are part of a read-only videodisk system based

on the same optical disk technology used for compact discs. Laser disks and laser

disk players provide high-quality display of audio and video.

9.3.8 Developing Multimedia Applications

Developing multimedia applications follows a standard process with several

phases.

Analysis

Involve all of the individuals in determining the objectives and requirements for

the application and specifying the essential elements needed for the actual

production.

Design

• Throughout the design, an important tool for the project team is a

flowchart, or map, which includes all of the various media elements in the

application and serves as a blueprint to which the project team can refer.

• Another important tool is the project script, which provides more detailed

information to supplement the flowchart and provides a written record of how

the various elements will be used in the production.

• Screen design this influences the overall effect of the finished product.

Production

• Actual process of creating the media elements

• Original graphics and animation are created by artists

• Digital video and audio clips are recorded using recording devices and a video

capture or sound card.

Multimedia Authoring Software

• Allows you to combine text, graphics, animation, audio, and video into an

application.

• Allows you to design the screen

• The following are important factors to consider when selecting a multimedia

authoring software package:

Quality of application developed

Ease of use and documentation

Responsiveness of vendor’s service and technical support

Compatibility with other applications

Ease of programming

Functionality

System requirements for both user and developer. There are four popular

multimedia authoring packages: Toolbox, Author ware, Director, and Flash.

NIN

E

| M

ULT

IMED

IA

Page 115: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

115

________________________________________________________________

10. ADDENDUM 512 (A): CASE STUDIES

________________________________________________________________

Page 116: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

116

CASE STUDY FOR DISCUSSION

You are employed as a communications advisor at

Telemark, a telemarketing firm with over 1,500

telemarketers. The

president of the company recently attended the annual Internet

Telephony Conference & Expo and came away with the idea that the

company can save hundreds of thousands of dollars annually on local,

long distance, and international calls by using Internet Telephony,

rather than the conventional public switched telephone network

(PSTN). She has asked you to look into the feasibility of making the

switch. Use the Web and/or print media to research the advantage and

disadvantage of internet telephony. How does Internet telephony

work? What type of hardware and software must the company

purchase to make calls over the Internet? Submit your report or use

PowerPoint to create a presentation and share your findings with your

class. Source: Shelly, Cashman and Vermaat (2008)

TEN

| C

ASE

STU

DIE

S

Page 117: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

117

Page 118: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

118

CASE STUDY FOR DISCUSSION

WIKILEAKS: CASE STUDY FOR CYBERWAR?

One of the problems of trying to understand cyberwar is that we don't really know what it looks

like or how it behaves. Mostly, this is due to the fact that the participants/victims don't report

it.

If anything is reported, it is heavily skewed or filtered for political purposes. Ironically, the

situation surrounding the massive WikiLeaks releases may be the very thing people need to

consider what cyberwar looks like. Consider the following:

1. WikiLeaks uses electronic means to get its information. In many cases, it is patently illegal to

procure, possess or publish the documents they have, all higher morality arguments aside.

People would call for prosecution of State Department officials if Russia announced they had all

this information. Why would it be any different for a non-government organization?

At very least, WikiLeaks is a high value target for cyberwar operations, if not an actual weapons

platform in a cyber-campaign.

2. WikiLeaks' assets are all over the globe and can migrate with lightning speed to anywhere. It

took days to apprehend WikiLeaks' leader. The web site's contents changed hosts multiple times

and is almost impossible to take down.

Any attempts to suppress it also affected innocent web sites. This kind of warfare is much closer

to insurgency to conventional warfare.

3. There are lots of mercenaries on both sides. Some sympathize with one side or the other. It's

quite possible that there are some paid or otherwise "attached" elements in the fray as well.

What began with web sites to raise money for legal defense led to DDOS attacks on not only those sites but organizations that processed payments related to the cause.

These hacks and attacks go on, despite the fact that they are technically illegal in many countries.

History is replete with lessons in combatting--and retaining--mercenaries.

4. There is a lot of bad intelligence. EveryDNS was the host/DNS provider at one time for WikiLeaks,

yet EasyDNS was targeted because it was mistakenly attributed in press accounts. Professional

militaries are used to the "fog of war," but most Western societies (and many of their leaders) are not.

In addition, they generally have a low tolerance for mistakes. Unfortunately, many of the

participants are not as highly skilled at dealing with the fog of war as professional military

organizations.

Page 119: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

119

5. Compared to conventional arms, WikiLeaks (and their attackers) require very few people, assets

or resources to operate. In addition to the flexibility and survivability mentioned above, it's very

cheap to support significant operations. The technology and expertise has spread to many

Page 120: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

120

nations so lots of groups can be members of the "cyber club." Unfortunately, many don't have the legal or ethical restraints to which the current world order is accustomed.

6.The heart of the conflict doesn't directly involve nations, but rather groups that aren't national in

character. WikiLeaks itself is a company and many of the partisans are individuals, small groups

or transnational organizations. The most obvious national player is the US government, but it is

largely taking a deliberate strategy, using lawyers and law enforcement agencies rather than

direct action, cyber activities. Unlike many previous cyberwar activities--Georgia and Estonia

come to mind--the activities surrounding WikiLeaks don't have conventional or direct national

political components. This makes it a unique conflict, which might allow us to study a more pure

cyber conflict.

https://www.infosecisland.com/.../10254-WikiLeaks-Case-Study-for-Cyberwar.html (ACCESSED: 13

JANUARY 2011)

Page 121: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

121

CASE STUDY FOR FURTHER READING:

THE STORY BEHIND THE GRAND SUCCESS OF WIKILEAKS

By Vishal Sanjay On January 10, 2011 Under Web News

The most controversial website of the year, or maybe the decade Wikileaks is undoubtedly worth a

case study, the story of how its highly controversial founder started it and how and from where he

gets his offensive content and how his site gained worldwide popularity, like most other case studies

on this blog we don’t have any proof or evidence to prove this, as this is just an assumption on how

famous internet businesses could have started.

Wikileaks started off in 2006 with a group of unknown internet activists out of which only its

spokesperson Julian Assange is known till now. Starting such a site is not that easy, its almost 10 times

as tough as running it.

Firstly the content is not something you find all across the net, every piece of information on Wikileaks

is unique and took a lot of research, this may be easy for us bloggers who create one such article each

week, but they released 10s of thousands of articles each month.

The Initial Content

So the first issue they had was the content, they would at least need about 1000 articles to get the

very first visitor, and as I mentioned above this content takes a lot of research, they have to contact

people, find images and videos, hack into different systems and finally come up with a story that

matters.

Moreover this had to be done a thousand times keeping security, society and the law in their minds,

and however good you’re at it you cannot escape each and every time, and maybe that’s the reason

why the other founders of Wikileaks haven’t yet revealed themselves.

Page 122: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

122

But I’m damn sure that all of them had a clear idea of what they were doing and knew the net,

technology and their niche extremely well.

Page 123: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

123

This would have seemed very tough for you and me, but not for Julian Assange and his friends,

Assange himself was a constant traveler, he had traveled across half a dozen countries before he was

even 14, many of which had a controversial background, he was arrested for hacking when he was

. 14

So he knew a hell lot about the codes he was writing and a lot about his niche as he had witnessed

the differe nt social injustices in many countries, more than what he saw it was the connections he

left behind which helped him come up with the first few articles, and again Wikileaks has 9 Julian

Assange’s and I bet almost all of them had a similar background.

Oh well!! When you know so much about something it’s easy to come up with a few articles on the ,

but these guys used their technical and social resources to get most of their information.

The First Few Visitors

Wikileaks was a unique site with very appeali ng and viral content, the only thing that would take to

make it popular was a single press release, I single trigger would make it go extremely viral, but that

didn’t happen for some reason.

Wikileaks had been active from 2006, but it gained mainstream f ame only by the end of 2009. A few

people had mistaken that the site was born only in 2009, which even I wasn’t sure about.

Page 124: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

124

The site did have traffic all this while, but that was very much lesser than its actual potential, sites like

these can go viral from the very next day, seems to me that the Wikileak’s guys were technically very

advanced, but lacked the marketing skills, m oreover even I felt that Wikileaks isn’t promoting itself

actively, either they are new to it or they are purposely avoiding it.

Funding: Their first source of Funding

Even when Wikileaks got started they had a hell lot of expenses, but they were funded by a few rich

Chinese businessmen and powerful journalists most of who have not yet been identified.

Surely those funds won’t last for 4 years no matter how you control your expenses, I’m sure they

encountered plenty of financial issues from day one, but they were all curbed due to their high profile

friends and donors.

So for three years they ran without revenues which I hate about internet firms these days, and in the

beginning of 2010 t hey started asking for donations from users, which worked out really well as they

were running their business like an NGO. Less than 1% of their readers actually donated, but most of

them who did gave huge donations.

I always had a feeling that Wikileaks was a website which could run on a low budget, and I bet many

of you thought the same, but unfortunately their expenses could near any small mainstream news

network.

They have claimed to have a 9 member advisory board and up to 20 others to support them i n

technical and data management jobs, surely this wouldn’t consume a lot of money, but I’m damn sure

that 29 is not all they have, it’s just impossible to run such a site and publish so much content without

a bit of external hands.

Page 125: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

125

Page 126: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

126

They do have 900 contributors, but this contributor section is filled with mediocre people like you and

me, who can just write, edit and copy and not research and find information, so these guys are in

their chartroom where they find and talk people who have come with the news, but that is not what

scientific journalism is about.

I believe Wikileaks has got its main sources doing field work in controversial places such as Iraq and

Afghanistan, field work meaning insider information, spying and even hacking, most of them are locals

in their respective countries, surely this wouldn’t come cheap, that’s the main reason why they keep

getting into so much of financial issues even when there are millions flowing in as donations each

month.

Online and private donations is the only source of revenue and there is no other source which could

be useful, they cannot monetizethemselves with advertisements as their content is illegal and against

the rules of many countries, neither can they sell premium news like any other news agency as the

main idea behind this is freedom of speech.

Explanation of the scientific journalism

Honestly speaking I had no idea on what this was until recently when it got popular, and I bet most of

you guys too have no idea on this as even Wikipedia didn’t give me the accurate answer.

The term was introduced by Assange himself, and it spread like wildfire after that, he did not tell more

than a sentence in a media coverage, but that got extremely popular and all media entities started to

right about it. So most of the meanings for the term was created by the various media channels.

But I’m sure that Wikileaks has given birth to a new journalism, no matter what the description others

say, I’d say that scientific journalism is fetching information and news while going against terms, rules

and violations, yes it is illegal journalism.

Today most journalists cover news which they are allowed to see, which are shown by the government

and they make and they can’t make any effort to go beyond that.

Page 127: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

127

This is what Wikileaks is different as they find news through hack attacks, spying, stealing and even

bribing at times, they have a huge chartroom or I can say forum where people who want to report

Page 128: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

128

news come up to and then the scientific journalism takes place to learn the truth, the false and the

whole story.

The main driving force behind Wikileaks is the commun ity and that’s actually their main source for

information, but they use the community to report news, whereas the story is created by them,

maybe that’s why they burn so much cash, they are in need of man - power and technical resources.

Rise to mainstream fame – Takeoff stage

Wikileaks got really popular, though it took time they were running really well, but even though

everybody knew about them, nobody spoke about them; this is a marketing defect which is seen in

many companies worldwi de.

Slowly they got viral on social medi a w hich was surely going to make it to big online publications such

as Mashable and Techcrunch and maybe that is when they finally decided to market themselves and

a press release would have been the first plan, press releases for such sites go extremely viral and

would have surely caught the attention of publications suc h as The New York Times, and one

endorsement there would surely trigger a chain.

Page 129: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

129

After this their fame didn’t stop, they kept making controversial releases and they made sure

they are well promoted, more than that they made sure that all their reports had enough

elements to make them entertaining and controversial and that’s what matters for a business

entering into this stage.

When they reached this they were all over the news world - wide and what drove them further

were the various politicians and ce lebrities making both positive and negative comments on

them, no matter what the Federal Government said Wikileaks kept growing its loyal

followership.

This huge followership surely helped them build a community of donors and the long awaited revenue,

but they must have been cautious of not doing anything against the law as during this time most of the

world’s governments were against them.

Page 130: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

130

WIKILEAKS: A CASE STUDY IN WEB SURVIVABILITY

FOR FURTHER READING

By Tony Bradley,PCWorld

In recent weeks WikiLeaks has been targetedby denial-of-service (DoS) attacks,had its hosting

service shut down, been bounced off of Amazon hosting, had its funding through PayPal,

MasterCard and other sources shut down, and its leader arrested on sexual assault-related

charges. The fact that WikiLeaks remains stubbornly and defiantly online holds some lessons for

other sites when it comes to resilience and survivability.

Contrast WikiLeaks with Tumblr or Comcast--both of which experienced severe, prolonged

outages in the past week. Or, compare WikiLeaks virtual invulnerability with the frequent and

frustrating overloads and outages experienced by Twitter. Although the underlying motivation

might be different, all Web sites and Web-based services can learn a thing or two from

WikiLeaks.

In a word (or four), it's called "single point of failure". You don't want any. In fact, if you're

WikiLeaks, you want to build redundancy on your redundancy and be able to survive not just a

single point of failure, but a virtual meltdown of cascading failures.

WikiLeaks has implemented an interwoven network of domains, hosts, servers, and DNS

services to ensure that losing any one provider, or having a server or domain shut down by a

DoS attack will not ultimately impact the availability of the site.

WikiLeaks expanded from using a single DNS provider, to using 14 different DNS providers.

WikiLeaks is directing traffic to at least five different IP addresses, and with the help of the

WikiLeaks community-atlarge it has more than 350 mirror siteshosting its content as well.

Bottom line: It would take a catastrophe of global proportions to completely knock WikiLeaks

offline. Meanwhile, Twitter grinds to a halt if Lindsay Lohan is seen drinking a White Russian

with lunch.

Of course, not every site can afford to build a redundant and interconnected network of Web

hosting, domains, and Web servers capable of withstanding all manner of attack. Tumblr is a

startup with a small team, a smaller budget, and a 24/7 business that has to keep up with rapidly

growing demand. As noted on the Tumblr blog,"Frankly, keeping up with growth has presented

more work than our small team was prepared for."

Even if your organization can't build a network with limitless redundancy and virtually

invulnerable survivability, the lesson for IT and Web admins is to identify and eliminate as many

single points of failure as possible. No one service outage or server crash should take your site

down. Consider the entire network path of your Web traffic and--to the extent that it is possible

Page 131: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

131

and affordable--implement redundant secondary systems to eliminate and single points of

failure.

Page 132: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

132

Page 133: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

133

CASE STUDY FOR INFORMATION

HP Awarded Contract to Implement Texas Electronic Health

Information SystemPriya Lopes

Network to enhance healthcare delivery

PALO ALTO, Calif. – HP today announced a 52-month services agreement with the Texas Health

and

Human Services Commission to create a statewide Medicaid health information exchange. The

contract, valued at $30 million, includes an electronic health history system for all Medicaid

clients. It also will replace the current paper-based Medicaid identification cards with plastic

magnetic stripe cards for automated eligibility verification.

Under the agreement, HP will provide web-based tools to streamline provider interaction and

increase access to health information. Additionally, the updated system as well as process

enhancements will aid the Commission in its efforts to improve prescription services which will provide Medicaid recipients with improved access to their health information.

Enhancements include:

* Permanent ID cards: HP will replace monthly distributed individual paper Medicaid ID cards

with

permanent plastic cards for more than 3 million Medicaid recipients. The state expects to recover

its technology investment in less than three years through this action.

* Provider web portal: HP will create a solution for more than 70,000 Medicaid providers to give

them access to Medicaid recipients’ health histories via a secure electronic health information

exchange network. With access to this information, providers can make better-informed care

decisions for Medicaid recipients, especially when seeing a patient for the first time.

* E-prescribing: Providers will have access to a web-based e-prescribing tool, allowing doctors

to send electronic prescriptions directly to patients’ pharmacies. This is designed to assist in

minimizing medical errors, reduce prescription abuse, increase patient convenience and trim

administrative costs. The new system has the ability to identify and flag certain prescriptions

with dosages that may exceed safety recommendations or drugs that could react adversely

with other medications prescribed to a patient. * Recipient care web portal: HP will develop a

website for recipients to securely access their personal health information and check program

eligibility. Recipients will be more informed and can play a more active role in managing their

own health, as well as the health of their families. The system will include automated

messaging capability that will provide reminders to clients about the availability of periodic

services. The HP infrastructure is designed to support the Commission’s efforts to meet

expected increases in Medicaid recipients in a secure, reliable and cost-effective manner.

The HP solution will emphasize a secure environment in which providers can access health

histories. This strategy avoids the costly common practice of duplicating large sets of data and

Page 134: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

134

enables access to the most current data available. The system includes a robust roles-based

security model that will enable the state to control access and privileges within the system. As

protection of personal health information is mandated by state and federal regulations, the HP

solution places security as one of its highest priorities.

Page 135: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

135

“States need to improve health outcomes and enable better access to healthcare records,” said

Susan Arthur, vice president, U.S. Healthcare, HP Enterprise Services. “With more than four

decades of industry-leading experience, HP will provide the cost-effective healthcare solutions

Texans need.”

The solution will be powered by InterComponentWare’s eHealth Framework, an extensible and

interoperable platform technology that will enable the creation of a common patient health

history across the state.

HP is helping the Texas Health and Human Services Commission in the pursuit of its Instant-On

Government. In a world of continuous connectivity, the Instant-On Government embeds

technology in everything it does to serve the mission of the organization and its citizens. HP is

the nation’s largest provider of Medicaid and Medicare process management services,

administering $95 billion in benefits a year, and serving as fiscal agent or principal IT provider

for Medicaid in 21 states. HP’s global healthcare experience spans payer, provider, government

and life science communities.

About HP

HP creates new possibilities for technology to have a meaningful impact on people, businesses,

governments and society. The world’s largest technology company, HP brings together a

portfolio that spans printing, personal computing, software, services and IT infrastructure to

solve customer problems.

More information about HP (NYSE: HPQ) is available at http://www.hp.com/.

Page 136: BUSINESS ADMINISTRATION, MANAGEMENT ...mypctbc.co.za/HET2016/BEMS/Higher Certificate in Office...2.6 MULTIMEDIA ON THE WEB 2.7 SEARCH ENGINES 2.8 INTRANETS AND FIREWALLS LESSON4 2.9

136