ICT & Multimedia Fundamentals: Computer Hardware Block Diagram (Above)
ICT & Multimedia Fundamentals: Computer Hardware Block Diagram (Above)
        •    text
        •    images
        •    animations
        •    video
        •    audio
    Multimedia applications are commonly used for training / education. Compared to learning
    from a textbook, multimedia applications allow students to see animations, videos, etc. This can
    bring a subject to life and make it much easier to learn.
1|Page
                               ICT & Multimedia Fundamentals
  PROCESS
           The processing unit controls all activities within the system. For every instruction, the
  control unit repeats a set of four basic operations called the machine cycle:
                                                         Fetching
                                                         the process of obtaining a program instructions or
                                                         data item from memory.
                                                         Decoding
                                                         the process of translating a program instruction into
                                                         signals that the computer can execute.
                                                         Executing
                                                         the process of implementing the instructions in a
                                                         program.
                                                         Storing
                                                         the process of writing the result to the storage or
                                                         memory.
The CPU is the 'brain' of the computer. It is the device that carries out software instructions.
                                        A typical, modern, fast CPU runs at around 2.8GHz. That means it can
                                        perform almost 3 billion actions every second!
      Pentium 3, Pentium 4, AMD Athlon, AMD Turon, AMD Phenom, Intel Core i7 and Intel Atom
      are examples of a CPU.
      CPUs usually plug into a large socket on the main circuit board (the motherboard) of a
      computer. They get very hot when they are operating so usually have a large fan attached to
      their top to keep them cool.
      STORAGE
      Storage is a location which data, instruction and information are held for future use. Every
      computer uses storage to hold system software and application software. When we issue a
      command to start the application software, the operating system locates the program in
      storage and loads it into memory.
      A storage medium, also called secondary storage is the physical material in the computer
      that keeps data, instruction and information. A storage device is the computer hardware
      that records or retrieves items to and from storage media. There are two types of storage
      which are primary storage and secondary storage.
2|Page
                                ICT & Multimedia Fundamentals
           storage device. This means that if the computer’s power is turned off the contents of
           RAM disappear and are lost.
           A hard drive, a CD-ROM, a floppy disc and a USB memory stick are all examples of
           secondary storage devices. Secondary storage is non-volatile, so data that is stored on
           these devices remains there safely.
       INPUT
       Input is any data or instructions that we enter into the computer system for processing.
       There are some common ways of feeding input data into the system, which are:
         • typing on a keyboard
         • pointing with a mouse
       CPU accepts instruction from the user and translates the instruction into readable
       information (decode).
       OUTPUT
       Output is data that has been processed into a useful form, called information. There are four
       types of output, which are texts, graphics, audio and video. The text consists of characters
       that are used to create texts, sentences and paragraphs. Graphics are digital representations
       of non text information such as drawings, charts and photographs. Audio is music, speech or
       any other sound. Video consists of images that provide the appearance of full motion.
3|Page
                               ICT & Multimedia Fundamentals
       b. Application Software
          Software that is used to help a user perform a task and solve a problem.
  An operating system is a special piece of software that manages the general operation of a
  computer system:
  Without an operating system, a computer is of little use. But, just having an operating system
  running alone on a computer is also not very useful - we need to have application software
  (such as Microsoft Word, Microsoft Excel, Sony Vegas, Macromedia dreamweaver and etc.) so
  that we can actually do useful tasks with the computer.
  A utility program which is also called a utility is a type of system software that allows a user to
  perform maintenance-type tasks usually related to managing a computer, its devices or its
  programs. Types of utility program are antivirus, screen saver, file manager, file compression,
  diagnostic utility and disc defragmenter.
  Examples of utility program are Winzip, Winrar, Flashplayer, Adobe Reader, CCleaner, iTunes,
  VLC Player, Shockwave etc.
  Useless!
  On its own, the hardware of a computer is a fairly useless lump of plastic and
  metal!
  It Works!
  (But it's not very useful)
Add in an operating system and you have a computer that actually works.
  Useful!
  To do any useful work you will also have to add application software.
+ +
4|Page
                              ICT & Multimedia Fundamentals
  Software :
      • Freeware is software that is available for use at no cost or for an optional fee,but usually
         with one or more restricted usage rights. Freeware is in contrast to commercial
         software, which is typically sold for profit, but might be distributed for a business or
         commercial purpose in the aim to expand the marketshare of a "premium" product.
      • Shareware (also termed trialware or demoware) is proprietary software that is provided
         to users without payment on a trial basis and is often limited by any combination of
         functionality, availability (it may be functional for a limited time period only), or
         convenience (the software may present a dialog at startup or during usage, reminding
         the user to purchase it ).
      • A software suite is a collection of individual programs sold as a single package. The
         software suite is designed to enhance the performance of our work. It typically includes
         word processing, spreadsheet, presentation and e-mail. Currently, Microsoft Office is a
         very popular example of software suite being used. Another examples areMicrosoft
         Office, Appleworks, Corel WordPerfect Office, Office.Org, Lotus Smart Suite.
      • Groupware refers to programs that help people work together collectively while located
         remotely from each other. Programs that enable real time collaboration are
         called synchronous groupware. Groupware services can include the sharing of calendars,
         collective writing, e-mail handling, shared database access, electronic meetings with
         each person able to see and display information to others, and other activities.
  b. Spreadsheet
     A program that processes information in the form of tables. Tables cells can hold values or
     mathematical formula. A spreadsheet is a program that processes information in the form of
     grid of columns and rows. It is also called a table. Table cells can hold values or
     mathematical formulas. Spreadsheets are indispensable tools for anyone who works with
     numbers.
     Some features of spreadsheet include:
              creating, editing and formatting worksheet in rows and columns
5|Page
                               ICT & Multimedia Fundamentals
              containing formulas which can perform calculations on the data in the worksheet
              making charts, which depicts the data graphically such as column charts or pie charts
              what-if analysis, the ability of recalculating the rest of the worksheet when data in a
              worksheet changes.
       Examples : Corel Quattro Pro, Microsoft Excel, Sun StarOffice Calc
   c. Presentation
      An application software that allows a user to create visual aid for presentation to
      communicate ideas, messages and other information to a group. A presentation software
      enables users to create transparencies, slides and handouts for presentation. It allows a user
      to create visual aids for presentation to communicate ideas, messages and other
      information to a group.
      Some features of presentation software include:
              providing a variety of predefined presentation formats that define the
              complementary colours for backgrounds, text and graphical accents on the slides
              providing a variety of layouts for each individual slide such as a title slide, a two-
              column slide and a slide with clip art, a picture, a chart, a table or animation
              enhancing text, charts and graphical images on a slide with 3-D and other special
              effects such as shading, shadows and textures
              setting the slide timing so that the presentation automatically displays the next slide
              after a preset delay
              applying special effects to the transition between each slide
              inserting images, video and audio clips
      Examples : Microsoft PowerPoint, Sun StarOffice Impress, Corel Presentations
   d. Graphics Editing
      Program that can edit digital representation or non-text information such as drawing, charts
      and photograph. Some features of graphics software include:
             drawing pictures, shapes and other graphical images with various on-screen tools
             such as a pen, brush, eyedropper and paint bucket
             modifying the contrast and brightness of an image
             cropping unwanted objects
             removing “red eye”
             adding special effects such as shadows and glows
      Examples : Adobe Photoshop, GIMP, Paint, Macromedia Freehand, Corel Draw
   For example a network allows computers to share files, users to message each other, a whole
   room of computers to share a single printer, etc.
   Network connections between computers are typically created using cables (wires). However,
   connections can be created using radio signals (wireless / wi-fi), telephone lines (and modems)
   or even, for very long distances, via satellite links.
6|Page
                               ICT & Multimedia Fundamentals
Network Topology
     i.   Bus Topology
          In this type of network, a long, central cable, the
          ‘bus’ is used to connect all of the computers
          together. Each computer has a short cable linking
          it to the ‘bus’. Bus topology :
7|Page
                                ICT & Multimedia Fundamentals
            •   Can cope with a break in the ring cable since all computers are still joined together
                (it is now a bus network)
   a. CLIENT/SERVER NETWORK
      A client/server network is a network in which
      the shared files and applications are stored in
      the server but network users (clients) can still
      store files on their individual PCs. A server is a computer that shares information and
      resources with other computers on a network. These services might include:
   b. PEER-TO-PEER NETWORK
      Peer-to-peer or P2P network is a network with all the nodes acting as both servers and
      clients. A PC can access files located on another PC and can also provide files to other PCs.
      All computers in the peer-to-peer network has equal responsibilities and capabilities to use
      the resources available on the network. With peer-to-peer network, no server is needed;
      each computer in the network is called a peer.
Protocols
Protocols provide the rules on how computers communicate. They define how devices
intercommunicate in a network environment. Some protocols :
8|Page
                               ICT & Multimedia Fundamentals
   •   Hypertext Transfer Protocol (HTTP) – This protocol is used to access, send and receive
       Hypertext Markup Language files (HTML) files on the Internet.
   •   Simple Mail Transfer Protocol (SMTP) – This protocol is used for transferring e-mail
       between computers.
   •   File Transfer Protocol (FTP) – FTP is responsible for allowing files to be copied between
       devices.
   •   TCP/IP (Transmission Control Protocol / Internet Protocol) is the internet communication
       protocol. It is a standard that sets the rules computers must follow in communicating with
       each other on a network. Some refer TCP/IP as the Internet Protocol Suite.
   a) Internet
      • The Internet, or the Net, is the
          worldwide, publicly accessible system of
          interconnected computer networks that
          transmit data by packet switching using
          the standard Internet Protocol (IP). It
          consists of millions of smaller business,
          academic, domestic and government networks, which together carry various
          information and services, such as electronic mail, online chat, and the interlinked Web
          pages and other documents of the World Wide Web. Internet is one of the uses of
          communication. Through the Internet, society has access to global information and
          instant communication.
      • Transmission Control Protocol (TCP) and Internet Protocol (IP) are the protocols for
          communication on the Internet.
      • A stream of data that is sent over the Internet is first broken down into packets by the
          TCP.
      • Data packets include the receiving computer's address, a sequence number, error
          correction information, and a small piece of data.
      • IP is responsible for sending the packet to its destination along a route.
      • A telephone dial-up account and modem, a cable modem, or a Digital Subscriber Line
          (DSL) is required for network connection.
      • An ISP (Internet Service Provider) offers one or more Points of Presence (POPs) to
          connect to the ISP's server.
      • The PPP (Point-to-Point Protocol) and the TCP/IP software are required to connect to the
          Internet through an ISP.
      • The amount of data expressed in terms of bits per second (bps) is referred to as
          bandwidth.
      • The greater the bandwidth, the lesser will be the time taken to upload or download
          data.
      • Low-bandwidth modem connections are a bottleneck for sending multimedia across the
          Internet.
      • Bandwidth bottlenecks can be avoided using the following options:
              o Compress data before transmitting.
              o Oblige users to download data only once, and then store that data on the
                   system's hard disk.
9|Page
                                   ICT & Multimedia Fundamentals
                   o    Design multimedia elements to be efficiently compact.
                   o    Design alternate low-bandwidth and high-bandwidth navigation paths to
                        accommodate all users.
                    o Implement incremental streaming methods.
        •      Each Internet service is implemented on an Internet server by dedicated software
               known as a daemon.
        •      Daemons are agent programs that run in the background and wait to act on requests.
        •      It supports services such as Hypertext Transfer Protocol (HTTP) and Post Office Protocol
               (POP).
        •      The other services provided by the Internet include https, ftp, gopher, usenet, telnet,
               Internet Relay Chat (IRC), Simple Mail Transport Protocol (SMTP), and mud.
        •      Recognizable documents and formats are required to work with multimedia on the
               Internet.
        •      MIME (Multipurpose Internet Mail Extensions) type is a standard list of file name
               extensions.
        •      It identifies the nature and purpose of the transmitted data.
    b) Intranet
       An Intranet (intra means within) is an internal network that uses Internet technologies and it
       is a small version of the Internet that exists within an organisation. An intranet is a private
       computer network that uses Internet protocols, network connectivity and possibly the public
       telecommunication system to securely share part of an organisation’s information or
       operation with its employees. Intranet generally make company information accessible to
       employees and facilitate working in groups.
       Simple intranet applications include electronic publishing of organisational materials such as
       telephone directories, event calendars and job postings.
    c) Extranet
       An extranet is a private network that uses Internet protocols, network connectivity, and
       possibly the public telecommunication system to securely share part of a business’s
       information or operations with suppliers, vendors, partners, customers or other businesses.
       Package shipping companies, for example, allow customers to access their network to print
       air bills, schedule pickups, and even track shipped packages as the packages travel to their
       destinations.
        Twisted-Pair Cable - Two insulated copper wires that are twisted around each other. Each
        connection on twisted-pair requires both wires.
        Coaxial Cable - A cable consisting of a conducting outer metal tube that encloses and is
        insulated from a central conducting core, used primarily for the transmission of high-
        frequency signals.
10 | P a g e
                                 ICT & Multimedia Fundamentals
        Fibre Optic Cable - Glass fibre used for laser transmission of video, audio and/or data.
Communication devices
                                           B.       Hub
                                           A hub is a device that
    connects a number of computers together to make a LAN. The
    typical use of a hub is at the centre of a star network (or as part
    of a hybrid network) - the hub has cables plugged into it from
    each computer.
11 | P a g e
                                 ICT & Multimedia Fundamentals
    A hub is a ‘dumb’ device: if it receives a message, it sends it to every computer on the network.
    This means that hub-based networks are not very secure - everyone can listen in to
    communications.
    Hubs are pretty much obsolete now (you can't buy them
    any more), having been superseded by cheap switches.
C. Switch
   A switch, like a hub, is a device that connects a number of
   computers together to make a LAN.
D. Router
   A router is a network device that connects together
   two or more networks. A common use of a router is to
   join a home or business network (LAN) to the Internet
   (WAN). The router will typically have the Internet cable
   plugged into it, as well as a cable, or cables to
   computers on the LAN.
   Alternatively, the LAN connection might be wireless (WiFi), making the device a wireless router.
   (A wireless router is actually a router and wireless switch combined)
   Routers are the devices that join
   together the various different
   networks that together make up the
   Internet.
E. Bridge
   A bridge is a network device that typically links
   together two different parts of a LAN. Whereas a
   router is usually used to link a LAN to a WAN (such as
   the Internet), a bridge links independent parts of a
   LAN so that they act as a single LAN.
12 | P a g e
                                 ICT & Multimedia Fundamentals
F. Firewall
   A firewall is a device, or a piece of software that is placed between your computer and the rest
   of the network (where the hackers are!)
    In addition to physical devices, firewalls can also be software. In fact most computer operating
    systems have a software firewall built in (e.g. Windows, Linux and Mac OS)
G. Modem
   Before the days of broadband Internet
   connections, most computers connected to
   the Internet via telephone lines (dial-up
   connections).
    The reason telephone lines were used is that almost every building in the world is already joined
    to every other via the telephone system. Using the telephone system for connecting computers
    meant that people didn’t have to install new wires to their houses and offices just for computer
    use. In the last few years however, this is exactly what people have done. Special cables have
    been installed just for Internet access. These special cables are designed to carry digital data, so
    no modem is required.
    The word modem is an abbreviation of MOdulator DEModulator.
13 | P a g e
                                ICT & Multimedia Fundamentals
        So, simply put, a modem is required because computers are digital devices and the
        telephone system is analogue. The modem converts from digital to analogue and from
        analogue to digital.
14 | P a g e
                                ICT & Multimedia Fundamentals
    Information is any kind of event that affects the state of a dynamic system. Conceptually,
    information is the message (utterance or expression) being conveyed.
    Machine Code
    The first generation of codes used to program a computer, was called machine language or
    machine code, it is the only language a computer really understands, a sequence of 0s and 1s
    that the computer's controls interprets as instructions, electrically.
    Assembly Language
    The second generation of code was called assembly language, assembly language turns the
    sequences of 0s and 1s into human words like 'add'. Assembly language is always translated back
    into machine code by programs called assemblers.
    Early computers were used almost exclusively by scientists, and the first high-level language,
    Fortran [Formula translation], was developed (1953–57) for scientific and engineering
    applications by John Backus at the IBM Corp. A program that handled recursive algorithms
    better, LISP [LISt Processing], was developed by John McCarthy at the Massachusetts Institute of
    Technology in the early 1950s; implemented in 1959, it has become the standard language for
    the artificial intelligence community. COBOL [COmmon Business Oriented Language], the first
    language intended for commercial applications, is still widely used; it was developed by a
    committee of computer manufacturers and users under the leadership of Grace Hopper, a U.S.
    Navy programmer, in 1959. ALGOL [ALGOrithmic Language], developed in Europe about 1958, is
    used primarily in mathematics and science, as is APL [A Programming Language], published in
    the United States in 1962 by Kenneth Iverson. PL/1 [Programming Language 1], developed in the
    late 1960s by the IBM Corp., and ADA [for Ada Augusta, countess of Lovelace, biographer of
    Charles Babbage], developed in 1981 by the U.S. Dept. of Defense, are designed for both
    business and scientific use.
    BASIC [Beginner's All-purpose Symbolic Instruction Code] was developed by two Dartmouth
    College professors, John Kemeny and Thomas Kurtz, as a teaching tool for undergraduates
15 | P a g e
                                ICT & Multimedia Fundamentals
    (1966); it subsequently became the primary language of the personal computer revolution. In
    1971, Swiss professor Nicholas Wirth developed a more structured language for teaching that he
    named Pascal (for French mathematician Blaise Pascal, who built the first successful mechanical
    calculator). Modula 2, a Pascallike language for commercial and mathematical applications, was
    introduced by Wirth in 1982. Ten years before that, to implement the UNIX operating system,
    Dennis Ritchie of Bell Laboratories produced a language that he called C; along with its
    extensions, called C++, developed by Bjarne Stroustrup of Bell Laboratories, it has perhaps
    become the most widely used general-purpose language among professional programmers
    because of its ability to deal with the rigors of object-oriented programming. Java is an object-
    oriented language similar to C++ but simplified to eliminate features that are prone to
    programming errors. Java was developed specifically as a network-oriented language, for writing
    programs that can be safely downloaded through the Internet and immediately run without fear
    of computer viruses. Using small Java programs called applets, World Wide Web pages can be
    developed that include a full range of multimedia functions.
    Fourth-generation languages are nonprocedural—they specify what is to be accomplished
    without describing how. The first one, FORTH, developed in 1970 by American astronomer
    Charles Moore, is used in scientific and industrial control applications. Most fourth-generation
    languages are written for specific purposes. Fifth-generation languages, which are still in their
    infancy, are an outgrowth of artificial intelligence research. PROLOG [PROgramming LOGic],
    developed by French computer scientist Alain Colmerauer and logician Philippe Roussel in the
    early 1970s, is useful for programming logical processes and making deductions automatically.
    There are also procedural languages that operate solely within a larger program to customize it
    to a user's particular needs. These include the programming languages of several database and
    statistical programs, the scripting languages of communications programs, and the macro
    languages of word-processing programs.
Mark-up Language
    Mark-up language is a language that annotates text so that the computer can manipulate the
    text. Most markup languages are human readable because the annotations are written in a way
    to distinguish them from the text. For example, with Hypertext Markup Language(HTML),
    Extensible Markup Language(XML), and Extensible Hypertext Markup Language(XHTML), the
    markup tags(embeds processing instructions) are < and >.
16 | P a g e
                                  ICT & Multimedia Fundamentals
        •      HTML
                  o   Basics of Hypertext Markup Language (HTML):
                  o   HTML is a markup language.
                  o   It uses tags to perform functions such as formatting text and embedding media.
                  o   HTML tags are enclosed by angular brackets.
                  o   The tags can be written either in upper case or in lower case. They can be
                      bounding or stand-alone tags.
                 o    HTML provides tags for inserting media into HTML documents. These are:
                      The <IMG> tag for inserting inline images.
                      The <EMBED> and <OBJECT> tags for embedding compound documents.
                      The <APPLET> tags for code.
Scripting Language
    Authoring Tools
    Authoring tools (authorware) refers to a program that helps to write hypertext or multimedia
    applications, it helps to link the objects together such as paragraph of text, illustration or a
    song. Authors (Authoring Tools User) can produce attractive and useful graphic by define the
    object’s relationship to each other and sequence them in an appropriate (suitable and fitting)
    order. Besides that, it supports scripting language for more sophisticated (ahead in
    development) application.
    Authoring tools are exclusively for applications that present a mixture of textual, graphical, and
    audio data. Types of authoring tools have card-based, icon-based, timebased, and object-based.
    Examples for authoring tools are Adobe Authorware, Comil Zamrud and Adobe Flash, Adobe
    Director.
    The Internet is a world-wide network that has grown and evolved from an experimental
    network (ARPANet) created by the US military back in the 1960s. Over the years, as more and
    more computers and networks have connected to this network, it has grown into the Internet
    that we know today.
    The Internet connects millions of people, and thousands of businesses, governments, schools,
    universities and other organizations.
17 | P a g e
                                  ICT & Multimedia Fundamentals
    •   The Hypertext Transfer Protocol (HTTP) provides rules for a simple transaction between two
        computers on the Internet.
    •   Hypertext Markup Language (HTML) is a document format for presenting structured text
        mixed with inline images.
    •   The Internet connects private companies, organizations, universities, and individuals.
    •   The Internet is a cluster of computers.
    •   ISPs provide network connections through a dial-up account, a cable modem, or a Digital
        Subscriber Line (DSL).
    •   The Domain Name System (DNS) manages the identities of computers connected to the
        Internet.
                                                  The small, hand-drawn map above show the plan for the
                                                  first connections between four computers on the
                                                  ARPANet. It was drawn by one of the engineers who
                                                  created the network back in 1969.
        INTERNET SERVICES
        Internet users can access services like:
                Email
                E-mail is a system that allows messages to be sent and received by computers. E-
                mail is the most common form of electronic communication. E-mail messages are
                text-based, but other types of file can also be sent as ‘attachments’. E-mails that
                are received wait in a user's inbox until the user is ready to read them. (Unlike a
                telephone call, the user is free to ignore e-mails until they have time to deal with
                them.)
18 | P a g e
                                ICT & Multimedia Fundamentals
               WWW
               The World Wide Web or the Web consists of a worldwide collection of electronic
               documents.
               Each electronic document on the Web is called a web page which can contain text,
               graphics, audio and video.These pages are written in Hypertext Markup Language
               (HTML). Every website has an address or Uniform Resource Locator (URL). The URL is
               formed by the protocol, domain, directory and the document name.
               VoIP
               Internet telephony, or 'VOIP', is becoming very popular both for personal use, and
               within the workplace. Instead of using the normal telephone network (designed to
               carry voices using analogue signals), VOIP systems send voices through the Internet
               as digital data, just like any other Internet data (e.g. e-mails, files, webpages, etc.
               VOIP systems use your Internet
               connection to send and receive phone
               calls.
               VOIP systems can work in several ways:
               Newsgroup
               A newsgroup is a discussion about a particular subject consisting of notes written to
               a central Internet site and redistributed through Usenet, a worldwide network of
               news discussion groups.
               Blogging
               A blog (web log or weblog) is one of the popular activities on the Internet. Most of
               these blogs are publicly shared and the authors frequently update the content on a
               regular basis. A blog is usually referred to the text produced by the author about his
19 | P a g e
                                ICT & Multimedia Fundamentals
               or her thoughts, experiences or interests. A blog is usually referred to the text
               produced by the author about his or her thoughts, experiences or interests.
               Mailing lists
               Mailing list is a collection of names and addresses used by an individual or an
               organization to send material to multiple recipients.
                Instant messaging
               Instant messaging (IM) is a form of communication over the Internet, that offers
               quick transmission of text-based messages from sender to receiver.
               Video Conferencing
               Video-conferencing is a system that allows people to have conversations and
               meetings with other people in different locations, but without leaving their office.
               Note: The camera is usually TV quality - much better than a standard webcam.
               The system uses the following hardware:
               •   Video camera
               •   Monitor
               •   Microphone
               •   Loudspeakers
               •   High-speed network / Internet
                   connection
               Video conferencing is very popular with
               businesses as it means:
                   • No travel costs
                   • No time wasted travelling to other cities / countries
                   • Can organise meetings at short notice
               However there are some problems with video conferencing:
20 | P a g e
                                 ICT & Multimedia Fundamentals
12. Describe the evolution of ICT convergence : information ( content ), computer and
    communication
    Definition Of Computer
    An electronic device for storing and processing data, typically in binary form, according to
    instructions given to it in a variable program.
21 | P a g e
                                   ICT & Multimedia Fundamentals
    Fifth Generation Computers
    Fifth generation computing devices, based on artificial intelligence, are still in development,
    though there are some applications, such as voice recognition, that are being used today. The
    use of parallel processing and superconductors is helping to make artificial intelligence a reality.
    Quantum computation and molecular and nanotechnology will radically change the face of
    computers in years to come. The goal of fifth-generation computing is to develop devices that
    respond to natural language input and are capable of learning and self organization.
    Computer category
    Computers come in all sorts of shapes and sizes. You are all familiar desktop PCs and laptops, but
    did you know that computers can be as small as your mobile phone (in fact your phone is a
    computer!) and as large as a room?!
        a. Mainframe Computer
           A mainframe computer is a large computer, often used by large businesses, in
           government offices, or by universities.
               From their invention back in the 1940s until the late 1960s, computers were large, very
               expensive machines that took up the whole of a room (sometimes several!) These were
               the only computers available.
               The circuit-boards of these computers were attached to large, metal racks or frames. This
               gave them the nickname 'mainframe' computers.
        b. Supercomputer
           Some of the most powerful mainframe computers can process so much data in such a
           sort time, that they are referred to as 'supercomputers'
22 | P a g e
                                   ICT & Multimedia Fundamentals
               have their own, personal computer, instead of having to share access to a mainframe.
               These computers came to be known as desktop computers, or personal computers
               (PCs).
        d. Laptop Computer
                                                 A 'laptop' computer is a light, compact and portable PC.
                                                 Laptops contain a rechargeable battery so that they can
                                                 be used even when not plugged in to a mains power
                                                 supply. They also have a built-in LCD monitor. To make
                                                 them as portable as possible,
                                                 most laptops try to avoid any
               sort of cable or wire. Instead of a mouse, a trackpad is used.
               Instead of a wired connection to a network or printer,
               'wireless' radio connections are used.
               Early portable computers were far from being 'laptops' - you
               would have crushed your legs if you'd tried to put these beasts
               on your lap!
        e. Palmtop Computer
           A palmtop computer is similar to a laptop computer, but smaller.
           It's small enough to fit in the palm of your hand (hence the name!)
           Palmtops are usually not very powerful since fast CPUs require a
           large battery and get hot - both problems in a small device.
23 | P a g e
                                   ICT & Multimedia Fundamentals
        f.     Personal Digital Assistant (PDA)
                                       A PDA is similar to a palmtop computer, except it is even more
                                       compact, and typically has no keyboard, using a touchscreen for
                                       all data input. Since the screen is so small, many PDAs have a
                                       small stylus (plastic stick) that is used to press things on the
                                       screen.
                                       Most PDAs use some sort of handwriting-recognition system to
                                       allow the user to write on the screen, and have their writing
                                       converted into text. PDAs tend to be used a 'digital diaries'
                                       allowing users to take their e-mail, documents, appointments,
                                       etc. with them wherever they go.
                                       Note: You never see PDAs any more since
                                       modern 'smart' phones can do all of this, and
                                       work as a phone too!
    Early PDAs, like early palmtops, were pretty basic. But they were a
    revolutionary way to take digital data with you on the move.
    In the 1990s every business person either had, or wanted one of these!
    PDAs are often called Pocket-PCs (for obvious reasons!)
    Real-Time Processing
    Sometime we need to process data immediately - we cannot wait and
    process it later (e.g. using batch processing). For example, if we want to book a seat on a flight,
    the booking must be processed immediately. We can't put it in a pile and do it later, because
    other people might be trying to book the same seat!
    If an item of input data must be processed immediately, and the result is ready before the next
    input data is accepted, this is known as a real-time system. Typical application where real-time
    processing must be used:
    Batch Processing
    Sometimes we have a lot of data to process and it is all of a similar form (e.g. we might have to
    calculate the pay for 10,000 employees - the calculations we have to do for each employee are
    very similar)
    In cases like this, we can prepare the data into a set or 'batch' and hand it over to the computer
    to be processed in one go. Once we have prepared the batch of data, no user input is required -
    the computer works its way through the data automatically.
    This type of data processing is known as batch processing. An advantage of this type of system is
    that the processing can occur when the computer is not being used for anything else (e.g. at
    night). The job is setup, people go home, and when they return the next morning the work has
    been done.
24 | P a g e
                                   ICT & Multimedia Fundamentals
        •      Payroll processing
        •      Processing bank cheques
        •      Printing of bank statements
        •      Updating of a stock database
    On-Line Processing
    An on-line system is one where the user is directly interacting with the computer - the user is
    'on-line' with the computer.
    So, any system where the user is entering data directly into the computer must be an on-line
    system. If data is being entered and then processed, it's an on-line processing system.
        •      All booking systems (e.g. flight booking, cinema seat booking, etc.)
        •      Computer games (e.g. FPS, driving games, etc.)
References :
http://www.igcseict.info/theory/4/hware/index.html
http://en.wikipedia.org/wiki/Shareware
http://inventors.about.com/od/sstartinventions/a/software.htm
http://www.factmonster.com/ce6/sci/A0840227.html
http://en.wikipedia.org/wiki/Freeware
Multimedia finds its application in various areas including, but not limited to, advertisements, art,
education, entertainment, engineering, medicine, mathematics, business, scientific research and
spatial temporal applications. Several examples are as follows:
Creative industries
Creative industries use multimedia for a variety of purposes ranging from fine arts, to
entertainment, to commercial art, to journalism, to media and software services provided for any of
the industries listed below. An individual multimedia designer may cover the spectrum throughout
their career.
Commercial uses
Much of the electronic old and new media used by commercial artists is multimedia. Exciting
presentations are used to grab and keep attention in advertising. Business to business, and
interoffice communications are often developed by creative services firms for advanced multimedia
presentations beyond simple slide shows to sell ideas or liven-up training.
Entertainment:
Multimedia is heavily used in the entertainment industry, especially to develop special effects in
movies and animations (VFX, 3D animation, etc.). Multimedia games are a popular pastime and are
software programs available either as CD-ROMs or online. Some video games also use multimedia
25 | P a g e
                                 ICT & Multimedia Fundamentals
features. Multimedia applications that allow users to actively participate instead of just sitting by as
passive recipients of information are called Interactive Multimedia.
Education:
In Education, multimedia is used to produce computer-based training courses and reference books
like encyclopedia. A user goes through a series of presentations, text about a particular topic, and
associated illustrations in various information formats.
The idea of media convergence is also becoming a major factor in education, particularly higher
education. Defined as separate technologies such as voice (and telephony features), data (and
productivity applications) and video that now share resources and interact with each other,
synergistically creating new efficiencies, media convergence is rapidly changing the curriculum in
universities all over the world.
Multimedia teaching is more intuitive than old ways; teachers can simulate situations in real life. In
many circumstances teachers do not have to be there, students will learn by themselves in the class.
More importantly, teachers will have more approaches to stimulating students’ passion of learning.
Journalism: News reporting is not limited to traditional media outlets. Freelance journalists can
make use of different new media to produce multimedia pieces for their news stories. It engages
global audiences and tells stories with technology, which develops new communication techniques
for both media producers and consumers.
Multimedia reporters who are mobile (usually driving around a community with cameras, audio and
video recorders, and wifi-equipped laptop computers) are often referred to as Mojos, from mobile
journalist.
Engineering: Software engineers may use multimedia in Computer Simulations for anything from
entertainment to training such as military or industrial training. Multimedia for software interfaces
are often done as collaboration between creative professionals and software engineers.
Industry: In the Industrial sector, multimedia is used as a way to help present information to
shareholders, superiors and coworkers. Multimedia is also helpful for providing employee training,
advertising and selling products all over the world via virtually unlimited web-based technology.
Mathematical and scientific research: In mathematical and scientific research, multimedia is mainly
used for modeling and simulation. For example, a scientist can look at a molecular model of a
particular substance and manipulate it to arrive at a new substance.
Medicine: In Medicine, doctors can get trained by looking at a virtual surgery or they can simulate
how the human body is affected by diseases spread by viruses and bacteria and then develop
techniques to prevent it.
Document imaging: Document imaging is a technique that takes hard copy of an image/document
and converts it into a digital format (for example, scanners).
Disabilities: Ability Media allows those with disabilities to gain qualifications in the multimedia field
so they can pursue careers that give them access to a wide array of powerful communication forms.
26 | P a g e
                                 ICT & Multimedia Fundamentals
H. The Application and impact of ICT and MULTIMEDIA as an enabler in agriculture,
   manufacturing, e-government, Internet banking and e-commerce that contribute towards the
   socioeconomic
   development
    Agriculture is define as occupation concerned with cultivating land, raising crops, and feeding,
    breeding, raising livestock and farming. By using the ICT and Multimedia application such as
    Knowledge Management Systems (KMS) to select the most suitable crop to plant, Global
    Positioning Systems (GPS) to predict the weather and observe what happening to surrounding,
    Geographical Information Systems (GIS) to select the suitable land for the crop to plant, Decision
    Support System (DSS) to help decision makers compile useful information from a combination of
    raw data, documents, and personal knowledge, or business models to identify and solve
    problems and make decisions, and network tool such as mobile phone, radio and wireless
    network to promote your product or contact with the buyer. In this case, the positive impact of
    ICT and Multimedia is help agriculture increase the productivity of crop, improving marketing
    access, opens up new business opportunities around the world, reducing the product cost and
    improve the quality of product.
    Manufacturing is the process of converting raw materials, components, or parts into finished
    goods that meet a customer's expectations or specifications. Manufacturing commonly employs
    a man machine setup with division of labor in a large scale production. So with the application of
    ICT and Multimedia , such as Computer-aided design (CAD) to assist in the creation,
    modification, analysis, or optimization of a design by using computer system and Computer-
    aided manufacture (CAM) to control machine tools and related machinery in the manufacturing
    of work pieces or to assist in all operations of a manufacturing plant, including planning,
    management, transportation and storage by using computer. In this case it come some positive
    impact of ICT and Multimedia is to reduce the product development cost, shorten a product’s
    time to market and stay ahead of the competition such as using CAM in automobile. Meanwhile
    it give a negative impact too, that is reducing the job opportunity for citizen and just providing
    the job opportunity for professional technician to operate the computer system.
    Internet banking is a system allowing individuals to perform banking activities at home, via the
    internet. Some online banks are traditional banks which also offer online banking, while others
    are online only and have no physical presence. Online banking has now become something
    which million of people do on a daily or weekly because online banking through traditional
    banks enable customers to perform all routine transactions, such as account transfers, balance
    inquiries, bill payments, credit card application, view direct debit, view historical statement of
    banking for previous six month and so on. The application of ICT and multimedia in internet
27 | P a g e
                                 ICT & Multimedia Fundamentals
     banking such as Secure Socket Layer (SSL) used to protect the online transactions between their
     customers and so on . The benefit of ICT and Multimedia toward internet banking is eliminates
     time and distance as barriers to banking, new and exciting ways of marketing directly to
     customers, improve the efficiency and effectiveness of online operations. Meanwhile the
     negative impact(threat) of ICT and Multimedia is the attacks on online banking used today are
     based on deceiving the user to steal login data with some computer software program such as
     Cross-site scripting and keylogger or Trojan horses. For and example of internet banking in
     Malaysia is www.maybank2u.com.my , www.citibank.com.my , www.hsbc.com.my and so on.
     E-commerce is the buying and selling of products or services over electronic systems such as the
     Internet and other computer networks and it also consists of the exchange of data to facilitate
     the financing and payment aspects of business transactions. The application of ICT and
     Multimedia in ecommerce is online banking, Secure Socket Layer (SSL) to protect the online
     transactions between their customers, e-mail and fax. With the above application of ICT and
     Multimedia it come a lot of benefit such as effectiveness of online operations and delivery, open
     global markets, new and exciting ways of marketing directly to the customers, offer new data
     products and services via the Web, helped nations to accelerate their economic growth and to
     provide more opportunities for the businesses to grow. At the same time, the opposite impact
     of the ICT and Multimedia is concern over privacy of customer, appear scamming case and so on.
I.   ICT and multimedia as an industry that contributes towards business opportunity and job
     creation
28 | P a g e
                                   ICT & Multimedia Fundamentals
        o      Salesman
        o      Software agent
        o      Hardware agent (supplier of hardware like Kingston, Apple, HP)
        o      Game programmer
        o      Web Designer
        o      Animation Director
        o      ICT/Computer Lecturer, Teacher, Dean, Senior Lecturer, Professor etc.
        o      Subject Matter Expert/Content Expert
        o      Network engineer/Computer technician
        o      Information System officer (Pegawai Sistem Maklumat)
        o      System Analyst/Software Manager/Chief Information Officer (CIO)/Chief Knowledge
               Officer (CKO)
J.   The purpose of acts that govern the usage of ICT and multimedia in Malaysia: Communication
     and Multimedia Act 1998, Computer Crimes Act 1997, Telemedicine Act 1997 and Digital
     Signature Act 1997
        o      Cyber Laws
               Cyber Laws were formed to promote a high level of consumer confidence and to
               protect the information security and network reliability and integrity. Cyber laws
               consist of Communication and Multimedia Act 1998 Copyright (Amendment-statement
               added to improve document, constitution) Act 1997 Computer Crime Act 1997,
               Telemedicine Act 1997, Digital Signature Act 1997
29 | P a g e
                                   ICT & Multimedia Fundamentals
               electronic communications especially on Internet. The encrypted code consists of the
               user’s name and a hash (mess) of all the parts of the message. By attaching the digital
               signature, one can ensure that nobody can eavesdrop (overhear), intercept (seize on its
               way) or temper (adding something else) with transmitted data. Hence, DSA97 is about
               to provides for regulation of public key infrastructure and also make digital signature
               legally valid and enforceable as traditional signature.
               Note that the encrypted code is refers to a part of the URL where the code is pointing is
               encrypted; it can be used to hide sensitive part of target URL of your code to prevent
               users from manipulate. For example, change the values of parameters. This can be
               relevance.
        o      Ethical defined as a guideline is needed to stop the current technology from being
               exploited. Example : replicating original CDs and sell it as pirated software .Computer
               ethics is a system of moral standards or values used as a guideline for computer users.
        o      Privacy defined as the state of being private; retirement or seclusion. The state of being
               free from intrusion or disturbance in one's private life or affairs: the right to privacy.
               Refer to data and information privacy and the right of individuals and companies to
               restrict the collection and use of information to others. There are 3 computer
               technologies to threaten our privacy: Cookie; Electronic Profile and spyware.
        o      Obscenity defined as a statement or act which strongly offends the prevalent morality of
               the time, is a profanity, or is otherwise taboo, indecent, abhorrent, or disgusting, or is
               especially inauspicious. Obscenity is also applied to an object that incorporates such a
               statement or displays such an act. In a legal context, the term obscenity is most often
               used to describe expressions (words, images, actions) of an explicitly sexual nature.
               Example: Pornography
        o Internet Crime defined as any crime or illegal online activity committed on the Internet,
        through the Internet or using the Internet. Identity theft, Internet scams and cyber stalking
        are the primary types of Internet crime. Computer crime refers to any crime that involves
        a computer and a network. Issues surrounding this type of crime have become high-profile,
30 | P a g e
                                 ICT & Multimedia Fundamentals
        particularly those surrounding cracking, copyright, infringement, child pornography, and
        child grooming.
    1. Adware
         Adware can slow down your PC. It can also slow down your internet connection by
         downloading advertisements. Sometimes programming flaws in the adware can make your
         computer unstable.
    2. Backdoor Trojans
         A backdoor Trojan may pose as legitimate software, just as other Trojan horse programs do,
         so that users run it. Alternatively – as is now increasingly common – users may allow Trojans
         onto their computer by following a link in spam mail.
    3. Boot Sector Viruses
         Boot sector viruses spread by modifying the program that enables your computer to start
         up.
    4. Cookies
         Cookies are files on your computer that enable websites to remember your details.
    5. Denial of Service attack (DoS)
         A denial-of-service (DoS) attack prevents users from accessing a computer or website.
    6. Document Viruses
         Document or “macro” viruses take advantage of macros – commands that are embedded in
         files and run automatically.
    7. Email Viruses
         Many of the most prolific viruses distribute themselves automatically by email.
    8. Internet Worms
         Worms are programs that create copies of themselves and spread via internet connections.
    9.Mousetrapping
         Mousetrapping prevents you from leaving a website
    10. Parasitic viruses
         Parasitic viruses, also known as fi le viruses, spread by attaching themselves to programs.
    11. Pharming
         Pharming redirects you from a legitimate website to a bogus copy, allowing criminals to steal
         the information you enter.
    12. Phishing
         Phishing is the use of bogus emails and websites to trick you into supplying confi dential or
         personal information.
Natural Disaster:
31 | P a g e