Nothing Special   »   [go: up one dir, main page]

Communications and The Internet: Scope of The Module

Download as pdf or txt
Download as pdf or txt
You are on page 1of 27

Module IV

Communications and the Internet

Scope of the Module

This module consists of three lessons, namely:

Lesson 1. Communications and Networking

Lesson 2. The Internet

Lesson 3. The E-Commerce

Overview of the Module

This module describes how a microcomputer is used for communications, explains


analog and digital signals, modems, and communications software and networks.
Communication-related services such as E-Mail, Teleconferencing, Electronic Bulletin Board
System, Internet, Interactive Video, Communication Networks, and Information Superhighway
are discussed. It also presents an overview of the internet and describes the types of net,
history, advantages and threats. Electronic Mail, World Wide Web, E-commerce and Internet
viruses are included in the discussion.

Objectives of the Module

After completion of this module, you should be able to:


1. Visualize the principle of communication as applied in computer technology
2. Identify the different computer-related services
3. Familiarize with information superhighway
4. Recognize the relevance of communication software
5. Understand the impact of communications.
6. Understand and recognize the importance of the internet
7. Identify the types and threats of using internet
8. Familiarize with the World Wide Web, E-mail, E-commerce, and Bulletin Board
System.

Suggested Readings

Crisostomo, Conchita. Information Technology Perspectives. Manila: 3K-IT Educational


Services, 1999

1
Introduction to Information Technology
Module IV

Lesson 1.1 Communications

Communication is a process of sending a message from a human service to a human


receiver. With the presence of electromagnetic devices for communicating data over long
distances, communications or telecommunications come in. Before, people communicated
mainly by meeting face to face. With the invention of a telegraph by Samuel Morse in 1800
and of a telephone by Alexander Graham Bell in 1876 electrical communications started.
During the 1950s and 1960s, the universality of mass media using television shifted the world
to global village. Today, we are on the era of cellular phones, e-mail, pagers, portable
computers with fax and voice mail, internet, and on-line information.

We are facing to an age where anything you want can be reached anytime and
anywhere. The link of computers with data communications is one of the most exciting
developments in data processing today. Communications and computers are partners of the
Information Age forming along the cyberspace, Information Superhighways, networking,
electronic global village, bulletin board systems, and on-line services.

Lesson 1.2 Data Communication Process

Data communication is a process by which electronic data and information are moved
and transmitted from one place to another over land, in the air, and under the sea.
Telecommunication systems have improved the effectiveness of sales and customers service
work by creating immediate access to data.

The three basic elements of any data communication process are:

1. A source or sender who creates the message to be transmitted;


2. A medium which carries the message; and
3. A receiver which accepts the message.

Source Medium Receiver


or Sender carries the message

Creates the Receives the


message message

Basic Elements of Data Communication Software

A person who calls to a friend on the telephone is a Sender, the telephone line through
which the voice is transmitted is the Medium, and a friend is the Receiver. The data being

2
communicated may consist of voice, sound, text, video, and graphics. Using data
communication, the sender and the receiver are normally transmitted through computers,
telephone lines, satellites, coaxial cable, microwave links, radio signals, etc. The system
normally connects terminals or other devices to a central computer system as shown below:

terminal telephone lines central computer

Data Communication System

The two methods of moving data from a source to destination are wire and wireless
transmission. In wire transmission, a signal moves through a wire such as telephone wire,
coaxial cable or fiber-optic cable. Different types of wireless transmission use different wave
frequencies and require different type of receivers. Common categories of wireless
transmission include radio and television broadcasting, microwave, radar, and satellite
transmission.

Lesson 1.3 Connectivity

Connectivity refers to the degree or ability to which hardware devices can be


functionally linked to other devices through communication lines. Aside from the physical
devices, connectivity concerns with the degree of connection between software products,
management information system organization, and efficient sharing of information resources.
Connectivity or networking of all hardware, software and databases is the primary function of
many computers today. Total connectivity permits user on the access to mainframe
computers, local area network, file servers, outside information services, other companies,
computers via Electronic Data Interchange (EDI) and all other software and hardware
environments of the company.

Companies with established operating environments use gateway and bridge


technologies to achieve connectivity. Gateways help to alleviate the problems associated with

3
linking incompatible micros, minis and mainframes. A gateway is a combination of software
and hardware that permits networks using different communications protocols to talk to one
another. Bridges enable LANs to continue operation in their present format with the added
advantage of being able to other LAN.

Lesson 1.4 Data Communication Hardware

Commonly used data communication hardware is Modem. It stands for


MOdulator/DEModulator; a device used to convert computer-compatible signals to signals
suitable for data communication facilities, and vise versa. Electrical digital signals are
“modulated” to analog signals for transmission over telephone lines and then “demodulated” for
processing at the destination.

Data Communication Process

The Down-Line Processor is also called as “cluster controller” or “concentrator” or


“multiplexor”. It collects the data from several low speed device like workstations and serial
printers for transmission over a single high speed line. The Front End Processor establishes
the link between the source and destination. It is just like a post office that routes messages
to its destination.

4
Down-Line and Front End Processor

Another data communication hardware is Data PBX which is known as Data Private
Branch Exchange. It is a new generation switching device similar to old-time telephone
switchboard. The data PBX is a computer that electronically connects computers and
workstations for information distribution.

Lesson 1.5 Computer Networks

A network is a system of interconnected computers, telephones, or other


communications devices that can communicate with one another and share applications and
data. Networks have the following advantages: Sharing of peripheral devices, sharing of
programs and data, better communications, security of information, and access to databases.

The types of networks are as follows:

a. Local Area Network (LAN) - a privately owned communications network that serves
users within a confined geographical area. The range is within one office, one building,
or a group of buildings close together.

b. Metropolitan Area Network (MAN) - covers a geographical area the size of a city or a
suburb. Cellular phones are examples of a MAN.

c. Wide Area Network (WAN) - covers a wide geographic area such as a state or a
country. Some examples of computer WAN are internet and telephone systems.

d. Telephone Networks - the two aspects of telephone networks are:

• PBX’s (Private Branch eXchange) - a special-purpose computer that controls


telephone switching at a company site. It automates functions performed by
switchboard operators which automatically assigns each call to an available outside
telephone line.
5
• ISDN (Integrated Service Digital Network) - a digital network that offers consistent
ways of handling voice and computer data in telephone networks.

e. Broadcast Networks - broadcast networks for radio and television via cable. Cable
television delivers more channels with higher quality pictures because vast of
information is carried through fiber-optic cable. Electronic superhighway opens a vast
range of choices including video-on-demand, telecommunications, and interactive
multimedia services such as home shopping, education and videogames.

f. Value-Added Networks (VANs) - these are public data networks that “add value” by
transmitting data and by providing access to commercial databases and software. The
use of VANs is usually sold by subscription where data can be sent between computers
in different locations.

6
Computer networks are configured to meet the specific requirements of an organization.
The basic computer network topologies (configuration of hardware for communication) are:

Star Topology involves a centralized host computer that is connected to a number of


smaller computer systems.

Star Topology

Ring Topology involves computer systems that are approximately the same size and no
one computer system is the focal point of the network.

7
Ring Topology

Bus Topology permits the connection of workstations, peripheral devices and


microcomputers along a central cable called transmission cable.

8
Bus Topology

Lesson 1.6 Uses of Communication

Communications and connectivity enable the users to use telephone - related services
such as fax, voice mail, electronic mail, and teleconferencing. Resources can be shared
through workgroup computing and electronic data interchange. Work can be easy with
telecommuting, mobile workplaces, and virtual offices. On-line information services and
internet can also be used for research, e-mail, games, travel services, information gathering
and teleshopping.

1. Telephone - Related Communication Services

Services available through telephone connections include the following:

a. Fax Messages. Fax which stands for facsimile transmission or reproduction sends and
receives documents over transmission lines to and from other fax machines. A fax
modem which is installed in a computer system sends signals directly from your
computer to someone else’s fax machine or fax modem.

Fax Messages

b. Voice Mail or V-mail. Like telephone answering machine, voice mail digitizes incoming
voice messages and stores them in a recipient’s “voice mail box” in digitized form. It
then converts the digitized versions back to voice messages when retrieved by the user.
Voice mail systems allow callers to direct their calls within an office or deliver the same
message to many people within an organization.

9
Voice Mail

c. Electronic Mail or E-Mail. Electronic mail links computers by wired or wireless


connections and allows users, through their keyboards, to post messages and to read
responses on their display screens. E-mail allows users to send messages in a mailbox
and later pick up messages after entering a password or the message can be sent to
multiple users or other mailboxes on the system at the same time.

Electronic Mail

10
2. Teleconferencing. Teleconferencing is a meeting among people without traveling.
They are linked by a communications device such as telephone, television or computer.
Teleconferencing can be prearranged by business users.

Teleconferencing

The five types of teleconferencing are:

• Audio teleconferencing - meeting among people in different locations using the telephone

• Video teleconferencing - provided by video cameras and monitors that allow people at
different locations to see and hear one another

• Computer teleconferencing - a keyboard conference among several users at


microcomputers or terminals linked through a computer network

• Document teleconferencing - meeting participants not only see and hear one another but
also work on text and graphics projects at the same time

• Desktop video teleconferencing - combination of video conferencing and document


conferencing using computer, camera, microphone and speaker.

3. Shared Resources, Workgroup Computing & EDI

11
• Shared resources - allows people to share equipment that would be unaffordable for
one microcomputer.

• Workgroup computing - also called collaborative computing, enables teams of


co-workers to use networks of microcomputers to share information and cooperative
on projects.

• Electronic data interchange - is the direct electronic exchange between


organizations’ computer system of standard business documents, such as purchase
orders, invoices, and shipping documents.

4. Portable Work: Telecommuting, Mobile Workplaces, & Virtual Offices

• Telecommuting and telework centers - working at home with telecommunications


between office and home is called telecommuting. Telework includes not only those
who work at least part time from home but also those who work at satellite offices.

• The Virtual office - is an often nonpermanent and mobile office run with computer
and communications technology.

5. On-line Information Services - an on-line information service provides access to all kinds
of databases and electronic meeting places to subscribers equipped with
telephone-linked microcomputers.

• Research
• Electronic mail
• Games
• Travel services
• Shopping

6. Electronic Bulletin Board System - is a centralized information source and


message-switching system for a particular computer-linked interest group.

7. The Internet - is an international network connecting approximately 11,000 smaller


networks. The computer, modem, and telephone line that explore on-line services and
BBSs can also be used to connect with the Internet. Whereas there are about 6 million
users of commercial on-line services, an estimated 25 million people worldwide use the
internet.

• Information gathering
• E-mail
• Discussion and news group

8. Interactive Television or Video - television-crossed-with-computers is the least


developed connectivity option and is mostly still in the experimental stage.

12
Nevertheless, this signifies the direction of ease of use in which computers and
communications presumably are headed.

Crucial to new efforts is the matter of interactivity. Currently, broadcast and


cable TV send messages in one direction only. An interactive medium allows user to
respond to and make some changes in TV programs or other information sources.

• Set-top boxes
• Picture phones
• The TV/PC
Introduction to Information Technology
Module IV
Lesson 1
SELF-PROGRESS CHECK TEST
Test I. Multiple Choice

Directions: Write the letter representing your answer on the blank provided for before the
number

_____ 1. It is a new generation switching device similar to old time telephone switchboard
a. Interactive Television
b. Electronic Bulletin Board
c. On-line Information Service
d. Data PBX

_____ 2. Device used to convert computer compatible signals to signals suitable for data
communication facilities and vice versa
a. Modem
b. V-Mail
c. PBX
d. EDI

_____ 3. Direct electronic exchange between organization’s computer system of standard


business documents
a. EDI
b. Workgroup Computing
c. On-line Infrastructure Services
d. Teleconferencing

_____ 4. Meeting among people without travelling


a. E-Mail
b. Teleconferencing
c. Voice Mail
d. Internet

13
_____ 5. Sends and receives documents over transmission lines
a. EDI
b. PBX
c. FAX
d. VAN

_____ 6. It is not one of the basic elements of a data communication process


a. A source or sender who creates message
b. A medium which carries message
c. A storage that keeps message
d. A receiver which accepts message

_____ 7. A combination of software and hardware that permits networks using different
communication protocols to talk one another
a. Connectivity
b. Gateway
c. Internet
d. Data communication

_____ 8. Device which is commonly used by data communication hardware


a. EDI
b. LAN
c. Internet
d. Modem

_____ 9. Not any one of the wireless transmission for data communication
a. radio
b. microwave
c. satellite
d. telephone lines

_____ 10. Computer network which involves a centralized host computer that is connected to
a number of smaller computer systems
a. Star Topology
b. Ring Topology
c. Bus Topology
d. Complex Topology

14
Introduction to Information Technology
Module IV

Lesson 2. THE INTERNET

Lesson Objectives:

After completing this lesson, you should be able to:


1. Identify and differentiate the types of net
2. Familiarize with the history of internet
3. Know the benefits and threats of internet
4. Define World Wide Web and its application
5. Visualize the uses of E-Mail in our everyday life and in business

Lesson 2.1 Introduction

The use of internet has changed the life of the people. The advances in technology
rapidly change the configurations of businesses, lifestyle, knowledge, research, and learning
environment. There were 31 million users were connected to the Internet in 1996 and more
than 150 million are expected by the year 2000. The number of servers will grow to 5 million
by the year 2000. Today, internet is essentially a self governing and non-commercial
community offering the public as a tool in the information gathering, electronic mail,
advertising, video conferencing, and worldwide presence.

Lesson 2.2 The Net

The word “Net” is derived from the word “network”. A network in information technology
is a group of computers and associated facilities that are linked together to enable the sharing
of resources among computers.

There are three types of nets, namely: Internet, Intranet, and the Extranet.

• Internet - It is a vast network of computers or a network of networks. Each network is


connected to the backbone of the internet. This backbone is a high speed transmission line.
Once connected, the individual networks can communicate with each other over the
“backbone”.

• Intranet - It is a closed, business-wide computer network connecting a set of clients through


computers using standard internet protocols. A protocol is a language used by computers
to communicate or talk to each other. The Intranet is an internet protocol - based network
of nodes behind a firewall. A firewall is a special kind of computer that prevents outsiders
from gaining access to the computers within the network. To achieve security on the data,
intranet hides behind several firewalls connected in virtual networks.
15
• Extranet - It is a virtual private Wide Area Network (WAN) based on open network and
protocols. It allows some customers, suppliers, contractors, business partners and other
outsiders to gain access to data within the company through secure means using internet as
the medium.

Lesson 2.3 History of Internet

Internet was first conceived in 1957 when the United States recognized the need for a
special group to level its competition with Russia in the heat of the race for space. With the
formation of Advanced Research Project Agency (ARPA), the first successful US Satellite
focused on communication technology and computer networking, the interactive use of
computer transpired them in the formation of internet. In 1983, the Domain Naming System
(DNS) was established for the people to easily access on other servers.

Lesson 2.4 Benefits of Internet

There are different benefits of internet depending on the type of business. Some of
them are as follows:

1. Creating a client base


2. Product Analysis
3. Expert assistance and advice
4. Market Analysis
5. Recruitment of new employees
6. Information dissemination
7. Rapid communications
8. Document and data transfer
9. New business opportunities
10. Research and development

Lesson 2.5 Threats of the Internet

Individuals and organizations connected through the internet are exposed to the danger
of four major threats such as:

• Denial of information - Some of the information are kept secret.

• Unauthorized access to systems and applications - Lack of security provision, software


bugs and common choice of password pave way to system’s hackers.

• Loss of information integrity - Modification of data is sometimes overlooked

• Denial of service - Due to busy telephone line, defective server, systems malfunction, and
due to inability to communicate others, network or service is ineffective.
16
Theoretically and practically, the internet is advantageous to individuals and
organizations. However, some web hackers could not be prevented. The risk can be
safeguarded and reduced by security implementation, data encryption, firewalls and proper
authentication.

Lesson 2.6 World Wide Web

The World Wide Web (WWW) was released by the European laboratory dedicated for
particle physics. World Wide Web is based on the concept of Multimedia and Hypertext; a
language that provides single view of information regardless of its location or format. Various
applications of WWW are given on the next page:

• Information Sharing - Individuals can obtain information such as product description,


research papers, professional journals, encyclopedia, weather map, financial market data,
etc.

• Software Distribution and Retrieval - New releases of software and updates to existing
software can be retrieved rapidly by the user.

• Video Conferencing - Allows a long distance conferencing and facilitates the outsourcing of
projects to third parties.

• Telecommuting - Allows employees to conduct business from a remote site. The web
provides business the international presence and strengthens ties between clients and
suppliers.

• Advertising - Web sites can be created to promote products and services.

• Marketing - On-line feedback forms can be created to solicit marketing information about the
customer’s preference with their products and services.

• Technical Support - The webs provide a good medium to post technical support solutions
and product updates that can be accessed worldwide.

• On-Line Shopping - Purchase order can be accepted thru internet

17
The World Wide Web and Internet are the latest technology and infrastructure that
changed the routine operations of business and communications. Not only in business, the
technology has captured the awareness of individuals and this will continue to expand in the
future.

Lesson 2.7 Electronic Mail

Electronic mail or e-mail is the use of computers to send and retrieve text messages or
documents addressed to individual people or locations. This electronic technology became
popular in 1980 for effective communication. It is effective in sending message to a person,
getting feedback and response from somebody, requesting for product ideas simultaneously,
distributing requests, and obtaining specific information directly from people throughout the
organization.

The e-mail user is identified by an individual account, usually based on person’s name
and also serves as the person’s e-mail address. The general format is:

[person’s name]@[business establishment].[type of establishment]

Examples of e-mail address are:

President@whitehouse.gov
billg@microsoft.com
crisost@pworld.net.ph

The sender uses a word processor to a create a message and then addresses it to a
distribution list. The distribution list might be an individual account number or a group of
numbers. The recipient can read the message immediately or wait when he has the time. The
e-mail message can be printed, saved, erased, or forwarded to someone else.

Lesson 2.8 Issues Related to E-Mail

• Social context - Communication using e-mail seems to be less caring than personal
communication

• Misinterpretation - People sending messages through e-mail should be careful in saying


things to avoid misinterpretation.

• Privacy and confidentiality - Confidentiality problems may arise because messages can be
read by anybody whoever is near the machine.

• Information overlooked - Normality, e-mail generates higher overloads, more stress, and an
inability to get away from work.
18
E-mail offers confidentiality by entering password or secret word that limits access.

Lesson 2.9 Internet Service Providers

Our country has the most number of Internet Service Provider (ISP) in the Asia-Pacific
Region next only to Japan (PSICOM, Jan. 1999). There are more than 200,000 Filipino users
of internet and it will further increase in the next ten years.

In choosing an ISP, it is important to consider the service features and the price.
Expensive price does not guarantee a quality service. In the Philippines, subscription ranges
from P1,500 to P5,000 and monthly prices range from P550 to P3,500 a month. Direct access
to the internet using either Serial Line Internet Protocol or Point-to-Point Protocol (SLIP/PPP)
provides minimal charge since you do the connection by yourself and there is no need to use
the service provider system. Direct connection initializes a high speed modem of at least
9,600 baud per second (bps) and an internet browser.

Majority of the Philippine’s access providers uses Bulletin Board System (BBS). The
system offers greater opportunity for mass market for internet access because of multiple
telephone lines. Aside from internet access, BBS is a pin-up system for e-mail exchange, file
download, and conference chatting.

19
Introduction to Information Technology
Module IV
Lesson 2

SELF-PROGRESS CHECK TEST

Test I

Directions: Differentiate the following terminology

1. Internet and Extranet

2. E-Mail and V-Mail

3. Video Conferencing and Teleconferencing

4. Web Hackers and Web Virus

5. WWW and E-Mail

Test II

Directions: Answer the following questions briefly

1. What is the relationship of WWW with the use of internet?

2. What are the dangers of using internet?

3. How do you access your E-Mail?

4. Enumerate at least ten (10) internet service providers here in the Philippines

20
Introduction to Information Technology
Module IV

Lesson 3. THE E-COMMERCE

Lesson Objectives:

After completing this lesson, you should be able to:


1. Identify the reasons why we go for E-Commerce
2. Know the stand of the government on E-Commerce
3. Familiarize with various Net Virus

Lesson 3.1 The Electronic Commerce

The Electronic Commerce (e-commerce) means “doing business on-line through web
store fronts. It could be either selling or buying products. Products being traded may be
physical products like books or services such as medical consultancy, virtual education, etc.
Some of the knowledge-based products include news, audio and video, database, software
and other digital products.

Electronic market refers to on-line trading and auctions such as stock market, trading
firms, on-line auctions for computers and other goods. Electronic market place refers to the
converging economy where products intermediaries, and consumers interact digitally or
electronically.

We go to e-commerce because of the following reasons:

• Establish a presence - People will get to know your business since there are hundred million
people worldwide have an access to WWW.

• Network - You can establish connections through WWW

• Make business information available - You can keep your customer more informed about
your business anytime

• Serve customers - Instead of calling customers through telephone, this is an alternative way
of servicing them

• Heighten public interest - Company write-ups can be done through web page address

• Stay in contact with salespeople - Your employees can be easily monitored for further
up-to-date information

21
• Easily get feedback from customers - You can easily response to customer’s feedback and
questions within a 24-hour service.

The e-commerce bill recently introduced in Congress by Senator Juan Flavier intends to
facilitate the use of modern means of communication and storage of information such as
Electronic Data Interchange (EDI) e-mail telecopy. However, the issue is still subject for
debate since not all relevant legal issues are being addressed. Some of these issues are
given below:

• Formation of contracts - Contracts should be in writing and in public document. The rule of
evidence needs proper authentication and identification of signature. Proper authentication
cannot be done with electronic communication.

• Jurisdiction - A person committed a crime in the foreign countries cannot be prosecuted in


the Philippines. Different countries have different rules of law, tax, penalties and contracts.

These issues become more complicated when business have no physical presence or
operations in a country.

Lesson 3.2 The Net Virus

A computer virus is a program or software code that gets into a machine via a disk or an
electronic message. Prior to 1988, computer viruses are designed to protect disk programs
and software from being copied and tampered. They are usually hidden as code segment of
the larger program and have the ability to replicate itself and move from one computer to
another. These viruses remain in the host’s resources and cause destruction of files, alter the
logic of a program, and bring troubles to systems operations such as disk access problems,
keyboard failures, systems problems, monitor-producing garbage, data corruption and loss of
data.

There were about 5,600 PC viruses, 150 Amiga viruses, 100 Acorn Archimedes viruses,
45 Macintosh viruses, four Unix viruses, two OS/2 viruses, three MSWindows viruses, and
several Atari and Apple viruses.

The internet is a ground where viruses can be easily scattered. Lately, the macro virus
has invaded the computer system. Faster than the file infector and boot viruses, it hides inside
macros, the programs inside MSWord and Excel. The first macro virus known as “Concept”
came in 1995. Recently, the “Melissa” virus destructed thousands of computer in March 26,
1999. There are about 2,000 macro viruses delivered through e-mail in an attached Word
document. The e-mail contains the subject line, “Important Message for User Name” or “Here
is that document you asked for... don’t show anyone else...” Melissa’s real damage is network
traffic. Users find hard time browsing the internet and their e-mails are taking so long to arrive.
The Anti Virus Emergency Response Team (NAI AVERT) was able to write a clean-up program
against this virus. To prevent this virus, the attached document should not be opened and
delete the mail immediately.

22
Another recent virus is CIH or “Chernobyl”. It caused severe damage to a relatively
small number of computers. This virus swept last April 26, 1999.

A new e-mail borne computer virus entered the internet last June 10, 1999 that led to
the shutdown of some corporate e-mail systems. The new infection is called “Explore Zip
Worm” that erases files. This worm virus combines the speed of Melissa with the destructive
payload of Chernobyl virus. It disguises like an e-mail that appears to be a response to an
earlier message as “I received your e-mail, and I shall reply ASAP. Till then, take a look at the
zipped docs.”

Some of the common virus hoaxes discovered by the virus experts are as follows:

3b Trojan or PKZIP virus Baby New Year Virus


AIDS Bad Times Hoax
AOL4 Blue Mountain Virus
AOL Year 2000 Update Buddylst.zip
Budweiser Bad Frogs Screen Saver
Dear Friends Death 69
Duyenda E-mail or Get a Virus
E-Flu Fat Cat
Free Money Gets Bearing Gifts
Get more money Ghosts
Good Times Guts to Say Jesus
Hacky Birthday Virus Hairy Palms
Irina Join the Crew
Landhouse Virus Make money fast
Microsoft Virus Millennium Time Bomb
Norton Anti Virus-V5 Penpal Greetings
Red Alert Returned or Unable to Deliver
Teletubbies Time Bomb
Valentine Greetings Very cool
Win a Holiday Word Domination
Yellow Teletubbies

23
Introduction to Information Technology
Module IV
Lesson 3

SELF-PROGRESS CHECK TEST

Test I

Directions: Define the following terminology

1. E-Commerce

2. Net Virus

3. Electronic Market

4. Virtual Education

5. Virus Hoaxes

Test II

Directions: Identify the damages done by the following computer viruses

1. Melissa

2. Chernobyl

3. Explore Zip Worm

24
Introduction to Information Technology
Module IV

ANSWER KEY TO SELF-PROGRESS CHECK TESTS

Lesson 1
Test I
1. d
2. a
3. a
4. b
5. c
6. c
7. a
8. d
9. a
10. a

Lesson 2
Test I
1. Internet is a vast network of computers or a network of networks while Intranet is
a closed, business-wide computer network connecting a set of clients through
computers using standard internet protocols.
2. Electronic Mail (E-Mail) is the use of computers to send and retrieve messages
or documents addressed to individual people or locations while Voice Mail
(V-Mail) digitizes incoming voice messages and stores them in a recipient’s voice
mail box in digitized form then converts the digitized versions back to voice
messages when retrieve by the user.
3. Video Conferencing is a type of teleconferencing which is provided by video
camera and monitors that allow people at different locations to see and hear one
another whle teleconferencing is a meeting among people without travelling.
4. Web Hackers are the people who can be called the threats in IT, who in a way
can be called the criminals on the web by hacking different information while
Web Virus is a program or software code that gets into a machine via a disk or
an elecronic message.
5. World Wide Web is based on the concept of Multimedia and Hypertext while
Electronic Mail (E-Mail) is the use of computers to send and retrieve messages
or documents addressed to individual people or locations.

25
Test II
1. The World Wide Web and Internet are the latest technology and infrastructure
that changed the routine operations of business and communications.

2. There are four major threats in using the internet, namely: the Denial of
information; Unauthorized access to systems and applications; Loss of
information integrity and the Denial of service.

3. On the internet open your e-mail account and click the inbox to retrieve your
e-mail.

4. Revolution, PhilWorld, Infocom, Zoom, PhilWeb, I-Next, Basia, Compass, Pacific


and Supernet.

Lesson 3
Test I
1. E-Commerce means doing business on-line through web store fronts. It could be
either selling or buying products.

2. Net Virus is a program or software code that gets into a machine via a disk or an
electronic message.

3. Electronic Market refers to on-line trading and auctions such as stock market,
trading firms, on-line auctions for computers and other goods. It is the
converging economy where products intermediaries, and consumers interact
digitally or electronically.

4. Virtual Education refers to distance education program wherein lectures,


research and examination are conducted at different using emerging
technologies such as multimedia, computer and video networks, and
video/teleconferencing.

5. Virus Hoaxes refer to program or software that gets into a computer via disk or
electronic message that cause destruction of files, alter the program logic and
bring troubles to a system.

Test II
1. Melissa causes network traffic or users find hard time browsing the internet.

2. Chernobyl causes severe damage to small computers where files are erased and
destroyed.

3. Explore Zip Worm erases files and programs.

Name : ________________________________ Date : _______________


26
Address : ________________________________ Student No: ____________

Introduction to Information Technology


Module IV

MODULE IV TEST

Directions: Answer the following questions:

1. Give the meaning and functions of the following acronyms:

a. E-mail
b. WWW
c. ISP
d. BBS
e. bps
f. SLIP/PPP
g. E-commerce
h. CIH

2. Aside from the different types of viruses enumerated in this chapter, identify at least 7
other viruses

3. Why do we need to apply e-commerce?

4. Differentiate communications from telecommunications

5. What are some of the communication-related devices in the Philippines?

6. What are the applications of E-mail? EBBS?

7. What is ISDN and why is it important?

8. How do we apply information superhighway?

9. How do messages moved and transmitted?

10. Is communications and the internet are useful to us? Why?

27

You might also like