Professional Documents
Culture Documents
Meeting-1
What is a Computer
The first use of the word "computer" was
recorded in 1613, referring to a person who
carried out calculations, or computations,
and the word continued with the same
meaning until the middle of the 20th
century.
What is the Computer
Personal Computers
Cheap and easy to use. Often used as
stand-alone computers or in a network.
May be connected to large mainframe
computers within big companies.
Exercises Meeting-1
1. Do you know the origin of Computer and what it means?
a. An electronic device that stores, retrieves, and processes data, and can be
programmed with instructions.
b. Referring to a person who carried out calculations, or computations
c. General purpose device that can be programmed to carry out a finite set of
arithmetic or logical operations.
d. The answer A,B and C True
e. All answers are false
The Keyboard
The keyboard is still the commonest way of entering
information into a computer
Tracker Balls
an alternative to the traditional mouse and often
used by graphic designers
Input Devices :
Scanners
A scanner allows you to scan printed material
and convert it into a file format that may be
used within the PC
Touch Pads
A device that lays on the desktop and responds to pressure
Light Pens
Used to allow users to point to areas on a screen
Joysticks
Many games require a joystick for playing of the game
Output Devices :
Monitor/LCD
The computer screen is used for outputting information in an
understandable format
Printers
There are many different types of printers. In large
organizations laser printers are most commonly used due to
the fact that they can print very fast and give a very high
quality output.
Output Devices
Plotters
A plotter is an output device similar to a printer, but
normally allows you to print larger images.
Speakers
Enhances the value of educational and presentation
products.
Speech synthesisers
Gives you the ability to not only to display text on a
monitor but also to read the text to you
Storage Device
Storage Devices -- "How it saves data and
programs
Hard disk drives are an internal, higher capacity drive
which also stores the operating system which runs
when you power on the computer.
Capacity:
Enormous! Often 1000/5000 Gigabytes. A Gigabyte is
equivalent to 1024 Megabytes.
Cost:
Hard disks costs are falling rapidly and normally represent
the cheapest way of storing data.
Main Parts of Computer
Data management
Contact management
Spreadsheet
Personal database
Documentation
Document automation/assembly
Word processing
Desktop publishing software
Banking software
Exercises Meeting-3
1. A special type of program that loads automatically when you start your computer
is
a. System d. System Program
b. Software e. Application
c. Operating System
2. There are examples of Operating System as you know, except :
a. Windows XP d. UBUNTU
b. Windows 7 e. Genome
c. Windows Tec
3. There are Open Source Operating System :
a. UBUNTU d. A and B True
b. RED HAT e. A and C True
c. Windows NT
4. The type of program that you use once the operating system has been loaded :
a. Operating System d. Enterprise System
b. System Memory e. Application Software
c. Word Pad
5. There is the application software for editing image :
a. Power Point d. Adobe Premier
b. Photoshop e. Microsoft Excel
c. Acrobat Reader
Exercises Meeting-3
1. The Software is
2. Give 5 examples of Operating System as you
know ..
3. What is the meaning Open Source Operating
System and give examples ..
4. What is Application Software .
5. Give 5 examples of Application Software .
Software, Programming Language, Networking
LAN
A LAN (Local Area Network) is a system whereby
individual PCs are connected together within a
company or organization
WAN
A WAN (Wide Area Network) as the name implies
allows you to connect to other computers over a
wider area (i.e. the whole world).
Use network
Accounts
Games
Educational
On-line banking
Smart ID cards
Supermarkets
Working from home (Tele-working)
Internet
Computer Virus
Viruses are small programs that hide themselves on your
disks (both flashdisk and your hard disk).
Meeting 9
Definition of Computer Network
A computer network is a group of
interconnected computers. Networks may be
classified according to a wide variety of
characteristics. The benefit of a computer
network are: Sharing hardware resources
easily and Sharing information easily.
Definition of Computer Network
A network is a collection of computers
connected to each other. The network allows
computers to communicate with each other
and share resources and information. The
Advanced
Research Projects Agency (ARPA) designed
"Advanced Research Projects Agency Network
(ARPANET) for the United States Department of
Defense. It was the first computer network in
the world in late 1960's and early 1970's.
Type of Computer Network
1. Local-area networks (LANs): The computers are
geographically close together (that is, in the same
building).
http://en.wikipedia.org/wiki/Computer_networks
http://en.wikipedia.org/wiki/Network_hub
http://en.wikipedia.org/wiki/Repeater
http://www.webopedia.com/TERM/N/network.html
http://www.uaf.edu/toolik/Reports/Report03/CommsSlides-SRI.ppt
http://www.cs.ucr.edu/~weesan/cs6/03_basic_computer_network.ppt
http://en.wikipedia.org/wiki/Router_%28computing%29
Exercises Meeting-9
1. The benefit of a computer network are :
a. Sharing hardware resources easily d. A and B True
b. Sharing information easily e. A,B and C True
c. Sharing Input easily
2. There are many many types of Computer Network, except :
a. LAN d. BAN
b. WAN e. MAN
c. MAN
3. There are many many types of Network Topology, except :
a. Bus and Ring d. Star and Bus
b. Star and Mesh e. Bust and Mesht
c. Ring and Star
4. A piece of computer hardware designed to allow computers to communicate over
a computer network is
a. NIC d. RAN Card
b. LAN Card e. A and B True
c. NEC
5. There are the devices to create a computer network, except :
a. NIC d. VGA
b. Repeater e. Router
c. Hub
Exercises Meeting-9
1. What is the function of Computer Network
2. Many types of Computer Network, explain and
mentioned that .
3. Give the 5 examples of network topology .
4. A piece of computer hardware designed to allow
computers to communicate over a computer
network is .
5. Could you mentioned the devices to create a
computer network .
Steganography
What is Steganography
Steganography is the art and science of writing
hidden messages in such a way that no-one apart
from the sender and intended recipient even
realizes there is a hidden message, a form of
security through obscurity.
Continued
Generally, a steganographic message will appear to
be something else: a picture, an article, a shopping
list, or some other message. This apparent message
is the covertext. For instance, a message may be
hidden by using invisible ink between the visible
lines of innocuous documents.
History of Steganography
References
http://www.dmoz.org/Computers/Security/Products_and_Tools/Cryptography/Steganography//
http://petitcolas.net/fabien/steganography/image_downgrading/index.html
http://www.fbi.gov/hq/lab/fsc/backissu/july2004/research/2004_03_research01.htm
http://www.jjtc.com/Steganography
http://www.citi.umich.edu/techreports/reports/citi-tr-01-11.pdf
http://www.spy-hunter.com/stego.html
http://www.datahide.com/BPCSe/Articles/Ref-6.SPIE98.pdf
http://blog.maxant.co.uk/pebble/2007/07/19/1184876280000.html
Exercises Meeting-10
1. The art and science of writing hidden messages in such a way that no-one apart from the
sender and intended recipient even realizes there is a hidden message :
a. Stenography d. Stagenoghrapy
b. Stegraphy e. All answer are false
c. Steganomy
2. A steganography message will appear to be something else, the examples
a. A picture d. A and C true
b. An article e. All Answers false
c. A message
3. There are some technique steganography, except
a. Writing a secret message using invisible ink
b. Hidden messages on messenger's body
c. A picture of a message in microdots or microfilms
d. A copy file to another file.
e. In computer era, steganography can be done by inserting a secret document into other
document
4. The origin of steganography from .
a. Greek d. America
b. Russia e. Germany
c. England
5. The steganography usually use for ..
a. Covered d. Backup
b. Hidden Writing e. A and B true
c. Copy
Exercises Meeting-10
1. What is Steganography .
2. A steganography message will appear to be something
else, give examples
3. Mentioned that some techniques of steganography
4. The origin of steganography from .
5. The steganography usually use for ..
6. Make example about steganography as you can .
MEETING 11
CRYPTOGRAPHY
What is Cryptography
The term cryptography is derived from Greek,
kryptos means hidden or secret and graphy
means writing. So, cryptography is the
practice and study of creating a secret
information.
Cryptography works by Cryptography is a part of
mathematics and computer science.
Continued
Cryptography is used in applications present in
technologically advanced societies; examples
include the security of ATM cards, computer
passwords, and electronic commerce, which all
depend on cryptography. In short we can say that
cryptography is needed to secure a secret
document. A person who is master in cryptography
is called cryptographer.
How Cryptography Works
For example someone has a secret document to
secure. Any document can be secured using
cryptography. For example we have to secure the
word Read using cryptography. The word Read
in cryptography is called Plain text. Using a set of
rule called algorithm, the plain text is changed into
cipher text. This process is called encryption. The
result of this encryption process is the word Uhdg.
This is the cipher text.
History of Cryptography
Cryptography is already used since ancient
era. Julius Caesar used cryptography to secure
his message from his enemy. He replaced a
character with its next three character. For
example a character A in alphabet will be
replaced by character D. And so on. See the
list below of Julius Caesar algorithm.
Examples :
Plain text : a b c d e f g h I j k l m n o p q r s t u v w x y z
Cipher Text : d e f g h I j k l m n o p q r s t u v w x y z a b c
Continued History
In the era of World War II, German Nazi was also used
cryptography to secure its message. Nazi used a machine
called Enigma to encrypt and decrypt the messages. In this
way Nazi thought its message would be difficult to break by
US and its allies. Below is a picture of Enigma used by
Nazi. Unfortunately the algorithm of Enigma can be
broken by US army.
Continued History
http://en.wikipedia.org/wiki/Cryptography
http://en.wikipedia.org/wiki/Cryptography_Classification
http://en.wikipedia.org/wiki/Encyclopedia_of_Cryptography_and_Security
http://en.wikipedia.org/wiki/Japanese_cryptology_from_the_1500s_to_Meiji
http://en.wikipedia.org/wiki/List_of_important_publications_in_computer_science#Cryptography
http://www.merriam-webster.com/dictionary/cryptology/
http://www.csrc.nist.gov/publications/fips/fips197/fips-197.pdf
http://www.cesg.gov.uk/site/publications/media/notense.pdf
http://citeseer.ist.psu.edu/cache/papers/cs/22094/http:zSzzSzeprint.iacr.orgzSz2001zSz056.pdf/junod01complexity.pdf
http://www.rsasecurity.com/rsalabs/node.asp?id=2152
http://www.ieee-security.org/Cipher/Newsbriefs/1996/960214.zimmerman.html
http://www.schneier.com/crypto-gram-0006.html#DES
http://scholar.google.com/url?sa=U&q=http://www.springerlink.com/index/K54H077NP8714058.pdf
http://www.cacr.math.uwaterloo.ca/hac/
http://www.cryptool.org/download/CrypToolPresentation-en-1_4_20.pdf
http://www.rsasecurity.com/rsalabs/node.asp?id=2152
http://www.pawlan.com/Monica/crypto/
http://www.nsa.gov/kids/
Exercises Meeting-11
1. What is cryptography .
2. What is the different between cryptography and
steganography .
3. How the cryptography works .
4. Give the example of cryptography
5. Give the example using cryptography in computer
technology
Exercises Meeting-11
1. The practice and study of creating a secret information.
a. Stenography d. Stagenoghrapy
b. Crytography e. All answer are false
c. Steganomy
2. A cryptography is used in applications present in technologically advanced societies, the examples
a. Security of ATM cards d. A,B and C true
b. Computer passwords e. Hidden Mesagge
c. Electronic commerce A message
3. A machine called Enigma to encrypt and decrypt the messages in worl war II used by
a. German d. Italy
b. America e. Russia
c. France
4. The example of cryptography
a. Greek d. Login
b. Enigma e. A,B and C true
c. Enogmist
5. The a secret text resulting from encryption process is .
a. Hidden Writing d. A and B true
b. Chiper text e. No Answer
c. Hidden text
Meeting 12
The INTERNET
Definition
Internet stands for: Internetworked Networks
The Internet is a worldwide connection of millions
of computers connected to thousands of different
networks. These computers "communicate" that is,
share, exchange, and transmit data to another
computer on the same or another network.
A. Internet Services
1. www (World Wide Web)
Many people use the terms Internet and World Wide
Web, or just the Web. The World Wide Web is a
global set of documents, images and other
resources, logically interrelated by hyperlinks and
referenced with Uniform Resource Identifiers
(URIs).URIs symbolically identify services, servers,
and other databases, and the documents and
resources that they can provide. Hypertext Transfer
Protocol (HTTP) is the main access protocol of the
World Wide Web, but it is only one of the hundreds
of communication protocols used on the Internet.
Continued
7.search engine
is designed to search for information on the World
Wide Web. The search results are generally
presented in a line of results often referred to as
search engine results pages (SERPs). The
information may be a specialist in web pages,
images, information and other types of files. Some
search engines also mine data available in
databases or open directories. Unlike web
directories, which are maintained only by human
editors, search engines also maintain real-time
information by running an algorithm on a web
crawler.
B. Internet Address Domain
References
Exercises Meeting 12
1. What is the internet .
a.A worldwide connection of millions of computers connected to thousands of different networks
b.Each computer on the Internet d. Browsing
c.Server e. All answer are false
2. Many kind of internet services, mentioned that ..
a.Browser d. B and C True
b.World Wide web e. Wireless Network
c.FTP
3. There are the examples of search engine .
a.Google Crhome d. Opera
b.Mozila Firefox e. All answers true
c.Internet Explore
4. The examples of search engine .
a.IRC d. A,B and C true
b.Yahoo Messenger e. All Answers false
c.Google Talk
5. What is the function Internet address domain .
a.The domain name service address
b.Host machine has a special Internet protocol address (IP address) that uniquely identifies that
computer
c.the domain name service address of the IP address
d.A,B and C true
e.All answers false
Exercises Meeting-12
1. What is the internet .
2. Many kind of internet services, mentioned that
and explain .
3. Give the 3 examples of search engine .
4. Give the 3 examples of chat service ..
5. What is the function Internet address domain .
E-mail
Electronic mail, often abbreviated as email,email, or
eMail, is any method of creating, transmitting, or
storing primarily text-based human
communications with digital communications
systems. Unlike conventional mail, email is much
faster (conventional mail is sometimes called "snail
mail" by email users).
Email has both similarities and differences with
more conventional postal services. First, messages
are posted electronically to individuals at specific
addresses much like conventional mail. The
address denotes the computer that the individual
employs as a mail server. A mail server is like a
local post office: it is a computer that sends and
receives electronic mail for a specific network.
An email message is made up of several
parts. They include:
header
It contains information about the sender, the routing
and the time of the message. The header always
contains a subject line. This is a very important part of
the message and you should always include a subject
line. Some folks sort their messages by subject, so it is
rude to not include a subject! The subject line indicates
the purpose or content of the Message
message body,
where you write your message
signature,
which identifies the sender.
This part is optional and must be set
up inside of your email software.
The message header usually includes at least the following
fields: