PDF Inggris Gabungan
PDF Inggris Gabungan
PDF Inggris Gabungan
What is a Computer
Personal Computers
Cheap and easy to use. Often used as
stand-alone computers or in a network.
May be connected to large mainframe
computers within big companies.
Exercises Meeting-1
1. What is the meaning Mini Computer ? Give
Example!
2. What is the meaning Mainframe Computer?
Give Example!
3. What is the meaning Personal Computer?
Meeting 2
Inside Computer
Inside a
Computer
Control unit
The control unit (often called a control system or
central controller) manages the computer's
various components; it reads and interprets
(decodes) the program instructions, transforming
them into a series of control signals which
activate other parts of the computer
Memory
The Keyboard
The keyboard is still the commonest way of entering
information into a computer
Tracker Balls
an alternative to the traditional mouse and often
used by graphic designers
Scanners
Input Devices :
A scanner allows you to scan printed material
and convert it into a file format that may be
used within the PC
Touch Pads
A device that lays on the desktop and responds to
pressure
Light Pens
Used to allow users to point to areas on a screen
Joysticks
Many games require a joystick for playing of the game
Output Devices :
Monitor/LCD
The computer screen is used for outputting information in an
understandable format
Printers
There are many different types of printers. In large
organizations laser printers are most commonly used due to
the fact that they can print very fast and give a very high
quality output.
Output Devices
Plotters
A plotter is an output device similar to a printer, but
normally allows you to print larger images.
Speakers
Enhances the value of educational and presentation
products.
Speech synthesisers
Gives you the ability to not only to display text on a
monitor but also to read the text to you
Storage Device
Storage Devices -- "How it saves data and
programs“
Hard disk drives are an internal, higher capacity drive
which also stores the operating system which runs
when you power on the computer.
Capacity:
Enormous! Often 1000/5000 Gigabytes. A Gigabyte is
equivalent to 1024 Megabytes.
Cost:
Hard disks costs are falling rapidly and normally represent
the cheapest way of storing data.
Main Parts of Computer
Software and
Operating System
Definition
Software refers to parts of the computer which do not have
a material form, such as programs, data, protocols, etc.
When software is stored in hardware that cannot easily be
modified (such as BIOS ROM in an IBM PC compatible), it is
sometimes called "firmware" to indicate that it falls into an
uncertain area somewhere between hardware and software.
Operating Sytems
Software
Data management
• Contact management
• Spreadsheet
• Personal database
Documentation
• Document automation/assembly
• Word processing
• Desktop publishing software
Banking software
Exercises Meeting-3
1. The Software is ……
2. Give 5 examples of Operating System as you
know …..
3. What is the meaning Open Source Operating
System and give examples …..
4. What is Application Software ….
5. Give 5 examples of Application Software ….
Meeting 4
Software,
Programming
Language, Networking
A programming language is an artificial language designed to
communicate instructions to a machine, particularly a computer.
Programming languages can be used to create programs that
control the behavior of a machine and/or to express algorithms
precisely.
• LAN
A LAN (Local Area Network) is a system whereby
individual PCs are connected together within a
company or organization
• WAN
A WAN (Wide Area Network) as the name implies
allows you to connect to other computers over a
wider area (i.e. the whole world).
Use network
• Accounts
• Games
• Educational
• On-line banking
• Smart ID cards
• Supermarkets
• Working from home (Tele-working)
• Internet
Computer Virus
Viruses are small programs that hide themselves on your
disks (both flashdisk and your hard disk).
Malicious Software
Malicious Software
In computer world, there is also a software
which is created to do something bad and
to perform criminal intension. This kind of
software is called malicious software or
malware. Malicious software can bedivided
into some categories:
Virus
a.VIRUS
Virus is a software that can replicate by injecting or
infecting its own code into other file. By its way to infect
other file, virus can be divided into three categories:
Virus
1. Overwriting
A type of computer virus that will copy its own code
over the host computer system's file data, which
destroys the original program. After your computer
system has been cleaned using an antivirus
program, users will need to install the original
program again.
Virus
2. Appending
A virus that inserts a copy of its malicious
code at the end of the file. The goal of an
appending virus is not to harm the host
program, but to modify it to hold the virus
code and then be able to run itself.
Virus
3.Prepending
A virus defines the method it uses of infecting
files by adding their code to the beginning of the
file. By doing this, these viruses ensure that they
are activated when an infected file is used.
Worm
b. WORM
Worm is also a kind of malicious software. It is different from
virus which is worm can not inject of infect other files. A worm
is a software which replicates by creating its own copy. And
without infecting other file. Worm actually spreads through a
network or the Internet using email. Below is a sample of worm
called I Love You. Worm I Love You spreads through the
Internet as an email attachment.
Worm
Usually worm will do something tricky to cheat email
receiver. The first is using double file extension. At the left
sample, worm I Love You uses two extension, those are
TXT.VBS. The second trick is using social engineering. At
the above sample, the worm uses a name “I LOVE YOU”
which might interested to every email receiver. Who
doesn’t need love? So, the effect of these tricks are any
body –the email receiver- will click that attachment which
is actually a worm code.
Trojan
c. TROJAN HORSE
Trojan horse is derived from ancient Greek. Trojan Horse is
a program that looks like a good program but actually
contains destructive code or destructive feature. Trojan
horse is different from virus and worm, trojan horse can
not replicate and cannot infect other file.
Trojan
Hardware
Hardware
Hardware is physical equipment of computer
system. Hardware can be divided into two
categories:
2. Pointing devices
REVIEW MATERIAL
Computer
network
Meeting 9
Computer Network
Definition
A computer network is a group of
interconnected computers. Networks may be
classified according to a wide variety of
characteristics. The benefit of a computer
network are: Sharing hardware resources
easily and Sharing information easily.
A network is a collection of computers connected
to each other. The network allows computers to
communicate with each other and share
resources and information. The Advanced
Research Projects Agency (ARPA) designed
"Advanced Research Projects Agency Network“
(ARPANET) for the United States Department of
Defense. It was the first computer network in the
world in late 1960's and early 1970's.
Type of Computer Network
• http://en.wikipedia.org/wiki/Computer_networks
• http://en.wikipedia.org/wiki/Network_hub
• http://en.wikipedia.org/wiki/Repeater
• http://www.webopedia.com/TERM/N/network.html
• http://www.uaf.edu/toolik/Reports/Report03/CommsSlides-SRI.ppt
• http://www.cs.ucr.edu/~weesan/cs6/03_basic_computer_network.ppt
• http://en.wikipedia.org/wiki/Router_%28computing%29
What is Steganography?
Steganography is the art and science of writing
hidden messages in such a way that no-one apart
from the sender and intended recipient even
realizes there is a hidden message, a form of
security through obscurity.
Continued
1. What is Steganography ….
2. A steganography message will appear to be something else,
give examples…
3. Mentioned that some techniques of steganography …
4. The origin of steganography from ….
5. The steganography usually use for …..
6. Make example about steganography as you can ….
References
•http://www.dmoz.org/Computers/Security/Products_and_Tools/Cryptography/Stegano
graphy//
• http://petitcolas.net/fabien/steganography/image_downgrading/index.html
• http://www.fbi.gov/hq/lab/fsc/backissu/july2004/research/2004_03_research01.htm
• http://www.jjtc.com/Steganography
• http://www.citi.umich.edu/techreports/reports/citi-tr-01-11.pdf
• http://www.spy-hunter.com/stego.html
• http://www.datahide.com/BPCSe/Articles/Ref-6.SPIE98.pdf
• http://blog.maxant.co.uk/pebble/2007/07/19/1184876280000.html
MEETING 11
CRYPTOGRAPHY
What is Cryptography
The term cryptography is derived from Greek,
kryptos means “hidden” or “secret” and graphy
means “writing”. So, cryptography is the
practice and study of creating a secret
information.
Cryptography works by Cryptography is a part of
mathematics and computer science.
Continued
Cryptography is used in applications present in
technologically advanced societies; examples
include the security of ATM cards, computer
passwords, and electronic commerce, which all
depend on cryptography. In short we can say that
cryptography is needed to secure a secret
document. A person who is master in cryptography
is called cryptographer.
How Cryptography Works
For example someone has a secret document to
secure. Any document can be secured using
cryptography. For example we have to secure the
word “Read” using cryptography. The word “Read”
in cryptography is called Plain text. Using a set of
rule called algorithm, the plain text is changed into
cipher text. This process is called encryption. The
result of this encryption process is the word “Uhdg”.
This is the cipher text.
History of Cryptography
Cryptography is already used since ancient
era. Julius Caesar used cryptography to secure
his message from his enemy. He replaced a
character with its next three character. For
example a character „A‟ in alphabet will be
replaced by character „D‟. And so on. See the
list below of Julius Caesar algorithm.
Examples :
• Plain text : a b c d e f g h I j k l m n o p q r s t u v w x y z
• Cipher Text : d e f g h I j k l m n o p q r s t u v w x y z a b c
Continued History
In the era of World War II, German Nazi was also used
cryptography to secure its message. Nazi used a machine
called Enigma to encrypt and decrypt the messages. In this
way Nazi thought its message would be difficult to break by
US and its allies. Below is a picture of Enigma used by
Nazi. Unfortunately the algorithm of Enigma can be
broken by US army.
Continued History
In computer technology, cryptography is still
used to secure a computer data or document. For
example in ATM machine,computer passwords,
and also in electronic commerce. Using computer
technology someone can use many sophisticated
algorithm for example RSA,DES, and PGP.
Computer Terms
• Plain text = a text that can be read by anybody. This
text is not secured yet.
• Cipher text = a secret text resulting from encryption
process.
• Algorithm = a set of rule to encrypt a document.
• Enigma = a machine like typewriter that is used by
Nazi during World War II to secure a document before
transmitted.
• Cryptographer = a person who is master in
cryptography.
Exercises Meeting-11
1. What is cryptography ….
2. What is the different between cryptography and
steganography ….
3. How the cryptography works ….
4. Give the example of cryptography …
5. Give the example using cryptography in computer
technology …
References
• http://en.wikipedia.org/wiki/Cryptography
• http://en.wikipedia.org/wiki/Cryptography_Classification
• http://en.wikipedia.org/wiki/Encyclopedia_of_Cryptography_and_Security
• http://en.wikipedia.org/wiki/Japanese_cryptology_from_the_1500s_to_Meiji
• http://en.wikipedia.org/wiki/List_of_important_publications_in_computer_science#Cryptography
• http://www.merriam-webster.com/dictionary/cryptology/
• http://www.csrc.nist.gov/publications/fips/fips197/fips-197.pdf
• http://www.cesg.gov.uk/site/publications/media/notense.pdf
• http://citeseer.ist.psu.edu/cache/papers/cs/22094/http:zSzzSzeprint.iacr.orgzSz2001zSz056.pdf/junod01complexity.pdf
• http://www.rsasecurity.com/rsalabs/node.asp?id=2152
• http://www.ieee-security.org/Cipher/Newsbriefs/1996/960214.zimmerman.html
• http://www.schneier.com/crypto-gram-0006.html#DES
• http://scholar.google.com/url?sa=U&q=http://www.springerlink.com/index/K54H077NP8714058.pdf
• http://www.cacr.math.uwaterloo.ca/hac/
• http://www.cryptool.org/download/CrypToolPresentation-en-1_4_20.pdf
• http://www.rsasecurity.com/rsalabs/node.asp?id=2152
• http://www.pawlan.com/Monica/crypto/
• http://www.nsa.gov/kids/
Meeting 12
The INTERNET
Definition
Internet stands for: Internetworked Networks
The Internet is a worldwide connection of millions
of computers connected to thousands of different
networks. These computers "communicate" that is,
share, exchange, and transmit data to another
computer on the same or another network.
A. Internet Services
1. www (World Wide Web)
Many people use the terms Internet and World Wide
Web, or just the Web. The World Wide Web is a
global set of documents, images and other
resources, logically interrelated by hyperlinks and
referenced with Uniform Resource Identifiers
(URIs).URIs symbolically identify services, servers,
and other databases, and the documents and
resources that they can provide. Hypertext Transfer
Protocol (HTTP) is the main access protocol of the
World Wide Web, but it is only one of the hundreds
of communication protocols used on the Internet.
Continued
7.search engine
is designed to search for information on the World
Wide Web. The search results are generally
presented in a line of results often referred to as
search engine results pages (SERPs). The
information may be a specialist in web pages,
images, information and other types of files. Some
search engines also mine data available in
databases or open directories. Unlike web
directories, which are maintained only by human
editors, search engines also maintain real-time
information by running an algorithm on a web
crawler.
B. Internet Address Domain
header
It contains information about the sender, the routing
and the time of the message. The header always
contains a subject line. This is a very important part of
the message and you should always include a subject
line. Some folks sort their messages by subject, so it is
rude to not include a subject! The subject line indicates
the purpose or content of the Message
Parts of E-mail
message body,
where you write your message
signature,
which identifies the sender.
This part is optional and must be set
up inside of your email software.
Parts of E-mail
The message header usually includes at least the following
fields:
REVIEW MATERIAL