Skip to main content
Printable page generated Friday, 3 Dec 2021, 20:14
Use 'Print preview' to check the number of pages and printer settings.
Print functionality varies between browsers.
Printable page generated Friday, 3 Dec 2021, 20:14

Preparing for your digital life in the 21st Century

Introduction

The profound technological, economic, political and ethical changes brought about by information technology will affect every one of us. You may be wondering what digitial technology is and just what is meant by having a digital life. A fundamental idea is that digital technology is any technology based on representing data as sequences of numbers. Computers use digital technologies; so the for benefit of this unit the term digital life refers to the influence of computers, in a wide variety of forms, on the world.

In this unit you will learn a little about the historical development of computers and their role in today’s society, and you will consider examples of digital technologies in the world around you and their influence on your life. You will also gain a better understanding of what makes a computer work by exploring what’s inside a typical personal computer.

This OpenLearn course is an adapted extract from the Open University course TU100 My digital life.

Learning outcomes

After studying this course, you should be able to:

  • understand the concept of a ‘digital life’

  • demonstrate an awareness of the role of information and communication technologies in a digital life

  • describe the purpose of each of the major components of a computer system, and use common terminology to describe these components.

1 Computers: From novelty to commonplace

[Timings. This is the first section of this unit. It should take you around one hour to complete.] The theme of this section is the development of digital technologies, from the physically large and highly expensive equipment of the 1950s to the omnipresent networks and computer-based devices upon which our digital lives are founded today. In this section I will:

  • compare the development of the computer to the development of the telephone
  • describe some of the digital technologies that form an integral part of many of our lives
  • introduce the term information society.

1.1 The telephone

In the 1950s, telephones represented the cutting edge of technology (Figure 1). However, they were not only large and expensive to purchase but also inconvenient to use; if you wanted to make a call over a distance of more than fifteen miles, you had first to call the operator who would then make the connection.

Described image
Figure 1 A 1950s telephone

Telephones were also expensive to use. In the UK, calls were charged in units of three minutes, each unit costing the equivalent of between 5 and 20 pence in today’s currency. (In comparison, in 1959 a pint of milk cost about 3 pence.) Few people had a home telephone and even fewer made long-distance calls. The high cost of using a telephone ensured that anyone who had one tended to use it infrequently, and then only for short calls.

In 1959 the General Post Office, which ran almost all UK telephone systems at the time, introduced subscriber trunk dialling (STD). This advance in technology allowed users to make long-distance calls directly, without an operator, and to be charged only for the actual duration of the call. The telephone became easier and much cheaper to use; as a result, more people began to use it and for longer calls.

Over time the telephone has become part of the background of our lives, until today it is extremely unusual to find someone who has neither a home telephone nor a mobile phone. Just as the telephone changed from a status symbol to become simply another piece of the modern world, so the computer is making a similar transition.

1.2 The computer

There were very few computers in the 1950s, and those in existence were treated as objects of wonder with almost mythical powers. They were nothing like the computers of today. For one thing they were huge, with the refrigerator-sized one shown in Figure 2 being relatively small for the time. They were also delicate, and consumed a lot of electricity, wasting much of it as heat.

Described image
Figure 2A 1950s computer

Nowadays, however, a computer is just another item stocked in supermarkets alongside toothpaste and dog food. And as computers have become cheaper and smaller, they have been incorporated into a kaleidoscopic range of devices that bear no resemblance to what was once thought of as a computer. Powerful computers now sit at the heart of objects as diverse as mobile phones and games consoles, cars and vacuum cleaners. The cost of computer power continues to decrease, making it possible to incorporate computer technologies into almost any object, no matter how small, cheap or disposable. And these smart devices are ‘talking’ to one another, not just within a single room or building but across the world via the internet, using the World Wide Web (see Box 1). Thus even as the computer vanishes from sight, it becomes vastly more powerful and ever-present – to use a term you’ll become very familiar with, it is now ubiquitous.

Activity 1(exploratory)

Can you think of another technology that has made the transition from novel to commonplace, like telephones and computers?

Comment

There are many possible answers to this question. I thought of washing machines, which have advanced from hand-driven drums to the automatic machines of today.

Box 1The Internet and the Web

You may well have across the terms internet and Web. Although in everyday life people tend to use these terms interchangeably, in reality they are two separate (though related) entities.

The internet is a global network of networks: an internetwork (hence its name). It is the infrastructure that connects computers together. At first written with an upper-case ‘I’, it is increasingly seen with a lower-case ‘i’.

The Web (short for World Wide Web), on the other hand, is a service that links files across computers, allowing us to access and share information. Thus the Web is a software system that has been built upon the hardware of the internet.

Apart from anything else, this means that it is technically incorrect to refer to ‘searching’ or ‘browsing’ the internet. When you carry out an online search, you are in fact searching the Web!

1.3 The information society

Networks and the internet

As a result of advances in information and communication technology (ICT), our notions of time and location are changing – distance is no longer a barrier to commercial or social contact for those of us connected to suitable networks. Some people may find it difficult to imagine not having access to the information and services that play a crucial part in their daily lives. Others may feel that they have no part to play in the digital world because their network access is very limited or even non-existent. Some simply don’t care about the digital world, viewing it perhaps as a waste of time. Yet whether we are aware of it or not, digital information is flowing constantly around us.

Consider a computer that is connected to the internet – the one you are using to study this unit, for example. This may be a computer you use at home, in a library or at work; you may use it on the move or in a fixed location. Whatever the case, this computer is part of a complex system consisting of wires and optical fibres, microwaves and lasers, switches and satellites, that encompasses almost every part of the world. The oceans are wrapped in more than a quarter of a million miles of fibre-optic cable with several strands of glass running through it. Each of these strands can carry thousands of simultaneous telephone conversations, a few dozen television channels, or any of a range of other forms of digital content (such as web pages).

This modern communications network enables us to use a mobile phone in the depths of Siberia or take a satellite telephone to the Antarctic (Figure 3), watch television in the middle of the Atlantic, do our banking from an airliner, or play games with a person on the other side of the world. It is one of the greatest technological achievements of the last thirty years and it is so reliable, so omnipresent, that we very rarely stop to think about what actually happens when we dial a telephone number, click on a web link or switch TV channels. Or rather, we tend not to think about it until something disrupts the network – whether it be a widespread problem such as a power cut, or something more localized such as finding ourselves in a rural area with no mobile phone signal.

Described image
Figure 3 Using a satellite phone in the Antarctic

The end of the twentieth century and the beginning of the twenty-first century are often compared to other historical periods of great change, such as the Industrial Revolution, because of the huge technological changes that are happening in many areas of our lives. These developments are taking place in conjunction with correspondingly large social and economic changes, often characterised by the terms information society and network society. Such notions are frequently referred to by policy makers when driving forward changes in our technological infrastructure: politicians often refer to the inevitability of technological change in our information society and stress the need to be at the forefront of these changes in order to secure future prosperity, for example by developing broadband network infrastructure, by making public services available online, and by equipping schools and local communities with computers.

Activity 2 (exploratory)

Can you think of an example where changes in technology have resulted in changes to your work, social or family life? Have those changes improved your life? Have they created any problems?

Comment

The biggest change for me has been in my ability to work from home. I’m currently sitting at home typing this text on a computer whilst listening to some jazz music, which is also stored on the computer. I’ll shortly email my document to a colleague, who will be able to read it a few seconds later.

My first job required me to travel to my employer’s premises every day and share an office – and a single telephone – with ten other people. When I needed to write a report I would do it with a pen and paper for someone else to type up. A few days later I’d get it back to check and the typist would make any corrections with something called ‘correcting fluid’.

Being able to work from home has improved my life considerably. Not only does it save me the time and money that used to be spent on travelling, but being able to listen to music while I work helps me concentrate, as well as making the job more enjoyable. On the down side, the boundaries between my home life and my work life have become very blurred, as my wife will confirm. So on the whole I feel the changes are positive, but there are some disadvantages as well.

The rise of texting

Unintended uses sometimes develop alongside the intended uses of emerging technologies in our information society. A classic example is the text messaging facility on mobile phones, often referred to as SMS (which stands for short message service). This was originally a minor feature designed to be used by engineers testing equipment – it was not expected to be used by phone owners at all. Yet by 2006, mobile phone companies were earning more than 80 billion US dollars per year worldwide from SMS messages, making them one of the most profitable parts of their business (International Telecommunication Union, 2006).

SMS resulted in a whole new method of communication and form of popular culture, different ways of interacting with radio and television, and even a new language form: texting. Texting often plays a key role in arranging demonstrations against those in power. You will probably remember such events from recent news stories.

Some more figures might help to put the increase in texting into context. The Mobile Data Association gathers statistics on mobile phone usage in the UK. Their report for May 2008 (Text.it, 2008) shows that in the whole of that month:

  • 16.5 million people accessed the internet from their mobile phones
  • 6.5 billion SMS (text) messages were sent
  • both of these figures showed a considerable increase from previous years.

In December 2008, the equivalent figures were 17.4 million and 7.7 billion respectively. In the following activity you will calculate just how large the increase in text messaging between May and December was.

‘Billion’ is a word that in the past had different meanings in the UK and the USA. However, the two countries now agree that a billion is one thousand million (1000 000 000).

Activity 3 (self-assessment)

The number of text messages sent per month in the UK grew from 6.5 billion in May 2008 to 7.7 billion in December 2008. What was the percentage growth over those seven months? You will probably need to use a calculator for this activity.

Comment

The increase in the number of messages was: 7.7 billion − 6.5 billion = 1.2 billion.

The percentage growth is found by dividing the change (1.2 billion) by the starting number (6.5 billion) and multiplying the answer by 100%. This gives: growth = 1.2/6.5 × 100% = 18.5% in seven months.

1.4 Section summary

In this section, having briefly considered the rapid development of computers, I outlined some of the ways in which digital technologies pervade the world around us, giving rise to the social and economic changes that characterise our information society. The concept of an information society is a key one in this unit and in the next section I’ll try to give you a better idea of what it involves.

2 Some aspects of our information society

[Timings. This is the second section of this unit. It should take you around three hours to complete. If you don’t have time to work through it all at once, there are break points where you can stop and return later.] In the previous section I introduced the concept of an information society; in this section I will outline some key aspects of such a society.

The changeable nature of the online world

One of the things you will notice while studying this unit is that some of the examples you read about no longer exist, or are nothing like as important as when the material was written in 2010 and 2011. This is inevitable, and you shouldn’t be concerned by it; your focus should be on the general principles, which remain valid.

As an example, there was a time when if you wanted to find something online you didn’t go to Google, because that didn’t exist. Instead, you almost certainly went to a search engine called AltaVista. I’ve just checked and this currently still exists at http://www.altavista.com, but it is now owned by Yahoo! and looks very similar to Google. However, back in the late 1990s it was seen as the definition of what a community portal site should be, combining a search function with links to a range of information sources; as a result, it was the first-choice search engine for many people. It continued to develop, and was one of the first to allow users to search for images and to translate text from one language to another. However, by late 2001 Google had overtaken AltaVista in both popularity and ease of use, and we’ve now reached the stage where relatively few internet users use or even know about AltaVista.

Some companies you read about may no longer exist, and some may be more or less prominent. Yet the likelihood is that although companies come and go, there will still be ways to share photos (as Flickr and Picasa allow at the moment), to edit documents online (as is possible with Microsoft Office Live and Google Drive), to store files online (as Dropbox and Ubuntu One allow), and so on.

2.1 Business

Financial services

Every time you use a debit or credit card in a shop, the shop till communicates with a card terminal that transmits your identification details from your card to your bank or credit card company for verification. Your balance is then adjusted according to your purchase. A similar chain of events is initiated if you shop online (buying a ticket for an airline or train, perhaps) or over the phone (when booking a cinema ticket, for example). Many banks also provide online banking services, reducing the need for customers to visit a branch. Automated teller machines (ATM) allow you to check your bank balance and withdraw cash wherever you are in the world. In each of the above situations – using a debit or credit card, shopping or managing your money online or over the phone, or using an ATM – the machines involved are connected via a network to a central computer, which has records of your account in an electronic filing system known as a database.

Financial services have undergone huge changes in recent years as a result of developments in the digital technologies driving them. The examples just described show how convenient and accessible such services have become. Yet at the same time, issues of identity and security have become a concern. New ways of communicating have also created new types of crime, including identity theft and financial fraud. In turn, these problems have fostered the development of new security industries that try to inform us and sell us solutions to reduce the chances of us becoming victims of online crime.

Commerce

Advances in digital technologies have led to changes in many areas of commerce, with some existing kinds of business being transformed by the opportunities these developments offer. One of the most obvious changes is the emergence of retailers such as Amazon, which have an online shop but no physical one that customers can visit. Yet the internet not only benefits the largest companies, but also allows even the smallest retailers to advertise their services to a global audience. Incredibly specialized companies can flourish by relying on the internet’s immense reach to deliver potential customers.

Of course, this growth has resulted in casualties in traditional (sometimes called ‘bricks and mortar’) retailing. High-street shops specialising in items such as books, DVDs, music and games have all lost business to online retailers. This has driven some shops out of business, but a number of high-street stores have also opened successful online stores. Online retailers have lower costs – they don’t pay expensive high-street rents and can easily be based in countries with low tax regimes – and they can pass these savings on to customers.

Although the low costs offered by online stores can be very attractive to customers, they might be counterbalanced to some extent by the less immediate and less tangible nature of the shopping experience. However, online retailers make up for this by providing a variety of services that reassure and inform their customers. One such service is the tracking of goods online – though this is a development that can produce its own frustrations, as illustrated by the cartoon in Figure 4. Having bought a new computer a few years ago and tracked it on its way from the factory in China to my home, I can identify with the feeling expressed!

Described image
Figure 4 A light-hearted look at the pros and cons of online tracking
Activity 4 (exploratory)

Add some more entries to the following table of advantages and disadvantages of online shopping. Can you think of ways in which online retailers may try to address the disadvantages?

AdvantagesDisadvantages
Buyer
To use this interactive functionality a free OU account is required. Sign in or register.
To use this interactive functionality a free OU account is required. Sign in or register.
Seller
To use this interactive functionality a free OU account is required. Sign in or register.
To use this interactive functionality a free OU account is required. Sign in or register.
Words: 0
Interactive feature not available in single page view (see it in standard view).
Comment

I thought of the following, but you may have come up with others.

AdvantagesDisadvantages
BuyerMore choiceCan’t try goods (e.g. shoes, clothes) first
Can often track goodsHarder to return goods if faulty
Often cheaper than a local shopHarder to get help and advice before or after buying
Some items can be downloaded immediately after buyingMay be worried about online fraud
SellerNo need for a physical shopReliant on delivery services
Lower running costsLikely to get more returned goods
Don’t need to keep everything in stock – can arrange delivery from suppliers Need to respond to email or telephone queries
Can supply music, books, software, etc. for download rather than having to supply a physical itemSome potential customers reluctant to buy online

Online retailers may try to address the disadvantages listed above in various ways. For instance, they might provide:

  • free collection of returned items
  • links to online reviews of products to help advise prospective buyers
  • telephone helplines
  • support forums to help customers before and after buying
  • advice on how to shop safely online.

As well as direct retailing, other types of businesses have also moved online – auction sites such as eBay fall into this category. Some online businesses are less conventional, and as a result it’s often harder to see how they find the money they need to survive. For example, there are many collaborative projects that produce free products including software, online encyclopaedias and educational resources. These often rely on volunteers contributing their time, with money being provided by advertising, sponsorship or donations.

Work

Technology has changed the way that other businesses operate too. Greater quantities of information are exchanged between numerous locations over public and private networks. Vast amounts of data are stored on computers and accessed remotely from a variety of devices. Just as individuals buy from companies online, many companies now sell to each other online as well, for the same reasons of reduced cost and wider choice that attract individuals to online stores. Manufacturing tasks that used to take days can now be completed in minutes using computer-operated machine tools working in automated production lines.

The way we use technology has also affected our individual working lives. For example, telephone and online banking mean that banks no longer need large numbers of counter staff, and the role of travel agents has changed as more people book their holidays directly from the vendor by going online. Some companies have responded by reducing their number of employees, while others have retrained their staff to provide more specialised services to their customers. More generally, many people working in an office environment are expected to learn how to use new software applications in order to do their jobs.

2.2 Communities

[Break point. This would be a good point to take a break if you need to do something else before returning later.] As well as revolutionising the commercial world, the internet has had an enormous impact on the way we communicate. While there are still people in many parts of the world who do not have internet access, many of us have access at home or at work. As a result we have the opportunity to communicate with others using email, instant messaging and online discussion groups (in online forums). Existing communities have created new ways of communicating, and new online communities have developed. Social networking plays an increasingly significant role in the lives of many people.

The recent pace of communication change has amazed many of us, and there is no reason to think things will slow down. The cartoon map of online communities shown in Figure 5 appeared on the Web in early 2007. Since then, the social networking site Facebook has increased in significance and size at the expense of MySpace, and micro-blogging sites such as Twitter – which allows users to post and read short messages – have appeared and grown.

Described image
Figure 5 One view of the world’s online communities in 2007

An updated version of this map is given below. It gives a feel for those changes and more.

Described image
Figure 6 .View of the world’s online communities in 2010 (source: http://xkcd.com/802/ or go to http://imgs.xkcd.com/comics/online_communities_2_large.png for a version you can zoom in on)

2.3 Information

The internet has had a huge impact on the availability of information of all kinds. Material on the Web reflects widely differing viewpoints, from official news bulletins to unofficial rumours, and comes from widely differing sources, from commercial megastores to community groups. Since no individual government, company or person has control over it, the internet has paved the way to unfettered publishing of information of all kinds, raising questions about the authority and regulation of this information. Some governments try to exert control over the information their citizens can access and create, with varying degrees of success.

2.4 Entertainment

The world of entertainment is constantly evolving as new ways of creating and distributing the media we watch and listen to are developed. Digital broadcasting has changed the way we experience television and radio, with increasingly interactive and participative programmes. Digital cameras, printers and scanners, together with desktop publishing and photo-editing software, enable greater numbers of people to experiment with image production, while online image- and video-sharing sites allow anyone with access to a relatively basic mobile phone or digital camera to share photos and videos with the rest of the online world. New digital technologies have also been at the forefront of changes in the production and distribution of music, and computer gaming has developed hand in hand with the evolution of graphical interfaces.

However, our increased exposure to digital entertainment has resulted in increased conflict between the rights of the consumer and the rights of the producer of the media. It is now much easier for the products of the media industries established during the twentieth century – film, music and so on – to be illegally copied and distributed in a form that is indistinguishable from the original. Copyright holders are taking steps to prevent this by developing a range of digital rights management (DRM) techniques that make it much harder to create copies, as well as by trying to persuade users of the benefits of the original product. Such attempts at persuasion can look very threatening, as I noticed on a recently purchased CD that has the following printed on the back cover:

FBI Anti-piracy Warning:

Unauthorized copying is punishable under federal law.

Several questions came to mind when I read this. Does that mean I can’t legally put the music onto my MP3 player? Can the US Federal Bureau of Investigation extradite and punish me (a UK citizen who bought the CD in the UK) if I do? Should I return the CD to the place I bought it from and ask for my money back? Or will I be in trouble only if I distribute copies of the CD to other people? These are all valid concerns that demonstrate some of the problems surrounding the use of copyrighted material.

There are many other issues arising from this, and it is very easy to make the digital future sound bleak. You have probably heard predictions to the effect that illegally copied media, and making information freely available on the Web, will increasingly put whole businesses and hundreds of thousands of jobs in the established media industries at risk. However, as in other areas of the digital world, there are also opportunities for these businesses if they can adapt to the new environment and modify their business models to survive and grow in different directions.

Activity 5 (exploratory)

Can you think of any other problems connected with the growth of digital entertainment?

Comment

There are many possibilities. I thought of the fact that the advent of digital television affected even those who didn’t particularly welcome it – across the world, analogue signals are gradually being switched off as new digital signals are introduced. In time, everyone will have to get new digital televisions as the old analogue versions become obsolete – quite an expensive business!

You might also have thought of more technical problems, such as how to transmit the large quantities of digital data required for some forms of entertainment – video, for example – in an acceptable time and retaining acceptable quality.

2.5 Public services

Public information and services

Public bodies such as governments and transport agencies are increasingly providing services online, allowing us to organise various aspects of our daily lives more easily. These services range from simple information displays, which let us check things such as weather forecasts and transport timetables, to interactive sites that allow us to make bookings or queries.

In many parts of the world, medical records are increasingly moving away from paper and X-ray film towards becoming completely digital. This has several advantages, especially in allowing patient records to be easily shared between departments within a hospital, and sometimes more widely with doctors’ surgeries and other health workers. In remote rural areas of some countries, doctors can make use of computer networks or even mobile phones to make a diagnosis if they are unable to see the patient in person. However, this is by no means universal, and even where such facilities exist they aren’t always available.

Information for travellers is also increasingly being made available digitally: for example, live online updates on road congestion and public transport, and arrivals information in stations and airports. Similarly, it is becoming more and more common to book plane journeys online – in fact, some airlines now only accept online bookings and will only issue electronic tickets. Many of them strongly encourage, or even require, passengers to check in online as well.

In addition, many countries provide online access to at least some of their government services. For example, you might be able to renew or apply for a passport, book a driving test, claim benefits, or fill in your tax return online. Local authorities also provide digital information services – you might be able to reserve or renew a library book online, for instance – and there are numerous opportunities to learn online.

Security and risk

The twentieth century saw a dramatic change in the role of the state in many countries. During most of the nineteenth century, an individual might only have come into contact with the state for the purposes of taxation, marriage and death; at the end of that century and the beginning of the next, however, a series of social revolutions saw the state becoming involved in our healthcare, pensions and education. Unsurprisingly, each of these developments was accompanied by a significant increase in the amount of personal information stored about every one of us. Computer technologies were developed especially to serve the enormous projects involved; IBM became a highly successful company due to its work on censuses in the USA and Europe, whilst the world’s first business computer, LEO, was used for a variety of tasks including the calculation of tax tables for the British Treasury in the 1950s.

With the vast amount of personal information being held about us in various places, it is becoming increasingly important for us to be able to prove our identities – not just for travel but for other activities such as purchasing expensive or restricted items, paying bills and opening bank accounts. The UK is unusual in Europe in that (at the time of writing in 2010) it does not have a compulsory identity card system, despite the fact that identity cards were put in place during both world wars. In several countries, identity card or passport schemes are being upgraded with new biometric technologies such as iris or face recognition, which (perhaps rather over-ambitiously) promise to uniquely identify individuals.

As well as the personal information that we know about, there may also exist information about us of which we are unaware. Since the terrorist attacks on the USA in 2001, much of the Western world has become far more security conscious, and governments and companies alike have developed and deployed technological countermeasures. These range from smart video surveillance systems that can identify an individual in a crowd and track his or her movements, through the biometric technologies mentioned above, to the searching of databases for suspicious activity.

Activity 6 (exploratory)

Can you recall an occasion when you have been personally aware of technological security measures?

Comment

On a recent visit to the USA I went through a range of airport security screenings. In addition to having my belongings checked, I was photographed at least twice (as well as being under almost constant video surveillance in the airports), had my fingerprints scanned electronically, and was required to fill in numerous online and paper forms.

The promise is that such technologies will make us safer, but could they turn the world we live in into a society strangely reminiscent of the nightmare vision contained in George Orwell’s novel 1984?

As you’ve seen so far in this section, there is plenty of opportunity for digital information about each of us to be created. Some of this information we might intentionally give out ourselves – on social networking sites, for example. Other information about us may, as described above, be gathered more surreptitiously by various agencies. In general we have little control over how digital information about us is used or who receives it. We might assume that information gathered legally by a government agency, for instance, will be handled appropriately and used only for our benefit; yet there have been many examples of governments and private organisations ‘losing’ confidential data by transferring it insecurely. For example, in November 2008 the UK government announced that two CDs containing personal information about 25 million people had been lost by HM Revenue and Customs when they were posted to the National Audit Office. If criminals got hold of such information then there would be the risk of our identity or our money being stolen.

2.6 Communicating on the move

Advances in digital technology have, in a very short space of time, revolutionised the way many of us live our lives. Nowhere is this more evident than in our ability to communicate as we travel. Below I’ll share with you a personal example that highlights some of the changes, and some of the opportunities and problems these changes have created.

In the 1980s my employers of the time set up an email account for me with a commercial email provider called CompuServe. This required me to use a modem to connect my computer to a telephone line and dial one of a set of specific phone numbers so that my email could be transmitted. This was fine if I was in the office, but more complicated when travelling as very few hotels made telephone sockets available to customers. As a result, my travelling kit soon contained a selection of small screwdrivers for dismantling hotel telephones, and a set of wires, crocodile clips and pliers so I could wire directly into the phone system. Of course, this was all done at my own risk and without the knowledge or approval of the hotels, and I am not recommending it!

In those days, even when I did manage to get online, email transmission was very slow and expensive. Nowadays I have a mobile phone with which I can send and pick up emails quickly and cheaply wherever I am (without the need to dismantle a fixed-line telephone!). As well as email, my phone enables me to communicate in several other ways – instant messaging and social networking, for example, not to mention voice calls. I can also use the built-in global positioning system (GPS) to find out where I am, and even plot my location on a website to let my friends and family see where I am (or at least see where my phone is).

This last feature was very useful when my wife and I tried to find our son’s new flat for the first time, as the last mile of the journey was rather more complicated than expected. Our son could check online and see exactly where we were, and he could also talk to us and guide us to the right place. Yet a service like this also has some disadvantages – most importantly, I need to remember to turn it off if I don’t want people to know where I am. A few months later, I realised on returning home after buying my wife a birthday present that the same service will have showed that I spent 20 minutes in a jeweller’s shop. I don’t think she noticed, or if she did she didn’t allow it to spoil the surprise. However, it’s not hard to imagine other circumstances in which I might not want my location to be publicised, even to my family and friends (Figure 7).

Described image
Figure 7 The disadvantages of GPS?

2.7 Section summary

In this section you’ve learned about some of the key aspects of an information society, online social networking being one of them. In the next section I’ll outline some ways in which you can participate in online discussions effectively.

3 Participating in a digital world

[Timings. This is the third section of this unit. It should take you around two hours to complete. If you don’t have time to work through it all at once, there are break points where you can stop and return later.] Previously in this unit I’ve mentioned the rise of social networking – one aspect of our increasingly digital world. You may already communicate online to some extent in your daily life.

What follows in this section is a quick guide to good practice in contributing to online discussions. It should help you to work and socialise with others online – in your studies, your social life and your working life. Much of the content is summed up by the familiar tenet known as the Golden Rule: a concept common to many ethical codes, which simply states that we should treat others as we would want them to treat us. Just as this Golden Rule is relevant to good manners – ‘etiquette’ – when talking face to face, so it is relevant to online communication. To help us apply it, it has been developed into guidelines for online behaviour called ‘net etiquette’ or, more commonly, just netiquette.

Netiquette is intended to make us all think about how we behave online and to make us aware of the effect our words could have on others reading them. If it seems that there are far too many rules to follow, be reassured that they aren’t hard and fast commands that you must remember and obey. Netiquette does not encompass every situation you may find yourself in – it’s perfectly possible to obey all the guidance below and still annoy someone – but it will give you a good foundation for your participation in online discussions.

Most of what follows is common sense and good manners. Some of it may be familiar to you, but please take time to read it if you don’t have much experience of using online discussion groups to work with others. There’s a big difference between working in an online community and socialising online, so even if you are experienced at the latter, you should find the following material useful.

3.1 Netiquette: Respecting others online

As children we quickly learn many rules about how to interact with other people. Some of these rules are common sense, such as ‘don’t interrupt a speaker’ and ‘say please and thank you’, and are necessary if we are to reduce the likelihood of arguments or causing offence.

When we have a face-to-face conversation, we don’t just rely on the spoken words to establish the other person’s meaning; unconsciously we are also monitoring the tone of their voice, their facial expression and their body language. Telephone conversations are a little more ambiguous because we can no longer see the other person; email and online discussions are harder again, since all we have is text. It is extremely easy to misinterpret words on a page, so the writer must take great care before pressing the button that sends their message to the world.

Thank, acknowledge and support people

People can’t see you nod, smile or frown as you read their messages. If they get no response, they may feel ignored and be discouraged from contributing further. Why not send a short reply to keep the conversation going? This can make a big difference in a small group setting. However, do bear in mind that in a large, busy forum too many messages like this could be a nuisance.

Acknowledge before differing

Before you disagree with someone, try to summarise the other person’s point in your own words. Then they know you are trying to understand them and will be more likely to take your view seriously. Otherwise, you risk talking at each other rather than to each other. You should also recognise that other people are entitled to their point of view, even if you consider them to be entirely wrong.

Make clear your perspective

Try to speak personally. That means avoiding statements like ‘This is the way it is …’ or ‘It is a fact that …’. These sound dogmatic and leave no room for anyone else’s perspective. Why not start by saying ‘I think …’ or ‘I feel …’? If you are presenting someone else’s views then say so, perhaps by using a quotation and acknowledgement.

Emotions

Emotions can be easily misunderstood when you can’t see faces or body language. People may not realise you are joking, and irony and satire are easily missed – all good reasons to think before you send a message. To compensate for these restrictions, early internet users came up with the idea of the smiley face – :) or :-) – which then grew into a whole family of emoticons.

Remember that the systems upon which many forums are based only support plain text, so you can’t always rely on fonts and colours to add meaning. Even if you are using a forum that allows so-called ‘rich text’, it’s possible that other users will be picking up messages as plain text emails or as text message alerts on their mobile phones and will not see your formatting. AND DON’T WRITE IN CAPITAL LETTERS – IT WILL COME OVER AS SHOUTING!

If you read something that offends or upsets you, it is very tempting to dash off a reply immediately. However, messages written in the heat of the moment can often cause offence themselves. It’s much better to save your message as a draft and take a break or sleep on it. That gives you a chance to come back to your message when you’re feeling calmer and ask yourself ‘how would I feel if someone sent that message to me?’. If you decide it will make things worse then make sure you edit it before you send it.

The best advice is to try to be aware of your audience before you post. The internet is a global phenomenon; people from widely differing cultures and backgrounds may read what you write online, and what you find funny may be offensive to them. It may take time to work out what sort of ‘audience’ can be found in a particular forum; some are very permissive and allow almost any sort of behaviour, while most (like those at The Open University) will not tolerate bad behaviour or abuse.

Activity 7 (exploratory)

Look at the email exchange shown in Figure 8. What emotions are being expressed through smileys and typography? Would Jon and Sue still be on speaking terms if they hadn’t used these devices?

Described image
Figure 8 Email exchange between Jon and Sue
Comment

In Sue’s first reply to Jon she expresses her frustration by typing ‘Aaaarrrgggghhhhhh’, but she ends that message with a winking smiley. Jon’s reply then says ‘sorry’ in a very small voice! Sue’s final reply starts with a happy smiley to show that everything’s OK. She uses a large font when she mentions the annoyingly early meeting time.

I feel sure that Jon and Sue would still be friendly after this email exchange. But I have seen email exchanges between colleagues that had the opposite effect, when the participants didn’t take care about how they expressed themselves in their messages.

Moderation

Moderators are forum participants responsible for keeping order. They may have capabilities within the forum greater than those of other participants; for example, they can sometimes add new participants and suspend people who are abusive. They also work to keep the discussions friendly and relevant to the forum. A forum with a moderator is said to be moderated. Forums without moderators are unmoderated and are generally places where newcomers should tread very carefully. Moderators tend to introduce themselves early on in forum discussions, so it’s usually clear whether a forum is moderated or not.

Some other advice

  • Keep to the subject, and pick the right forum for your contribution.
  • Before you write a message, check any rules about what is and is not considered acceptable in the forum. Many discussion forums have rules, aside from netiquette, about things such as links to commercial sites.
  • Take a little time to use the forum’s search facilities to see if your question or topic has already been discussed or covered in a set of frequently asked questions (FAQs). If it has, you should at least scan the existing messages to see if your points have been addressed.
  • Don’t feel you have to post immediately. Take your time to see what is being discussed and get a feel for the group you’re joining. This very sensible behaviour has the unfortunate name of lurking but is quite acceptable online. If you want to post, many discussion groups have a forum devoted to new users where they can introduce themselves to other readers. These are always good places to get started.
  • Try to keep your messages short and to the point. People don’t want to read long, rambling messages, especially if they can’t work out what response you’re looking for.
  • Write a concise subject line (title) for your message – people often won’t spend time reading messages unless the subject line looks relevant.
  • Keep to one subject (topic of discussion) per message. If you want to cover another subject, do it in another message.
  • When replying to a message, quoting part of that earlier message can be helpful so that readers can easily see what you are referring to. Add your response after the quoted material, not before it. And keep your quotation short and to the point, otherwise the resulting messages will get longer and longer.
  • If you ask a question and it is answered, thank the person who responded. It’s not only polite, it also shows that the discussion has come to an end.
  • If you’ve reached a point where you disagree with someone and neither of you is going to change your opinion (Figure 9), realise the conversation is over, agree to disagree, and move on.
Described image
Figure 9 Online discussions can become addictive!
Activity 8 (exploratory)

The following is a quiz on netiquette which can be used to test your understanding of what you have studied so far in this section.

Writing in capitals has the same effect as shouting.

a. 

True


b. 

False


The correct answer is a.

You can write what you like as long as you put a smiley face after it.

a. 

True


b. 

False


The correct answer is b.

You should always quote the whole of someone’s message when replying.

a. 

True


b. 

False


The correct answer is b.

Lurking is considered to be bad netiquette.

a. 

True


b. 

False


The correct answer is b.

If you disagree with someone you should acknowledge what they have said first.

a. 

True


b. 

False


The correct answer is a.

If you have several ideas to discuss, it is better to put each one in a different short message than combine them into one long message.

a. 

True


b. 

False


The correct answer is a.

It is very important to keep a discussion going until you have convinced everyone to agree with your point of view.

a. 

True


b. 

False


The correct answer is b.

3.2 Ethical and legal considerations

[Break point. This would be a good point to take a break if you need to do something else before returning later.] In using a computer for communications you have many rights of free expression, but you also have certain responsibilities to respect others and to have some awareness of privacy and confidentiality in relation to online communications. You should be aware of the following points:

  • An email is generally considered to be equivalent to a private letter, and should not be quoted or forwarded to anyone else without the permission of the original sender. This can be particularly poorly observed in companies (even those whose employees are told to assume that all online communications are for the recipient’s eyes only, unless otherwise stated).
  • Besides the informal rules of netiquette, most forums have a code of conduct and conditions of use that govern acceptable behaviour. For example, the use of the online forums provided by The Open University is covered by its Computing Code of Conduct. You will usually find a forum’s terms of use linked from its home page, or listed in the code of conduct that you are asked to agree to when you first register for an account.
  • Considerations of copyright and plagiarism (cheating by using another person’s work as if it were your own) apply to online discussions. If you are quoting something written by someone else, put it in quotation marks and acknowledge the source.
  • Some forums are not wholly public, in which case messages should not be copied outside the forum. The forum’s terms of use may specify this.

3.3 Copyright

One of the reasons the Web has grown so quickly, and one of its most fascinating aspects, is that almost anyone can publish almost anything on it. It is very easy to find information, images, audio and video files on the Web, which you can then save and incorporate into your own material.

Copying is so easy that people often make the mistake of assuming that everything on the Web is freely available. This is not the case: most information you will come across is likely to be covered by copyright law. This applies not only to online television programmes, music, photographs, books and so on, but also to information – for example, in the form of online academic papers or simply in someone’s blog.

Material not subject to copyright is said to belong in the public domain and can be used by anyone. Older works of art and literature, such as the works of Shakespeare and Beethoven, are in the public domain. However, individual printings, adaptations or recordings of those works are copyrighted to the publisher or performer. The situation can become very complicated because the duration and extent of copyright differs between countries. For example, material may be in the public domain in the USA but still under copyright in the UK. As a result, it is always wise to assume that any third-party material (that is, material originating from someone else) is still protected by copyright unless you’re sure it’s in the public domain.

Copyright holders can prosecute individuals and organisations for infringing their rights; in recent years, music and film companies have sued individuals for very large sums of money. Below are some general points you should bear in mind.

  • You should seek the author’s permission if you wish to use any copyrighted material. Just because something is on the Web does not mean it is freely available for you to use.
  • Many websites have usage policies explaining how their material can be used. Some are more restrictive than others, so make sure you find and follow the relevant policies.
  • Information published online may have been put there by someone who is not the copyright holder.
  • When quoting text in your own academic work (other than in assignment answers – see below), the generally accepted guideline from copyright legislation is that you can use a whole chapter or up to 5% of any one book without seeking permission, but you must give a full reference to show where it has come from.

This may all seem rather intimidating, but it’s not quite as bad as you might fear – fortunately, copyright law makes some concessions to students. As a result, you don’t have to ask permission to use copyrighted material in answering an assignment question, although you must still include references. However, if you want to reuse the same material for any other purpose at a later date, normal copyright law applies and you must seek permission.

3.4 Good academic practice

Many courses will encourage students to use the Web as a resource. Students use it as part of their studies and in their assignments, and they should find it a great help in understanding and practising the things they learn.

However, using information found on the Web in this way can cause problems unless you take a little care. When using material written by other people you can quote their words, but good academic practice is that such quotations should always be limited and acknowledged. This applies whether you’re quoting from this unit or from other sources such as websites, journals or newspapers.

It can be very tempting to copy and paste large chunks of text into your notes – and possibly then into assignment answers – without giving a reference. However, that is very bad academic practice. It’s far better to use quotations sparingly and to rewrite most of the material in your own words. This allows you to show that you’ve understood the material and it also helps you to remember it.

In addition, it’s good academic practice to give a reference to the source of any third-party material you include in your own work. Not doing so is not only impolite, as you’re failing to acknowledge the help that someone else’s work has given you; it’s regarded as plagiarism and is never acceptable.

To help students, university websites often provide a guide on how to reference sources of information correctly, including those you might find online.

3.5 Section summary

In this section I’ve discussed some of the ways in which you can make good use of the Web, both for interacting with other people and for finding information. When working online it is also important to consider how to protect yourself and your computer, and that’s what I’ll turn to next.

4 Online safety

[Timings. This is the fourth section of this unit. It should take you around two hours to complete. If you don’t have time to work through it all at once, there are break points where you can stop and return later.] The internet provides many ways for people to get in touch with each other, but this ease of contact can have downsides for the unwary. It can expose internet users to the dangers of malicious software, to unsolicited and nuisance emails, and to a variety of hoaxes. In this section I’ll describe some of these problems and suggest how you can protect yourself from them.

4.1 Malware

Software designed to cause damage is known as malware. There are several types of malware, three of which are described below. However, be aware that as malware evolves to avoid detection, the boundaries between the different categories are tending to blur.

The best-known type of malware is probably the virus. This is a piece of software that has been written to attack software on your computer, often with the specific intention of causing harm – deleting files, for example. A virus attaches itself to other software on your computer and activates when that software is run. Viruses are so called because they are designed to spread quickly and easily from one computer to another via internet connections or external storage devices such as memory sticks.

Another type of malware is the worm. This is a piece of malicious software that runs ‘in the background’, doing some damage to your computer even though you may not realise it is running. Worms can make copies of themselves, and those copies can spread via an internet connection. A worm typically consumes resources by running on a computer; in a major attack, all of a computer’s processing resources could be used in running the worm and its copies.

Finally, the trojan is a digital equivalent of the legendary wooden horse that smuggled Greek soldiers into Troy. It appears to be legitimate software, such as a screensaver, but behind the scenes it is causing damage – perhaps allowing someone else to gain control of the computer, copying personal information, deleting information, or using email software to pass itself on to other computers.

Protecting your computer

There are three main ways to protect your computer against malware.

  • Ensure that your computer has the latest patch from the producer of your operating system (OS). Microsoft, Apple and other producers frequently issue patches for their products.
  • Make sure other software is kept up to date – Adobe Reader, Flash, Java and web browsers (such as Internet Explorer, Opera, Firefox, etc.) to name just a few. As new malware is discovered, so new versions of software are released that guard against it.
  • Install anti-virus software and keep it up to date. Anti-virus software catches a very high percentage of malware, but only if the version on your computer is regularly updated. Remember that if you don’t use Windows, it is still possible to pass on files infected with malware to Windows users. That’s why the main job of anti-virus software for Apple’s OS X is to check files for things that could infect Windows machines.

In addition, you can use a piece of software called a firewall. This tries to stop unauthorised access to your computer without impeding your own authorised online access. There may be a firewall built into your computer’s operating system; others may be present in the hardware that connects your computer to the internet.

As well as the technical protections described above, you should protect yourself by using anti-virus software to scan any files you receive before you open them. This should include:

  • files you download from the Web
  • files given to you on removable media such as a CD or memory stick
  • files attached to emails.

Bear in mind that no reputable software company sends unsolicited email messages with attachments, claiming to be giving you an update.

4.2 Spam

Spam is the general term for unsolicited emails sent to large numbers of people. Such emails could be hoax messages designed to mislead, or they could be used to advertise a product.

In terms of advertising, spam email is similar to the marketing leaflets and letters that drop through your letterbox at home. However, this paper mail is subject to legislation that tightly controls the range of products and services being offered. The equivalent legislation does not yet exist in the electronic world, although new laws are being introduced. For example, in the USA the federal law ‘Controlling the Assault of Non-Solicited Pornography and Marketing’ (CAN-SPAM) took effect in January 2004, whilst in Europe the EU ‘Directive on Privacy and Electronic Communications’ came into force in the latter part of 2003. Though such national legislation is intended to limit the volume of spam email, in practice this is a very difficult task because the internet crosses national borders. Spam can be sent from one country to another, and countries that have legislation find it hard to enforce their rules in countries that do not.

Spam email can be sent only if the spammer (the person initiating the spam) has a collection of email addresses to send to. Common ways to ‘harvest’ email addresses include:

  • company databases
  • websites
  • online discussion groups
  • including links in images within emails, which when clicked by the recipient inform the spammer that the message has been opened
  • infecting unprotected computers with malicious software to look for addresses.

Spammers may harvest vast numbers of email addresses, but not immediately know whether a particular email address is ‘live’ (actually in use) – it could be that the original owner of the address no longer uses it. So beware of spam emails that appear to give you the option to unsubscribe from a mailing list (very often by offering a web link to click on). If you select this option, this will verify to the spammers that your email address is live; they can then continue to send you spam, or even sell your email address to other spammers. So using the unsubscribe option can increase your spam rather than reduce it.

Below are some guidelines for minimising the spam you receive.

  • Don’t reply to spam emails.
  • Don’t use the unsubscribe option in response to unrequested emails.
  • Don’t reveal your email address unless you want to receive mail from a particular source.
  • Don’t post your email address on a website.
  • Don’t use your regular email address when registering on websites or joining discussion groups. Either create a new email address for these purposes or use a spare one that you’re happy to abandon if necessary (e.g. a web-based email account such as those offered by Yahoo, Microsoft, Google, etc.).
  • Set your email software to filter out unwanted messages. Most email software is equipped with ‘junk mail’ filters that can be set to identify and remove spam messages as they arrive in your inbox. Additionally, your internet service provider (ISP) may filter incoming mail for spam before it even reaches your inbox.
  • Ensure that all other users of your computer follow the above guidance.

4.3 Hoaxes

[Break point. This would be a good point to take a break if you need to do something else before returning later.]

A hoax message aims to mislead, often relying on the naivety of its recipients. One of the most notorious hoaxes concerned the so-called ‘Good Times virus’. This hoax is described by Sophos (n.d.), a company that develops anti-virus software, as follows. (Remember this is a hoax, so please don’t spread the news about the Good Times virus as so many others did!)

Probably the most successful virus hoax of all time, Good Times has been scaring people since 1994. It’s still going strong, despite the fact that it is completely untrue; there is no such virus, and indeed it is impossible for a virus to do what is claimed for Good Times.

The hoax started off simply: it warned people not to read or download any email with the subject of “Good Times”, because the messages were viral and would erase their hard drives. Later, more detail was added, telling of the damage that would be done to the user’s computer system.

The end of the spoof warning contained an exhortation to “Forward this to all your friends. It may help them a lot.” […] In their thousands, people did, and still do.

The secret to the success of the hoax is that it successfully taps into computer users’ fears about computers, security and the Internet, and contains pseudo-technical babble that sounds convincing.

This description indicates how convincing the message in this case was. Hoax messages can spread rapidly via email and forums, often passed on unwittingly by work colleagues, family, friends and even reputable online retailers. Unfortunately, users who fall for hoaxes can cause problems both for themselves and for others. A hoax can generate spam (when, as with Good Times, it directs the recipient to pass on the message), cause files to be deleted unnecessarily and potentially harmfully (by directing the user to delete them), and generally cause panic.

Like Sophos, most anti-virus software vendors maintain information on hoaxes on their websites, so you can check such sites if you suspect a hoax. Alternatively you can use a search engine: by searching for significant terms contained within the hoax message, you may find reports on reputable sites such as the Sophos site.

4.4 Phishing

A particular kind of hoax message aims to persuade users to disclose private information such as their credit card details and PIN (Personal Identification Number). This is described as phishing. The recipient of the message may be directed to a hoax website where they are requested to part with their details. Figure 10 shows an example of an email that I received.

Described image
Figure 10 An attempt at phishing

Activity 9 (exploratory)

Looking at the email in Figure 10, what warning signs are there that might alert you to the fact that this is an attempt at phishing?

Comment

Below are the warning signs I noted when I received this email.

  • Although the sender’s email address is described as ‘HSBC Bank PLC’, the actual address – pontiusfamily@netzero.net – appears to have nothing whatsoever to do with the bank; instead it sounds like a private email address.
  • The email address of ‘netzero.net’ refers to an internet service provider – NetZero – based in the USA. I can’t imagine that a bank based in the UK would contact me from an email address supplied by an internet service provider in another country.
  • There is confusion about which bank this email is meant to be from, as the message refers to both HSBC and Barclays.
  • The message exhibits poor grammar and spelling – ‘proctect’, for example. I think it unlikely that such errors would be present in genuine messages from my bank.
  • The message is not addressed to the recipient (me) by name. This can indicate a message sent randomly to large numbers of email addresses.

The above points, along with the fact that I don’t actually manage my bank account online, convinced me not to follow the instructions in the message. Yet despite all these warning signs, some people do hand over their details in this way.

It’s very important not to click on any links in these sorts of messages. Even if you don’t enter your account details, making any response at all may confirm to the phisher that your email address is valid, leaving you open to further hoaxes and spam. Simply clicking on a link also risks your computer being infected with malware that could distribute the same message to all the email addresses – including those of your work colleagues, family and friends – stored on your computer.

One way to check this kind of message is to position your mouse pointer over the link (‘Click here’ in the Figure 10 example) and look at the web address that appears either as pop-up text or at the bottom of the message window. If it seems to be unrelated to the sender of the message then you should be even more suspicious. After receiving the email shown in Figure 10, I searched online and found a reputable site (millersmiles.co.uk) that contained the information shown in Figure 11.

Described image
Figure 11 Information about a phishing attempt

Most phishing messages try to get you to provide some personal information (Figure 12). Clearly those trying to get your online banking details are aiming to get access to your money. However, others could be trying to access your email, blog, instant messaging or online auction accounts (if you have any), then use these accounts to distribute more phishing emails.

Described image
Figure 12 Phishing: fooling someone into giving away secret information

If you have a job that provides you with an email account then you have probably also seen messages claiming to be from your company’s IT department, asking you to enter your username and password into a website to reset your email account. I’ve certainly had them sent to my Open University email account. As with requests for you to disclose your financial details, you should be careful when disclosing your username and password. A phone call to the relevant people in the company should be sufficient to find out whether or not the request is genuine.

4.5 Managing your identity online

[Break point. This would be a good point to take a break if you need to do something else before returning later.] As we live more of our lives online, so it becomes more important for us to be aware of and, as far as possible, try to manage the information that others can access about us online. As a general guideline, before you place any kind of information about yourself on the Web you should think about the impression you would like potential employers, new friends, your parents or your children to get of you if they searched for you online. Stories of people being disciplined or even losing their jobs as a result of inappropriate comments or photographs on their blogs or social networking sites show that this isn’t a hypothetical situation. For some employers, checking the information that is available online about job applicants is as much a part of the selection process as taking up references.

Activity 10 (exploratory)

Enter your name into a search engine and review what you find.

  • a.What is revealed about you?
  • b.What is revealed about other people with the same name as you? If you have a common name then it may be hard to tell the difference between you and others with the same name. However, you should be able to get an impression – and possibly even some photographs – of a few individuals who share your name. If you can’t find anyone with your name, try looking for the name of a family member or friend.
Comment
  • a.My name (John Woodthorpe) isn’t very common, so most of the links I found do refer to me. They include articles and papers I wrote both before and after I started working for The Open University, as well as links to the OU website and some defunct ones to a website I used to run and took down many years ago. I didn’t find my Facebook page because the privacy settings mean that it isn’t publicly available.
  • b.There were several references to a company director who shares my name. I also found a couple of Facebook users, including one in New Zealand. Most surprisingly, I found a reference to a couple whose names are the same as mine and my wife’s – as far as I can tell, they run (or perhaps ran) a guest house in Bulgaria. In addition, there were several links to genealogy sites where people are trying to trace their family trees, and quite a few references to people called John from places called Woodthorpe.

This so-called ‘ego surfing’ or ‘vanity surfing’ is an interesting thing to do from time to time. Overall I haven’t found anything unpleasant or embarrassing, but I’m old enough for any youthful indiscretions to have happened long before they could have been recorded online. I also have a range of usernames that don’t resemble my real name and so aren’t easily connected to me. They aren’t used for anything nefarious, but I see no reason why I should make it easy for others to find out everything about me.

Several online communities offer good advice on managing your online identity - the links are given below. It’s not something to get overly worried about, but it is worth being aware of the impression that others can get by following the trail of your online activities.

Manage your online reputation

How to deal with internet meanies.

Protecting reputations online

4.6 Section summary

In this section I’ve discussed ways in which you can protect your computer and yourself online, ranging from taking sensible precautions against malware to guarding against presenting information about yourself to the world that you might later regret. In the next section you’ll learn more about the development of the computer.

5 What’s inside my computer, and what makes it work?

The next section of this unit is based around a video called ‘Inside the box’ and should take you one to two hours to complete. It will give you an overview of a computer from the perspectives of a computer engineer and a computer scientist. The video has been divided into three ten-minute sections, which you will watch at intervals throughout the text.

5.1 Peripherals

This section will introduce you to a range of peripherals connected to a typical desktop PC, and show you how the computer engineer and computer scientist each view the communication between the peripherals and the main PC.

Activity 11 (exploratory)

Below is the video that you need to watch for this activity. This consists of the introduction and first section (entitled ‘Outside to inside – peripherals’) of the ‘Inside the box’ video. You will need your computer’s speakers or headphones to listen to it.

Download this video clip.Video player: Inside the box: introduction and section 1
Skip transcript: Inside the box: introduction and section 1

Transcript: Inside the box: introduction and section 1

[Graphic title: Inside the box]

[Music – duration 00:12]

Spencer Kelly
Most of us use computers in our everyday lives, and usually we’re happy to think of them just as tools for word processing, playing games and so on. But in this video we’re going to go inside these faceless boxes, and we’re going to think of a computer from two extreme viewpoints. We’re going to look at the physical hardware from the point of view of an engineer, and then we’re going to consider the theoretical point of view from a computer scientist.
Now, you can think about a computer in many different ways. Whatever you do, it’ll be between these two extremes.
So here’s a typical setup that you may have at home. Let’s consider the physical viewpoint first, that of an engineer. Dr Darien Graham-Smith is Technical Editor of PCPro. Hiya.
Darien Graham-Smith
Hi there.
Spencer
OK, take a look at this. What do you see?
Darien
Well, as you say, I’m interested in the physical hardware. I think about the components that are in this computer that might make it suitable for maybe to be a general-purpose desktop computer or maybe a specialist computer such as for controlling the engine of a car. Obviously this is a desktop computer, so I might be interested in how much memory it has or what connectors it has for connecting to different peripherals.
Spencer
OK, Darien, thank you. Hold it there, we’re going to bring in the computer scientist now. Dr Parisa Eslambolchilar is a computer scientist and a Lecturer in Computing at Swansea University. Parisa, hi.
Parisa Eslambolchilar
Hi, Spencer.
Spencer
What interests you about this particular computer then?
Parisa
I’m interested to find out how to solve problems with these computers. I’m rarely interested in the physical form of computers, but I’m interested to find out what capabilities these computing devices have and how to tell this computer – these computers to do things efficiently.
Spencer
OK. Would you mind showing us?
Parisa
Yes. When I look at this computer, what I see is a big box called ‘computer’. And inside this box we have a processor, which is capable of carrying out instructions. We have memory, which is capable of holding data and instructions later the processor is going to perform. And we have input/output devices as described by Darien.
Spencer
And so that’s how the computer talks to the rest of the world.
Parisa
Exactly. These three bits are communicating with each other, and these are called data or instruction buses.
Spencer
So you’re interested just in the arrows. You don’t care what the arrows are made of. Darien comes in and says we can’t use ink, we’ve got to use copper or something else.
Parisa
Yes. This is my generic feel when I look at any computing device. A processor, memory, input/output devices.
Spencer
So you’re not interested in the make and the model.
Parisa
Not at all.
Spencer
As long as they’ve got those bits …
Parisa
Not at all.
Spencer
… you can do your job.
Parisa
Exactly.
Spencer
OK. Right, it’s time to look at this computer system in detail. We’re going to start with the components that are outside the box, then we’re going to go inside and we’re going to dismantle what we find in there. Now in doing this it’s very likely that we’re going to damage or destroy some of the components inside the computer. So please don’t try this at home. If you do open up your computer, remember to disconnect it from the mains first and remember that power supplies can store power for quite a long time, so treat the inside of a computer with care.

[Graphic title: Outside to inside – peripherals]

[Music – duration 00:08]

Spencer
Now, we’ll start by looking at the external devices that are plugged into the system box: keyboard and mouse. Whip the plugs out of the back. Darien, what do you find interesting about that little fella?
Darien
(Laughs) Well, not an awful lot. This is a fairly standard mouse and as you can see it’s got a standard connector. This is a PS2 connector. You move the mouse, it generates an electrical signal, that goes through this plug and into the computer.
Spencer
OK. And how about – don’t you just love cables? – the keyboard.
Darien
Yes, well, once again this is a standard keyboard, I’m sure this’ll be familiar, and it’s got a standard connector. In fact, that’s the same standard. That’s another PS2 connector, though it’s colour coded so you don’t get them mixed up. Press the key, generates an electrical signal, goes through the plug into the computer.
Spencer
Both devices talk to the computer using exactly the same type of plug, then.
Darien
That’s right, yes, they’re fairly simple devices.
Parisa
Thank you, Darien. In my view, mouse and keyboard are both input devices.
If you go back to the initial drawing I had to present a generic model of a computing system, mouse and keyboard are going into the box presented as the input/output or peripheral devices.
Mouse and keyboard are both generating electrical signals which represent symbolic information such as the key pressed or the mouse movement. These two devices are continuously capturing the data and then entering them into the computing system where it can be processed later.
Spencer
So different signals mean different key presses, different button presses, different movements, the computer will do different things based on those signals.
Parisa
Exactly.
Spencer
Yeah. Right, we’ve done input, let’s do output. Darien, the monitor.
Darien
Yes, the monitor. This here is a 19-inch flat-screen model, a fairly standard part of many desktop setups, and it connects by another standard connector. This is called a DVI connector. It takes the electrical signals from the computer, relays them to the screen, which then displays them as images. That’s what I make of it.
Parisa
In my view this display is just an output device, and I can actually take the plug back to the peripheral box and represent it as an output port.
I’m interested to know what symbolic information or instructional data I need to send to this device to actually make it display the data I want to, and I’m not interested to know what kind of display it is or what kind of connector it has.
Spencer
So the information that comes out of the processor needs to be turned into something that we humans can read on the screen.
Parisa
Exactly.
Spencer
Right, that’s the monitor. Over the other side we’ve got a printer. Darien, just a straightforward output device?
Darien
You’d think so, wouldn’t you? I mean, you send your pages to the printer and it prints them. But sometimes the printer needs to talk back to the computer, for example to say it’s out of paper. So there’s two-way communication going on there.
Spencer
This is an input and an output device.
Darien
That’s right.
Spencer
OK.
Darien
And it happens over another standard interface, this time USB.
Parisa
Thank you, Darien. I put back this cable on the peripheral device box.
In my view, printers are interesting devices with interesting behaviour. They can interrupt the main computer at any time. If you think about an example in real life, they can be like a scenario of reading a book and the doorbell rings, you bookmark the page you were reading and you answer the doorbell, come back and resume the reading from the place you paused.
Spencer
So that’s a fairly simple interruption then. The computer’s the one reading the book, the printer is at the door, and then it can just stop what it’s doing and then come back and resume it afterwards. That sounds pretty simple.
Parisa
Exactly, exactly. But this is a simplest scenario, we can imagine for responding to an interrupt. But imagine a different scenario – for instance, you are juggling and the doorbell rings. It’s not as easy as bookmarking the page.
Spencer
You can’t leave them hanging there while you go to the door, yeah.
Parisa
Exactly. So what can you do? You can either shout to the person at the door and say wait, or you let the balls fall on the floor and then you go to the door and come back and restart the juggling.
But it’s not always as simple as this scenario. How about responding to a fire alarm? What happens if you’re juggling and the fire alarm goes on? Can you respond to that in the same way as you responded to the doorbell?
Spencer
So you’re interested in looking at responding to different types of interruptions in different ways and possibly having to restart more of the process afterwards depending on how you left it.
Parisa
Exactly. So developing models of computing devices to respond to interrupts efficiently is a challenging subject for a computer scientist.
Spencer
Now, when we were talking about the connectors, one word stood out for me – especially from you, Darien – and that’s standard.
Darien
Yes. Standards are what make it possible for the computer to talk to all these different devices. The standard will define the physical size and shape of the connector, and it will also specify the power requirements and the sort of electrical signals that have to travel back and forth.
Spencer
OK, and these standards are available to all device manufacturers?
Darien
Absolutely, yes. And that makes it very easy. I can go to a shop and I can buy a new monitor or a new printer and I can be confident that they will work with my PC.
Spencer
Parisa, are standards important to you as a computer scientist?
Parisa
Yes, I do use standards but they are not the same standards as engineers use. I work with symbolic data and information, and I’m interested to know how computers store or manipulate the data. So I need to make sure there is a common interpretation for these symbols when I transfer the data from one device to another device.
Spencer
Right, so if you bought a new monitor, different make, you need to guarantee that it’s going to show the same information.
Parisa
Exactly.
Spencer
So we are going to hear the word ‘standard’ an awful lot more. You have been warned.
Just one more device to get rid of first. Darien, smile.
Darien
Ah yes, the digital camera. Well, of course, once you’ve taken your photographs you upload them to the PC via a standard connector again, USB.
Spencer
Surely not.
Darien
Oh yes.
Parisa
For me this is only an input/output device. I can put this USB cable in the peripheral devices box.
Spencer
OK, good, and let’s just lose this cable as well.
Darien
Yes, that’s perhaps the most important standard of all because without that one the computer can’t do anything.
Spencer
Now surely we’re all in agreement on that one.
Parisa
Well, not really. For me, it only makes the hardware work. I can still reason, I can still solve computational problems or develop the theories which can be used for the computation later …
Spencer
All without electricity.
Parisa
… without electricity.
Spencer
OK. So, as I understand it, as an engineer you’re looking at these external devices as having standard interfaces that match the standard interface on the system box. Yeah?
Darien
That’s right.
Spencer
And as a computer scientist you’re thinking about these devices as a way of transferring standard symbolic data into and out of this chap here.
Parisa
That’s right.
Spencer
Excellent. Go on, try it.
Parisa
Thank you.
Spencer
You’ll love it. Electricity. Brilliant.
End transcript: Inside the box: introduction and section 1
Inside the box: introduction and section 1
Interactive feature not available in single page view (see it in standard view).

5.2 Opening the case

Figure 13 shows a picture of the inside of a fairly standard desktop PC (click on this to see a larger view with labels).

This element is no longer supported and cannot be used.

To make sense of all this clutter I could take a computer engineering view of the system and think about the detailed wiring, voltages, electric currents, circuit boards, power supplies, cooling fans, etc. However, few people really need to think about a computer system in this way. Instead we can think of the computer as a series of standard parts connected by standard wiring, with standard communication protocols exchanging data in standard formats.

Figure 14 provides an abstract, high-level look at the content of a desktop computing system. Inside the box I’ve reduced the detail to just the central processing unit (CPU) (otherwise known as the central processor), the memory and the buses connecting them together, with everything outside the box connected through interfaces. The external components are the input, output and storage devices that we can typically expect to be connected to the system, and the network access points through which the desktop system can connect to a wider network of computers and devices.

Described image
Figure 14 High-level representation of parts of a desktop computer

5.3 What's inside?

I will now examine a physical desktop PC by dismantling it and looking for the places where the processing happens. This exploration will take me down into the central processing unit, where I will see that at the lowest level of the computer there are simple electronic switches.

So let’s take a look and see what can be found inside a modern desktop computer. You should keep in mind that we can think about the computer system as a symbolic message-passing and manipulation system making use of standard data formats and communication protocols.

12 (Exploratory)

Download this video clip.Video player: Inside the box: section 2
Skip transcript: Inside the box: section 2

Transcript: Inside the box: section 2

[Graphic title: Opening the case – what’s inside?]

[Music – duration 00:12]

Spencer Kelly
Let us now turn our attention to the components inside the system box. Now Darien, is this a fairly standard PC?
Darien Graham-Smith
Yeah, I mean, it’s not a brand new one obviously, but you’ll find systems like this in plenty of businesses and homes.
Spencer
OK. Parisa, is any of this of interest to a computer scientist?
Parisa Eslambolchilar
I very rarely look inside my computers. I leave it to the hardware people.
Spencer
You have people to do that? She actually has people …
Parisa
(Laughs) I’m only interested in what the machine can do.
Spencer
Right. Now Darien, there’s a fan in here. What’s that about?
Darien
Well, the central processing unit which is inside the computer, it can get very hot in use, it can get to more than 80 degrees Celsius, and that’s actually hot enough for it to destroy itself. So we have a fan inside there, we also have a heat sink with thermal paste on it there, and that keeps it all cool.
Spencer
OK, Parisa.
Parisa
The fan has nothing to do with my generic view of computing. This is only an engineering component.
Spencer
Right. [to Darien] You can keep that, then.
And I recognise this as well. This is the power supply, and these are the power cables that supply electricity to all the components inside. Now Darien, the message I’m getting from you is that this is yet another standard component, it’s just there to make all the other bits work, yeah?
Darien
That’s right. If you’re building a PC you need to make sure that all the components are receiving the right power through the right connectors, and that means using a standard power supply.
Spencer
OK, and Parisa, the message I’m getting from you is anything that helps the components to actually physically operate is not part of your view of computing.
Parisa
Yes, that’s right.
Spencer
OK.
[pause]
More standard components here. That’s the DVD drive, and this is the internal hard disk drive.
Darien
That’s right. These are both storage devices, but they’re a little bit different. This one’s self-contained; this one uses removable disks, obviously. Also they’ve got different connectors. This one uses a SATA (pronounced: satter) or SATA (pronounced: sarter) connector; this one has the older IDE interface.
Parisa
In my view of computing devices, these two are both memory devices and both capable of storing symbolic information and data permanently.
Spencer
Now, I recognise this because I’ve just put a new one in my computer. This is a graphics interface card. Now this is a pretty old one, but the newer ones will actually have a fan on top as well. I guess that’s because they generate quite a lot of heat, yeah?
Darien
That’s right, yes, graphics cards have their own processor – it’ll also have its own memory. And they’re both optimised to produce 2D and 3D images at very high speeds, so yes, it does generate quite a lot of heat.
Parisa
Yes, graphic cards used to be quite simple output devices, but modern graphic processing units have become so specialised they’ve become actually a computing device in their own right. They are capable of running image-processing algorithms and they can do any computational algorithms such as codebreaking very, very efficiently. So I can draw the same generic model for the graphic processing unit. So I can actually have the same big box but this time for the graphics card, with the graphics processor and the memory to store the symbolic data and just outside I have input/output devices. And these three units are communicating and talking to each other in the communication channels or data buses.
Spencer
So just to be clear, you are considering this graphics card as both a component of this computer and a computer in its own right.
Parisa
Yes, exactly. So in my view this is both an example of an input/output device in this generic model and also a computing device in its own right.
And these two symbolic manipulation devices are communicating and exchanging symbolic data continuously and just talking to each other.
Spencer
So is this what you do, then, when you’ve got complex components like this? You consider them as two different computers that exchange information and also one will control the other if necessary.
Parisa
Exactly. Or take the example of the digital camera. This is a very complex computing device. It’s got memory, it’s got a processor, it’s got input and output units and also the communication channels. But when you connect the digital camera to the main computer, the main computer sends symbolic instructions to this device and they start exchanging symbolic data with each other.
Spencer
And the same applies to other devices as well, so it sounds like a pretty powerful generalisation.
Parisa
Exactly.
Spencer
OK. Now, this has got an aerial on it, so I guess that makes this the wireless card.
Darien
That’s right. The wireless card lets the PC connect to a wireless network, and most laptops now have built-in wireless adapters so you can connect to the internet at home or perhaps in a coffee shop, for example.
Parisa
Yes, in my view this is an example of an input/output interface device. It turns symbolic electronic data inside a computer into a symbolic wireless signal outside and vice versa.
Spencer
Now, there’s a few wires left inside here and they’re not actually connected to the power supply, so what are these for?
Darien
Well, these cables simply connect some of the components together and they connect to some of the external ports, and generally these just bring everything together into one complete system.
Spencer
It’s a complete mess in here, I tell you. There you go.
Parisa
Oh, thank you. In my view these are data address and control buses. They allow the communication between the processor, memory, input/output devices to take place. So they allow the models of input/output devices, processor and the memory I have built to be treated as a single interconnected system.
Spencer
Right then. Well, let’s just remove the final piece of the puzzle. Let’s get rid of the case.
Darien
Well, don’t discard the case because this is a component as well. Obviously it needs to be big enough to hold all the various parts of the computer, it needs to have the correct mountings, and also we’ve spoken about fans – it needs to be designed to allow air to flow through to keep everything cool.
If you’re designing a high-end desktop system you could spend quite a long time just thinking about the air flow.
Spencer
OK, fair enough. I stand corrected.
Right, so we’ve been inside the box, and we’ve disconnected the various components attached using this wiring to this central circuit board here. Now, from an engineering viewpoint these are all the bits that make the computer work: the power, the cooling, the wiring and, of course, the standard components connected using standard interfaces. The computer scientist has a general model which ignores the specific detail of the hardware and concentrates instead on what the computer is capable of doing.
End transcript: Inside the box: section 2
Inside the box: section 2
Interactive feature not available in single page view (see it in standard view).

The important point to establish is that the computer operates by its subsystems exchanging symbolic values. The exchange of symbols is governed by protocols, and electronic components ensure that the symbol representations (such as voltage levels, timed signals, etc.) are correct for each subsystem. When a complex sequence of symbols makes up a message, either the computer executes an algorithm (represented as another set of symbols) that implements a communications protocol, or the electronic components involved in the message exchange are constructed in such a way that they follow a series of steps that implement the protocol.

To a computer engineer the power supplies, cooling fans, wiring, etc. are important because they make the computer work, but to a computer scientist or a software engineer they’re simply the stuff that allows the computer science – the implementation of the algorithms – to happen.

Now let’s think about what is happening inside the central processing unit of the computer.

5.4 Motherboard and CPU

Activity 13 (exploratory)

Watch the third section of the ‘Inside the box’ video (entitled ‘Deep inside – the motherboard and CPU’), which continues the exploration of a desktop PC by giving you an overview of the motherboard and the CPU. In this closing section of the video you will see how the transistor bridges the computer science and engineering views.

Download this video clip.Video player: Inside the box: section 3
Skip transcript: Inside the box: section 3

Transcript: Inside the box: section 3

[Graphic title: Deep inside – the motherboard and CPU]

[Music – duration 00:10]

Spencer Kelly
There’s not much left to examine now. We’re left with a large printed circuit board, lots of chips and sockets all over the place. Now, the CPU and the memory are both here – before we get to that, Darien, what else is on this board?
Darien Graham-Smith
Well on this board, the motherboard, there are lots of chips that control the various connectors, such as the keyboard and mouse connectors, or here we have the drive connectors for DVD drives or hard disks.
Spencer
And then there’s wiring and there’s sensors, I know, and there’s other stuff as well. There’s a battery here, now what’s that about?
Darien
Yes, on the motherboard there’s a clock and the computer can also remember a couple of basic settings, even when it’s disconnected from the mains.
Spencer
So the battery keeps that information alive?
Darien
Yes.
Spencer
And Parisa, this is still just engineering for you?
Parisa
It is indeed. For me it doesn’t hold much interest. For me it’s all hardware engineering.
Spencer
Well hang on, ’cos things are about to get more interesting. Darien, unleash the memory, where’s that?
Darien
Yes, these here are the memory modules and each one has a big row of memory chips on it, all the same. Thank you for that. They connect via a standard interface as you can see.
Spencer
You can have 1, 2, 3 or 4 on this one, can’t you?
Darien
Yes.
Spencer
Yeah. OK, thanks for the memory. Parisa, this is going to fit into your model, isn’t it?
Parisa
Indeed, so it can go to the memory box where it stores the symbolic data and instruction which will be used by the central processing unit.
Spencer
Talking of which, that is all that’s left, so if I just flip this up here we get to the heart – indeed, the brain – of the computer. This is the central processing unit. Darien, this is a really complicated thing, isn’t it?
Darien
That’s right. The CPU, central processing unit, is what makes this a computer. The CPU is able to actually perform operations, to work out calculations and to send signals back and forth between itself and the various components of the PC. Those little pins there that go into the socket, the electrical signals travel on those pins.
Spencer
And there are lots more than any other device that I’ve seen. There’s hundreds of them.
Darien
There are hundreds indeed, and newer processors have even more. And inside there, there are literally millions of tiny transistors. So it’s an extremely complicated piece of technology.
Spencer
This is what it’s all about, isn’t it?
Parisa
It is indeed an excellent piece of engineering which can go to the model, in the model, the processor box. But in my view it’s still a physical component which is capable of carrying out really complex computation and processing algorithms.
But it’s not the only way of doing the computation and processing. In old days researchers built mechanical computers by using gears, levers and cogs. And in recent days researchers are building computers by using molecular, biological, hydraulic and quantum technologies. So in my view this old central processing unit can be modelled the same way as I modelled before.
But the winning piece of all this central processing unit and in general-purpose computers are switches called transistors. The processor which carries out symbolic manipulation on the symbolic data relies heavily on the transistor logic-based circuits.
Spencer
I see. OK, well the CPU is – as we’ve established – an incredibly complex thing, so let’s hear more about processor development from someone involved in making them.
Steve Cutler
Intel’s primary business is really the design, development and manufacture of microprocessors, the central processing units that go into typical computer applications – desktop PCs, laptop PCs, servers, those kind of devices.
These days people want to do other things. They want to communicate, they want to collaborate, they want to share information – videos, pictures, things like that, perhaps. And so the use you make of a computing device is quite different from considering how you’d actually design one of those devices. But of course the two are closely linked in many ways.
So the internal instruction sets are focused onto the end application primarily, which we identify by looking at the market trends to try and see, you know, how we can take advantage of future trends and build them in.
The types of processors you’d get in traditional computing devices will look and feel fairly similar. Devices for laptops will probably be the smallest package we can put a device into. The desktop processors will be somewhere in between. Server processors will be bigger still, probably, because typically they are slightly higher power, means they generate more heat and the bigger package means it’s easier to remove the heat from the device and do it. So, you know, there’s many different physical flavours of these devices to allow you to build exactly the device you want for its end purpose.
So it does take quite some time to go from the theoretical to the practical device itself, and there’s a lot of stress in between those two as you work out what is possible and what is not.
If we look back in time, the first microprocessor that Intel developed – the first microprocessor anybody developed that was commercially available, the 4004: 2300 transistors. If we look at today’s processors, the most common devices on the market for desktop and laptop consumption were up to 560 million transistors with the Intel Core family of processors, and for server processors even more so. So the Itanium family of processors, up to two billion transistors these days. So to try and do an analogy to help you understand this, you know, let’s suppose we say transistors are homes for people. So 2300 homes, a small town perhaps. Two billion homes, we’re looking at pretty much every home in the world, I would say. So we’ve gone from interconnecting a small town to interconnecting the entire world in terms of interconnecting the transistors on our processors.
So trying to design a device of that complexity really does require you to break it down into smaller subsections and into modular pieces. And then just ensure that the individual modules interface to each other correctly and communicate correctly so you end up with a fully functional final design.
But at the lowest level of this design it still comes down to the transistors on the silicon. And that’s, you know, where Intel puts in a huge amount of research and development effort. So yeah, ultimately from our point of view everything comes down to how many transistors can we put on a piece of silicon.
Spencer
Now, I noticed that both of you mentioned the transistor when you were talking about the CPU. We’ve also heard that the transistor level is the lowest level of processing, so could this possibly be where your two different views coincide?
Parisa
Yes, it probably is. I can still model or represent an on and off state of the transistor using binary. I can model the binary processing using the Boolean algebra, so I can develop the representation of the data and instruction which can be embedded in my models.
Darien
Yes, we can build devices which realise your models. We can construct circuits which directly reflect your symbolic representations.
Spencer
See, friends really. And without the underlying model of computation, the hardware engineer will have nothing to build – and without the hardware, the computer scientist just has theoretical tools for computation. But because these two distinct views can come together to turn theory into hardware, we have the rich variety of computing systems that have found their place in so many aspects of our daily lives.
End transcript: Inside the box: section 3
Inside the box: section 3
Interactive feature not available in single page view (see it in standard view).

5.5 Section summary

In this section I looked inside a typical desktop computer and considered it, not as a collection of wires, power supplies and electrical circuits, but as a collection of functional components connected by wired data buses used to exchange symbolic data through appropriate standard interfaces.

Conclusion

In this unit I’ve introduced several aspects of our increasingly digital lives. You’ve heard about the ever more significant role that digital technologies are playing in our information society, in areas ranging from entertainment to public services. Along with the opportunities available in the online world, you’ve also been introduced to some of the potential problems and how to avoid them.

I then went on to look inside a typical desktop computer and considered it, not as a collection of wires, power supplies and electrical circuits, but as a collection of functional components connected by wired data buses used to exchange symbolic data through appropriate standard interfaces.

Glossary

anti-virus software
Software that is specifically written to identify and tackle known viruses.
Automated teller machines (ATM)
A machine that allows bank customers to perform certain transactions, such as withdrawing cash from their bank account. Also known as a cash machine or cashpoint.
biometric
A term that refers to the identification of people using biological characteristics such as fingerprints, iris recognition and DNA analysis.
bus
An electrical pathway connecting parts of a computer system to allow symbols to flow from one part of the system to another.
cable
A set of wires or optical fibres assembled, with a protective coating, for use as a communication medium.
central processing unit
The command centre of a computer system that interprets and executes program instructions, and controls system input and output and the storage and retrieval of data. Also known as the central processor.
copyright
A legal protection that guarantees that creators of content are rewarded for their work and protects the rights of users.
database
A set of computer-based data that has been organised so that it can be read, written, updated and searched. An example might be a library catalogue.
digital rights management (DRM)
A range of technologies used by copyright owners to control how the content they produce is used.
digital technology
Any technology that is based on representing data as sequences of numbers, i.e. as digital data.
emoticons
Text characters or images that indicate someone’s mood by representing a simple facial expression. Text-based emoticons such as :-) are usually intended to be ‘read’ by tilting your head to one side. Also known as smileys.
firewall
A software or hardware filter on a network. In its simplest form, a firewall looks at incoming or outgoing data and decides whether to block it.
forum
An area on the internet designed for discussion, usually on a specific topic. Also known as a bulletin board system (BBS).
global positioning system (GPS)
A set of satellites that continuously transmit their position so that anyone with a suitable receiver can obtain very accurate positioning information.
hardware
The physical components of a computer system. These include the large components such as the screen, the small component parts such as circuit boards, and all the connecting cables.
information and communication technology (ICT)
Technology used in the conveying, manipulation and storage of data by electronic means.
information society
A term used to describe the social and economic changes related to the development and widespread use of information technologies.
IT
IT stands for information technology. This term is often used to mean the same as ICT.
instant messaging
Text-based communication between people who are online at the same time.
internet
The global internetwork that has grown from a US government-funded project started in the 1960s.
internet service provider (ISP)
A commercial organisation that provides access to the internet for both individuals and organisations.
malware
Malicious software designed to enter computer systems without the knowledge of the owner. Includes viruses, trojans and worms.
memory
The part of a computer system that stores programs and data while they are waiting to be executed by a CPU.
modem
A box of electronics placed between a computer and a telephone line to convert the digital signals from the computer into a form that can be sent by telephone.
moderator
A forum user who has responsibility for managing the forum and ‘moderating’ discussions to ensure they follow the forum rules.
netiquette
A set of guidelines for online behaviour.
network
A collection of devices that can communicate with each other. Networks vary in size and complexity, connecting anything from a few devices to many millions.
network society
A term that is sometimes used interchangeably with ‘information society’, but which emphasises how the flow of information depends on networks.
online discussion group
A group of people, often with common interests or aims, communicating over the internet.
operating system (OS)
A collection of programs that manages a computer’s resources, provides an interface between the user and the computer, and organises the running of other programs. Examples include Windows, Mac OS and Linux.
patch
A temporary fix to a bug or security problem in a particular piece of software (such as a web browser or an operating system). A patch modifies existing software rather than replacing it with a new version.
phishing
The act of sending a hoax email message that aims to persuade users to disclose private information such as credit card details or PINs. Hoax websites are also used as part of these scams.
plagiarism
Using the work of others to gain some form of benefit without formally acknowledging that the work came from someone else.
portal
A website that provides a way in to a number of sites grouped together by organisation, topic, geography, etc.
program
A step-by-step set of precise instructions for telling a computer how to carry out a particular task.
public domain
A term referring to any created content that is not subject to copyright. Material that is ‘in the public domain’ may be used freely by anyone.
smart device
An electronic device that processes information and exchanges it with other devices.
SMS
The ‘short message system’ that allows text messages to be sent between mobile phones. SMS messages can also be sent between other devices, such as computers and landline phones.
social networking
The activities involved in building and maintaining online relationships and communities.
software
The programs that control the functioning of a computer system.
spam
Unsolicited (junk) email. Spammers typically send an email to a distribution list consisting of millions of ‘harvested’ email addresses.
trojan
Malicious software that is disguised as a legitimate program, but that in the background is running some malicious code.
truth table
A table of Boolean values in which the columns represent the input values and the intermediate and result values of Boolean operations, and the rows represent the combination of input values and the corresponding intermediate and output values. Used to show the output of Boolean operators and expressions for all possible combinations of input values
ubiquitous
A term describing something that seems to be everywhere at the same time.
virus
Malicious software that is designed to attack software on users’ computers, spreading quickly and easily from one computer to another.
World Wide Web
An internet service that links computer files such as documents, images, audio and video. These files may be located on any computer connected to the internet. Also known as the Web.
worm
Malicious software that replicates itself and infects computers via a network.

References

International Telecommunication Union (2006) ITU Internet Report 2006: digital.life [online], Geneva, Switzerland, ITU, http://www.itu.int/osg/spu/publications/digitalife/ (accessed 10 January 2010).
Sophos (n.d.) Good Times [online], Sophos Plc, http://www.sophos.com/security/hoaxes/goodtimes.html (accessed 12 January 2010).
Text.it (2008) The Q2 2008 UK Mobile Trends Report [online], Mobile Data Association, http://www.text.it/mediacentre/press_release_list.cfm?thePublicationID=6F5A90F5-15C5-F4C0-992D5F8DDAF2BDCA (accessed 1 January 2010).

Acknowledgements

This unit was written by John Woodthorpe (Sections 1–4) and Kevin Waugh (Section 5).

Except for third party materials and otherwise stated (see terms and conditions), this content is made available under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 Licence.

The material acknowledged below is Proprietary and used under licence (not subject to Creative Commons Licence). See terms and conditions. Grateful acknowledgement is made to the following sources for permission to reproduce material in this unit:

Figure 1: © Jason Stitt/iStockphoto

Figure 2: © Michigan State University

Figure 3: © Jim Zuckerman/Alamy Images

Figure 4: Courtesy of http://xkcd.com/281/

Figure 5: Courtesy of http://xkcd.com/256/

Figure 6: Courtesy of http://xkcd.com/802/

Figure 7: © Marty Bucella/Cartoon Stock

Figure 9: Courtesy of http://xkcd.com/386/

Figure 11: © www.millersmiles.co.uk/report/8823

Figure 12: Courtesy of http://xkcd.com/565/

Presenter:

Spencer Kelly

On-screen contributors:

Dr Darien Graham-Smith, PC Pro Magazine

Dr Parisa Eslambolchilar, Swansea University

Steve Cutler, Technical Marketing Manager, Intel Corporation

With thanks to:

PC Pro Magazine

Intel Corporation

Alistair Kemp, PR Manager, Business and Technology, Intel UK

Mick Bennett

 

Every effort has been made to contact copyright owners. If any have been inadvertently overlooked, the publishers will be pleased to make the necessary arrangements at the first opportunity.

Don't miss out:

If reading this text has inspired you to learn more, you may be interested in joining the millions of people who discover our free learning resources and qualifications by visiting The Open University - www.open.edu/ openlearn/ free-courses