<?xml version="1.0" encoding="utf-8"?>
<?sc-transform-do-oumusic-to-unicode?>
<?sc-transform-do-oxy-pi?>
<Item xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" Autonumber="false" DiscussionAlias="Comment" ExportedEquationLocation="" FourthColour="None" Logo="colour" Module="TU100_1" PageStartNumber="1" Rendering="OpenLearn" SchemaVersion="2.0" SecondColour="None" SessionAlias="" Template="Generic_A4_Unnumbered" TextType="CompleteItem" ThirdColour="None" id="X-TU100_1" xsi:noNamespaceSchemaLocation="http://www.open.edu/openlearn/ocw/mod/oucontent/schemas/v2_0/OUIntermediateSchema.xsd" x_oucontentversion="2019050300"><meta name="vle:server" content="http://www.open.edu/openlearn/ocw"/><meta name="vle:osep" content="false"/><meta name="equations" content="mathjax"/><meta name="dc:source" content="http://www.open.edu/openlearn/science-maths-technology/computing-and-ict/preparing-your-digital-life-the-21st-century/content-section-0?utm_source=openlearn&amp;utm_campaign=ol&amp;utm_medium=ebook"/><CourseCode>TU100_1 </CourseCode><CourseTitle/><ItemID>
        <!--leave blank-->
    </ItemID><ItemTitle>Preparing for your digital life in the 21st Century</ItemTitle><FrontMatter><Imprint><Standard><GeneralInfo><Paragraph>
                        <b>About this free course</b>
                    </Paragraph><Paragraph>This free course is an adapted extract from the Open University course TU100 <i>My digital life</i> <a href="http://www3.open.ac.uk/study/undergraduate/course/tu100.htm?utm_source=openlearn&amp;utm_campaign=ol&amp;utm_medium=ebook">http://www3.open.ac.uk/study/undergraduate/course/tu100.htm</a>.</Paragraph><Paragraph>This version of the content may include video, images and interactive content that may not be optimised for your device. </Paragraph><Paragraph>You can experience this free course as it was originally designed on OpenLearn, the home of free learning from The Open University: <a href="http://www.open.edu/openlearn/science-maths-technology/computing-and-ict/preparing-your-digital-life-the-21st-century/content-section-0?utm_source=openlearn&amp;utm_campaign=ol&amp;utm_medium=ebook">http://www.open.edu/openlearn/science-maths-technology/computing-and-ict/preparing-your-digital-life-the-21st-century/content-section-0</a>.</Paragraph><Paragraph>There you’ll also be able to track your progress via your activity record, which you can use to demonstrate your learning.</Paragraph></GeneralInfo><Address><AddressLine/></Address><FirstPublished><Paragraph/></FirstPublished><Copyright><Paragraph>Copyright © 2016 The Open University</Paragraph></Copyright><Rights><Paragraph/><Paragraph>
                        <b>Intellectual property</b>
                    </Paragraph><Paragraph>Unless otherwise stated, this resource is released under the terms of the Creative Commons Licence v4.0 <a href="http://creativecommons.org/licenses/by-nc-sa/4.0/deed.en_GB">http://creativecommons.org/licenses/by-nc-sa/4.0/deed.en_GB</a>. Within that The Open University interprets this licence in the following way: <a href="http://www.open.edu/openlearn/about-openlearn/frequently-asked-questions-on-openlearn">www.open.edu/openlearn/about-openlearn/frequently-asked-questions-on-openlearn</a>. Copyright and rights falling outside the terms of the Creative Commons Licence are retained or controlled by The Open University. Please read the full text before using any of the content. </Paragraph><Paragraph>We believe the primary barrier to accessing high-quality educational experiences is cost, which is why we aim to publish as much free content as possible under an open licence. If it proves difficult to release content under our preferred Creative Commons licence (e.g. because we can’t afford or gain the clearances or find suitable alternatives), we will still release the materials for free under a personal end-user licence. </Paragraph><Paragraph>This is because the learning experience will always be the same high quality offering and that should always be seen as positive – even if at times the licensing is different to Creative Commons. </Paragraph><Paragraph>When using the content you must attribute us (The Open University) (the OU) and any identified author in accordance with the terms of the Creative Commons Licence.</Paragraph><Paragraph>The Acknowledgements section is used to list, amongst other things, third party (Proprietary), licensed content which is not subject to Creative Commons licensing. Proprietary content must be used (retained) intact and in context to the content at all times.</Paragraph><Paragraph>The Acknowledgements section is also used to bring to your attention any other Special Restrictions which may apply to the content. For example there may be times when the Creative Commons Non-Commercial Sharealike licence does not apply to any of the content even if owned by us (The Open University). In these instances, unless stated otherwise, the content may be used for personal and non-commercial use.</Paragraph><Paragraph>We have also identified as Proprietary other material included in the content which is not subject to Creative Commons Licence. These are OU logos, trading names and may extend to certain photographic and video images and sound recordings and any other material as may be brought to your attention.</Paragraph><Paragraph>Unauthorised use of any of the content may constitute a breach of the terms and conditions and/or intellectual property laws.</Paragraph><Paragraph>We reserve the right to alter, amend or bring to an end any terms and conditions provided here without notice.</Paragraph><Paragraph>All rights falling outside the terms of the Creative Commons licence are retained or controlled by The Open University.</Paragraph><Paragraph>Head of Intellectual Property, The Open University</Paragraph></Rights><Edited><Paragraph/></Edited><Printed><Paragraph/></Printed><ISBN>978-1-4730-2006-1 (.kdl)<br/>978-1-4730-1238-7 (.epub)</ISBN><Edition/></Standard></Imprint><Introduction><Title>Introduction</Title><Paragraph>The profound technological, economic, political and ethical changes brought about by information technology will affect every one of us. You may be wondering what digitial technology is and just what is meant by having a digital life. A fundamental idea is that digital technology is any technology based on representing data as sequences of numbers. Computers use digital technologies; so the for benefit of this unit the term digital life refers to the influence of computers, in a wide variety of forms, on the world.</Paragraph><Paragraph>In this unit you will learn a little about the historical development of computers and their role in today’s society, and you will consider examples of digital technologies in the world around you and their influence on your life. You will also gain a better understanding of what makes a computer work by exploring what’s inside a typical personal computer.</Paragraph><Paragraph>This OpenLearn course is an adapted extract from the Open University course TU100 <a href="http://www3.open.ac.uk/study/undergraduate/course/tu100.htm?utm_source=openlearn&amp;utm_campaign=ol&amp;utm_medium=ebook"><i>My digital life</i></a>.</Paragraph></Introduction><LearningOutcomes><Paragraph>After studying this course, you should be able to:</Paragraph><LearningOutcome>understand the concept of a ‘digital life’</LearningOutcome><LearningOutcome>demonstrate an awareness of the role of information and communication technologies in a digital life</LearningOutcome><LearningOutcome>describe the purpose of each of the major components of a computer system, and use common terminology to describe these components.</LearningOutcome></LearningOutcomes><Covers><Cover template="false" type="ebook" src="https://www.open.edu/openlearn/ocw/pluginfile.php/328397/mod_oucontent/oucontent/6159/Preparing_for_your_digital_life_in_the_21st_Century_ebook_cover.jpg"/><Cover template="false" type="A4" src="https://www.open.edu/openlearn/ocw/pluginfile.php/328397/mod_oucontent/oucontent/6159/Preparing_for_your_digital_life_in_the_21st_Century_ebook_cover_pdf.jpg"/></Covers></FrontMatter><Unit><UnitID/><UnitTitle/><ByLine/><Session id="sess001"><Title>1 Computers: From novelty to commonplace</Title><Paragraph><SideNote><Heading>Timings</Heading><SideNoteParagraph>This is the first section of this unit. It should take you around one hour to complete.</SideNoteParagraph></SideNote>The theme of this section is the development of digital technologies, from the physically large and highly expensive equipment of the 1950s to the omnipresent networks and computer-based devices upon which our digital lives are founded today. In this section I will:</Paragraph><BulletedList><ListItem>compare the development of the computer to the development of the telephone</ListItem><ListItem>describe some of the digital technologies that form an integral part of many of our lives</ListItem><ListItem>introduce the term <i>information society</i>.</ListItem></BulletedList><Section id="sec001_001"><Title>1.1 The telephone</Title><Paragraph>In the 1950s, telephones represented the cutting edge of technology (Figure 1). However, they were not only large and expensive to purchase but also inconvenient to use; if you wanted to make a call over a distance of more than fifteen miles, you had first to call the operator who would then make the connection.</Paragraph><Figure id="fig001"><Image alt="" height="" src="https://www.open.edu/openlearn/ocw/pluginfile.php/328397/mod_oucontent/oucontent/6159/tu100_b1_p1_f01.tif.png" src_uri="https://openuniv.sharepoint.com/sites/tmodules/tu100/block1/tu100_b1_p1_f01.tif.png" webthumbnail="false" width="100%" x_folderhash="64863f14" x_contenthash="0fc740d9" x_imagesrc="tu100_b1_p1_f01.tif.png" x_imagewidth="480" x_imageheight="274"><b/></Image><Caption><Number suppressprefix="true">Figure 1</Number>A 1950s telephone</Caption><Description>This black and white photograph shows an old design of domestic telephone from the 1950s.</Description></Figure><Paragraph>Telephones were also expensive to use. In the UK, calls were charged in units of three minutes, each unit costing the equivalent of between 5 and 20 pence in today’s currency. (In comparison, in 1959 a pint of milk cost about 3 pence.) Few people had a home telephone and even fewer made long-distance calls. The high cost of using a telephone ensured that anyone who had one tended to use it infrequently, and then only for short calls.</Paragraph><Paragraph>In 1959 the General Post Office, which ran almost all UK telephone systems at the time, introduced subscriber trunk dialling (STD). This advance in technology allowed users to make long-distance calls directly, without an operator, and to be charged only for the actual duration of the call. The telephone became easier and much cheaper to use; as a result, more people began to use it and for longer calls.</Paragraph><Paragraph>Over time the telephone has become part of the background of our lives, until today it is extremely unusual to find someone who has neither a home telephone nor a mobile phone. Just as the telephone changed from a status symbol to become simply another piece of the modern world, so the computer is making a similar transition.</Paragraph></Section><Section id="sec001_002"><Title>1.2 The computer</Title><Paragraph>There were very few computers in the 1950s, and those in existence were treated as objects of wonder with almost mythical powers. They were nothing like the computers of today. For one thing they were huge, with the refrigerator-sized one shown in Figure 2 being relatively small for the time. They were also delicate, and consumed a lot of electricity, wasting much of it as heat.</Paragraph><Figure id="fig002"><Image alt="" height="" src="https://www.open.edu/openlearn/ocw/pluginfile.php/328397/mod_oucontent/oucontent/6159/tu100_b1_p1_f02.tif.png" src_uri="https://openuniv.sharepoint.com/sites/tmodules/tu100/block1/tu100_b1_p1_f02.tif.png" webthumbnail="false" width="100%" x_folderhash="64863f14" x_contenthash="34251457" x_imagesrc="tu100_b1_p1_f02.tif.png" x_imagewidth="512" x_imageheight="403"><b/></Image><Caption>Figure 2A 1950s computer</Caption><Description>This black and white photograph shows two men with a 1950s computer the size of a modern refrigerator.</Description></Figure><Paragraph>Nowadays, however, a computer is just another item stocked in supermarkets alongside toothpaste and dog food. And as computers have become cheaper and smaller, they have been incorporated into a kaleidoscopic range of devices that bear no resemblance to what was once thought of as a computer. Powerful computers now sit at the heart of objects as diverse as mobile phones and games consoles, cars and vacuum cleaners. The cost of computer power continues to decrease, making it possible to incorporate computer technologies into almost any object, no matter how small, cheap or disposable. And these smart devices are ‘talking’ to one another, not just within a single room or building but across the world via the <GlossaryTerm>internet</GlossaryTerm>, using the <GlossaryTerm>World Wide Web</GlossaryTerm> (see Box 1). Thus even as the computer vanishes from sight, it becomes vastly more powerful and ever-present – to use a term you’ll become very familiar with, it is now <GlossaryTerm>ubiquitous</GlossaryTerm>.</Paragraph><Activity id="act001"><Heading>Activity 1(exploratory)</Heading><Question><Paragraph>Can you think of another technology that has made the transition from novel to commonplace, like telephones and computers?</Paragraph></Question><Discussion><Paragraph>There are many possible answers to this question. I thought of washing machines, which have advanced from hand-driven drums to the automatic machines of today.</Paragraph></Discussion></Activity><Box id="box001" type="style2"><Heading>Box 1The Internet and the Web</Heading><Paragraph>You may well have across the terms <i>internet </i>and <i>Web</i>. Although in everyday life people tend to use these terms interchangeably, in reality they are two separate (though related) entities.</Paragraph><Paragraph>The internet is a global network of networks: an <i>internetwork </i>(hence its name). It is the infrastructure that connects computers together. At first written with an upper-case ‘I’, it is increasingly seen with a lower-case ‘i’.</Paragraph><Paragraph>The Web (short for <i>World Wide Web</i>), on the other hand, is a service that links files across computers, allowing us to access and share information. Thus the Web is a software system that has been built upon the hardware of the internet.</Paragraph><Paragraph>Apart from anything else, this means that it is technically incorrect to refer to ‘searching’ or ‘browsing’ the internet. When you carry out an online search, you are in fact searching the Web!</Paragraph></Box></Section><Section id="sec001_003"><Title>1.3 The information society</Title><SubSection id="sec001_003_001"><Title>Networks and the internet</Title><Paragraph>As a result of advances in <GlossaryTerm>information and communication technology (ICT)</GlossaryTerm>, our notions of time and location are changing – distance is no longer a barrier to commercial or social contact for those of us connected to suitable <GlossaryTerm>networks</GlossaryTerm>. Some people may find it difficult to imagine not having access to the information and services that play a crucial part in their daily lives. Others may feel that they have no part to play in the digital world because their network access is very limited or even non-existent. Some simply don’t care about the digital world, viewing it perhaps as a waste of time. Yet whether we are aware of it or not, digital information is flowing constantly around us.</Paragraph><Paragraph>Consider a computer that is connected to the internet – the one you are using to study this unit, for example. This may be a computer you use at home, in a library or at work; you may use it on the move or in a fixed location. Whatever the case, this computer is part of a complex system consisting of wires and optical fibres, microwaves and lasers, switches and satellites, that encompasses almost every part of the world. The oceans are wrapped in more than a quarter of a million miles of fibre-optic <GlossaryTerm>cable</GlossaryTerm> with several strands of glass running through it. Each of these strands can carry thousands of simultaneous telephone conversations, a few dozen television channels, or any of a range of other forms of digital content (such as web pages).</Paragraph><Paragraph>This modern communications network enables us to use a mobile phone in the depths of Siberia or take a satellite telephone to the Antarctic (Figure 3), watch television in the middle of the Atlantic, do our banking from an airliner, or play games with a person on the other side of the world. It is one of the greatest technological achievements of the last thirty years and it is so reliable, so omnipresent, that we very rarely stop to think about what actually happens when we dial a telephone number, click on a web link or switch TV channels. Or rather, we tend not to think about it until something disrupts the network – whether it be a widespread problem such as a power cut, or something more localized such as finding ourselves in a rural area with no mobile phone signal.</Paragraph><Figure id="fig003"><Image alt="" height="" src="https://www.open.edu/openlearn/ocw/pluginfile.php/328397/mod_oucontent/oucontent/6159/tu100_b1_p1_f03.tif.png" src_uri="https://openuniv.sharepoint.com/sites/tmodules/tu100/block1/tu100_b1_p1_f03.tif.png" webthumbnail="false" width="100%" x_folderhash="64863f14" x_contenthash="85d92088" x_imagesrc="tu100_b1_p1_f03.tif.png" x_imagewidth="400" x_imageheight="266"/><Caption>Figure 3 Using a satellite phone in the Antarctic</Caption><Description>This colour photograph shows a man using a satellite phone while surrounded by penguins, suggesting he is in the Antarctic.</Description></Figure><Paragraph>The end of the twentieth century and the beginning of the twenty-first century are often compared to other historical periods of great change, such as the Industrial Revolution, because of the huge technological changes that are happening in many areas of our lives. These developments are taking place in conjunction with correspondingly large social and economic changes, often characterised by the terms <GlossaryTerm>information society</GlossaryTerm> and <GlossaryTerm>network society</GlossaryTerm>. Such notions are frequently referred to by policy makers when driving forward changes in our technological infrastructure: politicians often refer to the inevitability of technological change in our information society and stress the need to be at the forefront of these changes in order to secure future prosperity, for example by developing broadband network infrastructure, by making public services available online, and by equipping schools and local communities with computers.</Paragraph><Activity id="act002"><Heading>Activity 2 (exploratory)</Heading><Question><Paragraph>Can you think of an example where changes in technology have resulted in changes to your work, social or family life? Have those changes improved your life? Have they created any problems?</Paragraph></Question><Discussion><Paragraph>The biggest change for me has been in my ability to work from home. I’m currently sitting at home typing this text on a computer whilst listening to some jazz music, which is also stored on the computer. I’ll shortly email my document to a colleague, who will be able to read it a few seconds later.</Paragraph><Paragraph>My first job required me to travel to my employer’s premises every day and share an office – and a single telephone – with ten other people. When I needed to write a report I would do it with a pen and paper for someone else to type up. A few days later I’d get it back to check and the typist would make any corrections with something called ‘correcting fluid’.</Paragraph><Paragraph>Being able to work from home has improved my life considerably. Not only does it save me the time and money that used to be spent on travelling, but being able to listen to music while I work helps me concentrate, as well as making the job more enjoyable. On the down side, the boundaries between my home life and my work life have become very blurred, as my wife will confirm. So on the whole I feel the changes are positive, but there are some disadvantages as well.</Paragraph></Discussion></Activity></SubSection><SubSection id="sec001_003_002"><Title>The rise of texting</Title><Paragraph>Unintended uses sometimes develop alongside the intended uses of emerging technologies in our information society. A classic example is the text messaging facility on mobile phones, often referred to as <GlossaryTerm>SMS</GlossaryTerm> (which stands for short message service). This was originally a minor feature designed to be used by engineers testing equipment – it was not expected to be used by phone owners at all. Yet by 2006, mobile phone companies were earning more than 80 billion US dollars per year worldwide from SMS messages, making them one of the most profitable parts of their business (International Telecommunication Union, 2006).</Paragraph><Paragraph>SMS resulted in a whole new method of communication and form of popular culture, different ways of interacting with radio and television, and even a new language form: texting. Texting often plays a key role in arranging demonstrations against those in power. You will probably remember such events from recent news stories.</Paragraph><Paragraph>Some more figures might help to put the increase in texting into context. The Mobile Data Association gathers statistics on mobile phone usage in the UK. Their report for May 2008 (Text.it, 2008) shows that in the whole of that month:</Paragraph><BulletedList><ListItem>16.5 million people accessed the internet from their mobile phones</ListItem><ListItem>6.5 billion SMS (text) messages were sent</ListItem><ListItem>both of these figures showed a considerable increase from previous years.</ListItem></BulletedList><Paragraph>In December 2008, the equivalent figures were 17.4 million and 7.7 billion respectively. In the following activity you will calculate just how large the increase in text messaging between May and December was. </Paragraph><StudyNote><Paragraph>‘Billion’ is a word that in the past had different meanings in the UK and the USA. However, the two countries now agree that a billion is one thousand million (1000 000 000).</Paragraph></StudyNote><Activity id="act003"><Heading><Number suppressprefix="true">Activity 3</Number>(self-assessment)</Heading><Question><Paragraph>The number of text messages sent per month in the UK grew from 6.5 billion in May 2008 to 7.7 billion in December 2008. What was the percentage growth over those seven months? You will probably need to use a calculator for this activity.</Paragraph></Question><Discussion><Paragraph>The increase in the number of messages was: 7.7 billion − 6.5 billion = 1.2 billion. </Paragraph><Paragraph>The percentage growth is found by dividing the change (1.2 billion) by the starting number (6.5 billion) and multiplying the answer by 100%. This gives: growth = 1.2/6.5 × 100% = 18.5% in seven months.</Paragraph></Discussion></Activity></SubSection></Section><Section id="sec001_004"><Title>1.4 Section summary</Title><Paragraph>In this section, having briefly considered the rapid development of computers, I outlined some of the ways in which digital technologies pervade the world around us, giving rise to the social and economic changes that characterise our information society. The concept of an information society is a key one in this unit and in the next section I’ll try to give you a better idea of what it involves. </Paragraph></Section></Session><Session id="sess002"><Title>2 Some aspects of our information society</Title><Paragraph><SideNote><Heading>Timings</Heading><SideNoteParagraph>This is the second section of this unit. It should take you around three hours to complete. If you don’t have time to work through it all at once, there are break points where you can stop and return later.</SideNoteParagraph></SideNote>In the previous section I introduced the concept of an information society; in this section I will outline some key aspects of such a society. </Paragraph><StudyNote><Heading>The changeable nature of the online world</Heading><Paragraph>One of the things you will notice while studying this unit is that some of the examples you read about no longer exist, or are nothing like as important as when the material was written in 2010 and 2011. This is inevitable, and you shouldn’t be concerned by it; your focus should be on the general principles, which remain valid.</Paragraph><Paragraph>As an example, there was a time when if you wanted to find something online you didn’t go to Google, because that didn’t exist. Instead, you almost certainly went to a search engine called AltaVista. I’ve just checked and this currently still exists at http://www.altavista.com, but it is now owned by Yahoo! and looks very similar to Google. However, back in the late 1990s it was seen as the definition of what a community <GlossaryTerm>portal</GlossaryTerm><i> </i>site should be, combining a search function with links to a range of information sources; as a result, it was the first-choice search engine for many people. It continued to develop, and was one of the first to allow users to search for images and to translate text from one language to another. However, by late 2001 Google had overtaken AltaVista in both popularity and ease of use, and we’ve now reached the stage where relatively few internet users use or even know about AltaVista.</Paragraph><Paragraph>Some companies you read about may no longer exist, and some may be more or less prominent. Yet the likelihood is that although companies come and go, there will still be ways to share photos (as Flickr and Picasa allow at the moment), to edit documents online (as is possible with Microsoft Office Live and Google Drive), to store files online (as Dropbox and Ubuntu One allow), and so on.</Paragraph></StudyNote><Section id="sec002_001"><Title>2.1 Business</Title><SubSection id="sec002_001_001"><Title>Financial services</Title><Paragraph>Every time you use a debit or credit card in a shop, the shop till communicates with a card terminal that transmits your identification details from your card to your bank or credit card company for verification. Your balance is then adjusted according to your purchase. A similar chain of events is initiated if you shop online (buying a ticket for an airline or train, perhaps) or over the phone (when booking a cinema ticket, for example). Many banks also provide online banking services, reducing the need for customers to visit a branch. <GlossaryTerm>Automated teller machines (ATM)</GlossaryTerm> allow you to check your bank balance and withdraw cash wherever you are in the world. In each of the above situations – using a debit or credit card, shopping or managing your money online or over the phone, or using an ATM – the machines involved are connected via a network to a central computer, which has records of your account in an electronic filing system known as a <GlossaryTerm>database</GlossaryTerm>.</Paragraph><Paragraph>Financial services have undergone huge changes in recent years as a result of developments in the digital technologies driving them. The examples just described show how convenient and accessible such services have become. Yet at the same time, issues of identity and security have become a concern. New ways of communicating have also created new types of crime, including identity theft and financial fraud. In turn, these problems have fostered the development of new security industries that try to inform us and sell us solutions to reduce the chances of us becoming victims of online crime.</Paragraph></SubSection><SubSection id="sec002_001_002"><Title>Commerce</Title><Paragraph>Advances in digital technologies have led to changes in many areas of commerce, with some existing kinds of business being transformed by the opportunities these developments offer. One of the most obvious changes is the emergence of retailers such as Amazon, which have an online shop but no physical one that customers can visit. Yet the internet not only benefits the largest companies, but also allows even the smallest retailers to advertise their services to a global audience. Incredibly specialized companies can flourish by relying on the internet’s immense reach to deliver potential customers.</Paragraph><Paragraph>Of course, this growth has resulted in casualties in traditional (sometimes called ‘bricks and mortar’) retailing. High-street shops specialising in items such as books, DVDs, music and games have all lost business to online retailers. This has driven some shops out of business, but a number of high-street stores have also opened successful online stores. Online retailers have lower costs – they don’t pay expensive high-street rents and can easily be based in countries with low tax regimes – and they can pass these savings on to customers.</Paragraph><Paragraph>Although the low costs offered by online stores can be very attractive to customers, they might be counterbalanced to some extent by the less immediate and less tangible nature of the shopping experience. However, online retailers make up for this by providing a variety of services that reassure and inform their customers. One such service is the tracking of goods online – though this is a development that can produce its own frustrations, as illustrated by the cartoon in Figure 4. Having bought a new computer a few years ago and tracked it on its way from the factory in China to my home, I can identify with the feeling expressed!</Paragraph><Figure id="fig004"><Image alt="" height="" src="https://www.open.edu/openlearn/ocw/pluginfile.php/328397/mod_oucontent/oucontent/6159/tu100_b1_p1_f04.eps.png" src_uri="https://openuniv.sharepoint.com/sites/tmodules/tu100/block1/tu100_b1_p1_f04.eps.png" webthumbnail="false" width="100%" x_folderhash="64863f14" x_contenthash="1324061e" x_imagesrc="tu100_b1_p1_f04.eps.png" x_imagewidth="190" x_imageheight="261"/><Caption><Number suppressprefix="true">Figure 4</Number>A light-hearted look at the pros and cons of online tracking</Caption><Description>This cartoon is titled ‘Online Package Tracking’ with a column of Pros and another of Cons. The Pros are ‘convenient’ and ‘useful’. The Cons are ‘makes you crazy’. The cartoon shows a person sitting at a computer, pressing ‘refresh’ repeatedly and each time saying ‘Aww, still in Memphis’.</Description></Figure><Activity id="act004"><Heading><Number suppressprefix="true">Activity 4</Number>(exploratory)</Heading><Question><Paragraph>Add some more entries to the following table of advantages and disadvantages of online shopping. Can you think of ways in which online retailers may try to address the disadvantages?</Paragraph><Table class="type 2" id="tbl001"><TableHead/><tbody><tr><th class="ColumnHeadLeft"/><th class="ColumnHeadLeft">Advantages</th><th class="ColumnHeadLeft">Disadvantages</th></tr><tr><th class="ColumnHeadLeft">Buyer</th><td class="TableLeft"><FreeResponse size="paragraph" id="jess2">More choice
Can often track goods</FreeResponse></td><td><FreeResponse size="paragraph" id="jess1"/></td></tr><tr/><tr><th class="ColumnHeadLeft">Seller</th><td><FreeResponse size="paragraph" id="jess4"/></td><td><FreeResponse size="paragraph" id="jess3"/></td></tr></tbody></Table></Question><Discussion><Paragraph>I thought of the following, but you may have come up with others.</Paragraph><Table class="type 2" id="tbl002"><TableHead/><tbody><tr><th class="ColumnHeadLeft"/><th class="ColumnHeadLeft">Advantages</th><th class="ColumnHeadLeft">Disadvantages</th></tr><tr><th class="ColumnHeadLeft">Buyer</th><td class="TableLeft">More choice</td><td class="TableLeft">Can’t try goods (e.g. shoes, clothes) first</td></tr><tr><th class="ColumnHeadLeft"/><td class="TableLeft">Can often track goods</td><td class="TableLeft">Harder to return goods if faulty</td></tr><tr><th class="ColumnHeadLeft"/><td class="TableLeft">Often cheaper than a local shop</td><td class="TableLeft">Harder to get help and advice before or after buying</td></tr><tr><th class="ColumnHeadLeft"/><td class="TableLeft">Some items can be downloaded immediately after buying</td><td class="TableLeft">May be worried about online fraud</td></tr><tr><th class="ColumnHeadLeft">Seller</th><td class="TableLeft">No need for a physical shop</td><td class="TableLeft">Reliant on delivery services</td></tr><tr><th class="ColumnHeadLeft"/><td class="TableLeft">Lower running costs</td><td class="TableLeft">Likely to get more returned goods</td></tr><tr><th class="ColumnHeadLeft"/><td class="TableLeft">Don’t need to keep everything in stock – can arrange delivery from suppliers </td><td class="TableLeft">Need to respond to email or telephone queries</td></tr><tr><th class="ColumnHeadLeft"/><td class="TableLeft">Can supply music, books, software, etc. for download rather than having to supply a physical item</td><td class="TableLeft">Some potential customers reluctant to buy online</td></tr></tbody></Table><Paragraph>Online retailers may try to address the disadvantages listed above in various ways. For instance, they might provide:</Paragraph><BulletedList><ListItem>free collection of returned items</ListItem><ListItem>links to online reviews of products to help advise prospective buyers</ListItem><ListItem>telephone helplines</ListItem><ListItem>support forums to help customers before and after buying</ListItem><ListItem>advice on how to shop safely online.</ListItem></BulletedList></Discussion></Activity><Paragraph>As well as direct retailing, other types of businesses have also moved online – auction sites such as eBay fall into this category. Some online businesses are less conventional, and as a result it’s often harder to see how they find the money they need to survive. For example, there are many collaborative projects that produce free products including <GlossaryTerm>software</GlossaryTerm>, online encyclopaedias and educational resources. These often rely on volunteers contributing their time, with money being provided by advertising, sponsorship or donations.</Paragraph></SubSection><SubSection id="sec002_001_003"><Title>Work</Title><Paragraph>Technology has changed the way that other businesses operate too. Greater quantities of information are exchanged between numerous locations over public and private networks. Vast amounts of data are stored on computers and accessed remotely from a variety of devices. Just as individuals buy from companies online, many companies now sell to each other online as well, for the same reasons of reduced cost and wider choice that attract individuals to online stores. Manufacturing tasks that used to take days can now be completed in minutes using computer-operated machine tools working in automated production lines.</Paragraph><Paragraph>The way we use technology has also affected our individual working lives. For example, telephone and online banking mean that banks no longer need large numbers of counter staff, and the role of travel agents has changed as more people book their holidays directly from the vendor by going online. Some companies have responded by reducing their number of employees, while others have retrained their staff to provide more specialised services to their customers. More generally, many people working in an office environment are expected to learn how to use new software applications in order to do their jobs.</Paragraph></SubSection></Section><Section id="sec002_002"><Title>2.2 Communities</Title><Paragraph><SideNote><Heading>Break point</Heading><SideNoteParagraph>This would be a good point to take a break if you need to do something else before returning later.</SideNoteParagraph></SideNote>As well as revolutionising the commercial world, the internet has had an enormous impact on the way we communicate. While there are still people in many parts of the world who do not have internet access, many of us have access at home or at work. As a result we have the opportunity to communicate with others using email, <GlossaryTerm>instant messaging</GlossaryTerm> and <GlossaryTerm>online discussion groups</GlossaryTerm> (in online <GlossaryTerm>forums</GlossaryTerm>). Existing communities have created new ways of communicating, and new online communities have developed. <GlossaryTerm>Social networking</GlossaryTerm> plays an increasingly significant role in the lives of many people.</Paragraph><Paragraph>The recent pace of communication change has amazed many of us, and there is no reason to think things will slow down. The cartoon map of online communities shown in Figure 5 appeared on the Web in early 2007. Since then, the social networking site Facebook has increased in significance and size at the expense of MySpace, and micro-blogging sites such as Twitter – which allows users to post and read short messages – have appeared and grown. </Paragraph><Figure><Image alt="" height="" src="https://www.open.edu/openlearn/ocw/pluginfile.php/328397/mod_oucontent/oucontent/6159/tu100_b1_p1_f05_small.png" src_uri="https://openuniv.sharepoint.com/sites/tmodules/tu100/block1/tu100_b1_p1_f05_small.png" webthumbnail="false" width="" x_folderhash="64863f14" x_contenthash="acd7d777" x_imagesrc="tu100_b1_p1_f05_small.png" x_imagewidth="510" x_imageheight="482"/><Caption><Number suppressprefix="true">Figure 5</Number>One view of the world’s online communities in 2007</Caption><Description>This is a hand-drawn map with imaginary continents and islands labelled with the names of online communities. It is entitled ‘Map of Online Communities and Related Points of Interest: geographic area represents estimated size of membership’. MySpace is the most prominent area of the map, surrounded by a variety of other social networking sites, of which Facebook is one of the smallest. There is an online gaming area including World of Warcraft and Second Life, and an entertainment area including Flickr and Last.fm.</Description></Figure><Paragraph>An updated version of this map is given below. It gives a feel for those changes and more.</Paragraph><Figure><Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/328397/mod_oucontent/oucontent/6159/tu100_b1_p1_f_a.small.png" src_uri="https://openuniv.sharepoint.com/sites/tmodules/tu100/block1/tu100_b1_p1_f_a.small.png" x_folderhash="64863f14" x_contenthash="4bc25c74" x_imagesrc="tu100_b1_p1_f_a.small.png" x_imagewidth="512" x_imageheight="595"/><Caption><Number suppressprefix="true">Figure 6 </Number>.View of the world’s online communities in 2010 (source: <a>http://xkcd.com/802/ or go to http://imgs.xkcd.com/comics/online_communities_2_large.png</a> for a version you can zoom in on)</Caption><Description>This is a similar map to the one above, entitled ‘Updated Map of Online Communities: size on map represents volume of daily social activity (posts, chat, etc) based on data gathered over the spring and summer of 2010’. A note points out that ‘Communities rise and fall, and total membership numbers are no logner a good measure of a community’s current size and health’. The map itself is more complicated than the 2007 version, with insets for blogs and forums. Facebook has grown a huge amount, while MySpace has shrunk. YouTube is about the size that it was before, but there are several prominent new areas including Twitter, Skype and QQ.</Description></Figure></Section><Section id="sec002_003"><Title>2.3 Information</Title><Paragraph>The internet has had a huge impact on the availability of information of all kinds. Material on the Web reflects widely differing viewpoints, from official news bulletins to unofficial rumours, and comes from widely differing sources, from commercial megastores to community groups. Since no individual government, company or person has control over it, the internet has paved the way to unfettered publishing of information of all kinds, raising questions about the authority and regulation of this information. Some governments try to exert control over the information their citizens can access and create, with varying degrees of success.</Paragraph></Section><Section id="sec002_004"><Title>2.4 Entertainment</Title><Paragraph>The world of entertainment is constantly evolving as new ways of creating and distributing the media we watch and listen to are developed. Digital broadcasting has changed the way we experience television and radio, with increasingly interactive and participative programmes. Digital cameras, printers and scanners, together with desktop publishing and photo-editing software, enable greater numbers of people to experiment with image production, while online image- and video-sharing sites allow anyone with access to a relatively basic mobile phone or digital camera to share photos and videos with the rest of the online world. New digital technologies have also been at the forefront of changes in the production and distribution of music, and computer gaming has developed hand in hand with the evolution of graphical interfaces.</Paragraph><Paragraph>However, our increased exposure to digital entertainment has resulted in increased conflict between the rights of the consumer and the rights of the producer of the media. It is now much easier for the products of the media industries established during the twentieth century – film, music and so on – to be illegally copied and distributed in a form that is indistinguishable from the original. <GlossaryTerm>Copyright</GlossaryTerm> holders are taking steps to prevent this by developing a range of <GlossaryTerm>digital rights management (DRM)</GlossaryTerm> techniques that make it much harder to create copies, as well as by trying to persuade users of the benefits of the original product. Such attempts at persuasion can look very threatening, as I noticed on a recently purchased CD that has the following printed on the back cover:</Paragraph><Quote><Paragraph>FBI Anti-piracy Warning:</Paragraph><Paragraph>Unauthorized copying is punishable under federal law.</Paragraph></Quote><Paragraph>Several questions came to mind when I read this. Does that mean I can’t legally put the music onto my MP3 player? Can the US Federal Bureau of Investigation extradite and punish me (a UK citizen who bought the CD in the UK) if I do? Should I return the CD to the place I bought it from and ask for my money back? Or will I be in trouble only if I distribute copies of the CD to other people? These are all valid concerns that demonstrate some of the problems surrounding the use of copyrighted material.</Paragraph><Paragraph>There are many other issues arising from this, and it is very easy to make the digital future sound bleak. You have probably heard predictions to the effect that illegally copied media, and making information freely available on the Web, will increasingly put whole businesses and hundreds of thousands of jobs in the established media industries at risk. However, as in other areas of the digital world, there are also opportunities for these businesses if they can adapt to the new environment and modify their business models to survive and grow in different directions.</Paragraph><Activity id="act005"><Heading><Number suppressprefix="true">Activity 5</Number>(exploratory)</Heading><Question><Paragraph>Can you think of any other problems connected with the growth of digital entertainment?</Paragraph></Question><Discussion><Paragraph>There are many possibilities. I thought of the fact that the advent of digital television affected even those who didn’t particularly welcome it – across the world, analogue signals are gradually being switched off as new digital signals are introduced. In time, everyone will have to get new digital televisions as the old analogue versions become obsolete – quite an expensive business!</Paragraph><Paragraph>You might also have thought of more technical problems, such as how to transmit the large quantities of digital data required for some forms of entertainment – video, for example – in an acceptable time and retaining acceptable quality.</Paragraph></Discussion></Activity></Section><Section id="sec002_005"><Title>2.5 Public services</Title><SubSection id="sec002_005_001"><Title>Public information and services</Title><Paragraph>Public bodies such as governments and transport agencies are increasingly providing services online, allowing us to organise various aspects of our daily lives more easily. These services range from simple information displays, which let us check things such as weather forecasts and transport timetables, to interactive sites that allow us to make bookings or queries.</Paragraph><Paragraph>In many parts of the world, medical records are increasingly moving away from paper and X-ray film towards becoming completely digital. This has several advantages, especially in allowing patient records to be easily shared between departments within a hospital, and sometimes more widely with doctors’ surgeries and other health workers. In remote rural areas of some countries, doctors can make use of computer networks or even mobile phones to make a diagnosis if they are unable to see the patient in person. However, this is by no means universal, and even where such facilities exist they aren’t always available.</Paragraph><Paragraph>Information for travellers is also increasingly being made available digitally: for example, live online updates on road congestion and public transport, and arrivals information in stations and airports. Similarly, it is becoming more and more common to book plane journeys online – in fact, some airlines now only accept online bookings and will only issue electronic tickets. Many of them strongly encourage, or even require, passengers to check in online as well.</Paragraph><Paragraph>In addition, many countries provide online access to at least some of their government services. For example, you might be able to renew or apply for a passport, book a driving test, claim benefits, or fill in your tax return online. Local authorities also provide digital information services – you might be able to reserve or renew a library book online, for instance – and there are numerous opportunities to learn online.</Paragraph></SubSection><SubSection id="sec002_005_002"><Title>Security and risk</Title><Paragraph>The twentieth century saw a dramatic change in the role of the state in many countries. During most of the nineteenth century, an individual might only have come into contact with the state for the purposes of taxation, marriage and death; at the end of that century and the beginning of the next, however, a series of social revolutions saw the state becoming involved in our healthcare, pensions and education. Unsurprisingly, each of these developments was accompanied by a significant increase in the amount of personal information stored about every one of us. Computer technologies were developed especially to serve the enormous projects involved; IBM became a highly successful company due to its work on censuses in the USA and Europe, whilst the world’s first business computer, LEO, was used for a variety of tasks including the calculation of tax tables for the British Treasury in the 1950s.</Paragraph><Paragraph>With the vast amount of personal information being held about us in various places, it is becoming increasingly important for us to be able to prove our identities – not just for travel but for other activities such as purchasing expensive or restricted items, paying bills and opening bank accounts. The UK is unusual in Europe in that (at the time of writing in 2010) it does not have a compulsory identity card system, despite the fact that identity cards were put in place during both world wars. In several countries, identity card or passport schemes are being upgraded with new <GlossaryTerm>biometric</GlossaryTerm><i> </i>technologies such as iris or face recognition, which (perhaps rather over-ambitiously) promise to uniquely identify individuals.</Paragraph><Paragraph>As well as the personal information that we know about, there may also exist information about us of which we are unaware. Since the terrorist attacks on the USA in 2001, much of the Western world has become far more security conscious, and governments and companies alike have developed and deployed technological countermeasures. These range from smart video surveillance systems that can identify an individual in a crowd and track his or her movements, through the biometric technologies mentioned above, to the searching of databases for suspicious activity.</Paragraph><Activity id="act006"><Heading><Number suppressprefix="true">Activity 6</Number>(exploratory)</Heading><Question><Paragraph>Can you recall an occasion when you have been personally aware of technological security measures?</Paragraph></Question><Discussion><Paragraph>On a recent visit to the USA I went through a range of airport security screenings. In addition to having my belongings checked, I was photographed at least twice (as well as being under almost constant video surveillance in the airports), had my fingerprints scanned electronically, and was required to fill in numerous online and paper forms.</Paragraph><Paragraph>The promise is that such technologies will make us safer, but could they turn the world we live in into a society strangely reminiscent of the nightmare vision contained in George Orwell’s novel <i>1984</i>?</Paragraph></Discussion></Activity><Paragraph>As you’ve seen so far in this section, there is plenty of opportunity for digital information about each of us to be created. Some of this information we might intentionally give out ourselves – on social networking sites, for example. Other information about us may, as described above, be gathered more surreptitiously by various agencies. In general we have little control over how digital information about us is used or who receives it. We might assume that information gathered legally by a government agency, for instance, will be handled appropriately and used only for our benefit; yet there have been many examples of governments and private organisations ‘losing’ confidential data by transferring it insecurely. For example, in November 2008 the UK government announced that two CDs containing personal information about 25 million people had been lost by HM Revenue and Customs when they were posted to the National Audit Office. If criminals got hold of such information then there would be the risk of our identity or our money being stolen.</Paragraph></SubSection></Section><Section id="sec002_006"><Title>2.6 Communicating on the move</Title><Paragraph>Advances in digital technology have, in a very short space of time, revolutionised the way many of us live our lives. Nowhere is this more evident than in our ability to communicate as we travel. Below I’ll share with you a personal example that highlights some of the changes, and some of the opportunities and problems these changes have created.</Paragraph><Paragraph>In the 1980s my employers of the time set up an email account for me with a commercial email provider called CompuServe. This required me to use a <GlossaryTerm>modem</GlossaryTerm><i> </i>to connect my computer to a telephone line and dial one of a set of specific phone numbers so that my email could be transmitted. This was fine if I was in the office, but more complicated when travelling as very few hotels made telephone sockets available to customers. As a result, my travelling kit soon contained a selection of small screwdrivers for dismantling hotel telephones, and a set of wires, crocodile clips and pliers so I could wire directly into the phone system. Of course, this was all done at my own risk and without the knowledge or approval of the hotels, and I am not recommending it!</Paragraph><Paragraph>In those days, even when I did manage to get online, email transmission was very slow and expensive. Nowadays I have a mobile phone with which I can send and pick up emails quickly and cheaply wherever I am (without the need to dismantle a fixed-line telephone!). As well as email, my phone enables me to communicate in several other ways – instant messaging and social networking, for example, not to mention voice calls. I can also use the built-in <GlossaryTerm>global positioning system (GPS)</GlossaryTerm><i> </i>to find out where I am, and even plot my location on a website to let my friends and family see where I am (or at least see where my phone is).</Paragraph><Paragraph>This last feature was very useful when my wife and I tried to find our son’s new flat for the first time, as the last mile of the journey was rather more complicated than expected. Our son could check online and see exactly where we were, and he could also talk to us and guide us to the right place. Yet a service like this also has some disadvantages – most importantly, I need to remember to turn it off if I don’t want people to know where I am. A few months later, I realised on returning home after buying my wife a birthday present that the same service will have showed that I spent 20 minutes in a jeweller’s shop. I don’t think she noticed, or if she did she didn’t allow it to spoil the surprise. However, it’s not hard to imagine other circumstances in which I might not want my location to be publicised, even to my family and friends (Figure 7).</Paragraph><Figure id="fig006"><Image alt="" height="" src="https://www.open.edu/openlearn/ocw/pluginfile.php/328397/mod_oucontent/oucontent/6159/tu100_b1_p1_f06.tif.png" src_uri="https://openuniv.sharepoint.com/sites/tmodules/tu100/block1/tu100_b1_p1_f06.tif.png" webthumbnail="false" width="100%" x_folderhash="64863f14" x_contenthash="de7c0f72" x_imagesrc="tu100_b1_p1_f06.tif.png" x_imagewidth="317" x_imageheight="317"/><Caption><Number suppressprefix="true">Figure 7</Number>The disadvantages of GPS?</Caption><Description>This is a cartoon showing a woman using a laptop and talking to a friend. She is saying ‘I’m tracking my husband through his GPS unit. Right now, he’s between a televised sporting event and the refrigerator.’</Description></Figure></Section><Section id="sec002_007"><Title>2.7 Section summary</Title><Paragraph>In this section you’ve learned about some of the key aspects of an information society, online social networking being one of them. In the next section I’ll outline some ways in which you can participate in online discussions effectively.</Paragraph></Section></Session><Session id="sess003"><Title>3 Participating in a digital world</Title><Paragraph><SideNote><Heading>Timings</Heading><SideNoteParagraph>This is the third section of this unit. It should take you around two hours to complete. If you don’t have time to work through it all at once, there are break points where you can stop and return later.</SideNoteParagraph></SideNote>Previously in this unit I’ve mentioned the rise of social networking – one aspect of our increasingly digital world. You may already communicate online to some extent in your daily life. </Paragraph><Paragraph>What follows in this section is a quick guide to good practice in contributing to online discussions. It should help you to work and socialise with others online – in your studies, your social life and your working life. Much of the content is summed up by the familiar tenet known as the Golden Rule: a concept common to many ethical codes, which simply states that we should treat others as we would want them to treat us. Just as this Golden Rule is relevant to good manners – ‘etiquette’ – when talking face to face, so it is relevant to online communication. To help us apply it, it has been developed into guidelines for online behaviour called ‘net etiquette’ or, more commonly, just <GlossaryTerm>netiquette</GlossaryTerm>.</Paragraph><Paragraph>Netiquette is intended to make us all think about how we behave online and to make us aware of the effect our words could have on others reading them. If it seems that there are far too many rules to follow, be reassured that they aren’t hard and fast commands that you must remember and obey. Netiquette does not encompass every situation you may find yourself in – it’s perfectly possible to obey all the guidance below and still annoy someone – but it will give you a good foundation for your participation in online discussions.</Paragraph><Paragraph>Most of what follows is common sense and good manners. Some of it may be familiar to you, but please take time to read it if you don’t have much experience of using online discussion groups to work with others. There’s a big difference between working in an online community and socialising online, so even if you are experienced at the latter, you should find the following material useful.</Paragraph><Section id="sec003_001"><Title>3.1 Netiquette: Respecting others online</Title><Paragraph>As children we quickly learn many rules about how to interact with other people. Some of these rules are common sense, such as ‘don’t interrupt a speaker’ and ‘say please and thank you’, and are necessary if we are to reduce the likelihood of arguments or causing offence.</Paragraph><Paragraph>When we have a face-to-face conversation, we don’t just rely on the spoken words to establish the other person’s meaning; unconsciously we are also monitoring the tone of their voice, their facial expression and their body language. Telephone conversations are a little more ambiguous because we can no longer see the other person; email and online discussions are harder again, since all we have is text. It is extremely easy to misinterpret words on a page, so the writer must take great care before pressing the button that sends their message to the world.</Paragraph><SubSection id="sec003_001_001"><Title>Thank, acknowledge and support people</Title><Paragraph>People can’t see you nod, smile or frown as you read their messages. If they get no response, they may feel ignored and be discouraged from contributing further. Why not send a short reply to keep the conversation going? This can make a big difference in a small group setting. However, do bear in mind that in a large, busy forum too many messages like this could be a nuisance.</Paragraph></SubSection><SubSection id="sec003_001_002"><Title>Acknowledge before differing</Title><Paragraph>Before you disagree with someone, try to summarise the other person’s point in your own words. Then they know you are trying to understand them and will be more likely to take your view seriously. Otherwise, you risk talking at each other rather than to each other. You should also recognise that other people are entitled to their point of view, even if you consider them to be entirely wrong.</Paragraph></SubSection><SubSection id="sec003_001_003"><Title>Make clear your perspective</Title><Paragraph>Try to speak personally. That means avoiding statements like ‘This is the way it is …’ or ‘It is a fact that …’. These sound dogmatic and leave no room for anyone else’s perspective. Why not start by saying ‘I think …’ or ‘I feel …’? If you are presenting someone else’s views then say so, perhaps by using a quotation and acknowledgement.</Paragraph></SubSection><SubSection id="sec003_001_004"><Title>Emotions</Title><Paragraph>Emotions can be easily misunderstood when you can’t see faces or body language. People may not realise you are joking, and irony and satire are easily missed – all good reasons to think before you send a message. To compensate for these restrictions, early internet users came up with the idea of the smiley face – :) or :-) – which then grew into a whole family of <GlossaryTerm>emoticons</GlossaryTerm>.</Paragraph><Paragraph>Remember that the systems upon which many forums are based only support plain text, so you can’t always rely on fonts and colours to add meaning. Even if you are using a forum that allows so-called ‘rich text’, it’s possible that other users will be picking up messages as plain text emails or as text message alerts on their mobile phones and will not see your formatting. AND DON’T WRITE IN CAPITAL LETTERS – IT WILL COME OVER AS SHOUTING!</Paragraph><Paragraph>If you read something that offends or upsets you, it is very tempting to dash off a reply immediately. However, messages written in the heat of the moment can often cause offence themselves. It’s much better to save your message as a draft and take a break or sleep on it. That gives you a chance to come back to your message when you’re feeling calmer and ask yourself ‘how would I feel if someone sent that message to me?’. If you decide it will make things worse then make sure you edit it before you send it.</Paragraph><Paragraph>The best advice is to try to be aware of your audience before you post. The internet is a global phenomenon; people from widely differing cultures and backgrounds may read what you write online, and what you find funny may be offensive to them. It may take time to work out what sort of ‘audience’ can be found in a particular forum; some are very permissive and allow almost any sort of behaviour, while most (like those at The Open University) will not tolerate bad behaviour or abuse.</Paragraph><Activity id="act007"><Heading><Number suppressprefix="true">Activity 7</Number>(exploratory)</Heading><Question><Paragraph>Look at the email exchange shown in Figure 8. What emotions are being expressed through smileys and typography? Would Jon and Sue still be on speaking terms if they hadn’t used these devices?</Paragraph><Figure id="fig007"><Image alt="" height="" src="https://www.open.edu/openlearn/ocw/pluginfile.php/328397/mod_oucontent/oucontent/6159/tu100_b1_p1_f07.eps.png" src_uri="https://openuniv.sharepoint.com/sites/tmodules/tu100/block1/tu100_b1_p1_f07.eps.png" webthumbnail="false" width="100%" x_folderhash="64863f14" x_contenthash="16072c60" x_imagesrc="tu100_b1_p1_f07.eps.png" x_imagewidth="312" x_imageheight="649"/><Caption><Number suppressprefix="true">Figure 8</Number>Email exchange between Jon and Sue</Caption><Description><Paragraph>This is a series of four email messages between Jon and Sue.</Paragraph><Paragraph>Message 1 says ‘Dear Sue, I’ve messed up by overwriting a file you’ve just edited. I think I’ve mended the damage, but could you check I did it right? Jon’.</Paragraph><Paragraph>Message 2 is from Sue and says ‘Aaaarrrgggghhhhhh. Don’t do this to me. ;o)’. The ‘Aaaarrrgggghhhhhh’ is in italic font. When viewed on their side the final three characters, ;o), look like a face that is smiling and winking.</Paragraph><Paragraph>Message 3 is from Jon and says ‘Sorry’ in a smaller font.</Paragraph><Paragraph>Message 4 is from Sue and says ‘:o)))) The page looks OK. No harm done. I had a meeting at 8:15 yes 8:15 today so forgive me if I’m a bit grumpy. Sue’. When viewed on their side the first set of characters, :o)))), look like a smiling face with lots of extra smiles. The text ‘8:15’ is shown in a larger font both times.</Paragraph></Description></Figure></Question><Discussion><Paragraph>In Sue’s first reply to Jon she expresses her frustration by typing ‘Aaaarrrgggghhhhhh’, but she ends that message with a winking smiley. Jon’s reply then says ‘sorry’ in a very small voice! Sue’s final reply starts with a happy smiley to show that everything’s OK. She uses a large font when she mentions the annoyingly early meeting time.</Paragraph><Paragraph>I feel sure that Jon and Sue would still be friendly after this email exchange. But I have seen email exchanges between colleagues that had the opposite effect, when the participants didn’t take care about how they expressed themselves in their messages.</Paragraph></Discussion></Activity></SubSection><SubSection id="sec003_001_005"><Title>Moderation</Title><Paragraph><GlossaryTerm>Moderators</GlossaryTerm> are forum participants responsible for keeping order. They may have capabilities within the forum greater than those of other participants; for example, they can sometimes add new participants and suspend people who are abusive. They also work to keep the discussions friendly and relevant to the forum. A forum with a moderator is said to be <i>moderated</i>. Forums without moderators are <i>unmoderated </i>and are generally places where newcomers should tread very carefully. Moderators tend to introduce themselves early on in forum discussions, so it’s usually clear whether a forum is moderated or not.</Paragraph></SubSection><SubSection id="sec003_001_006"><Title>Some other advice</Title><BulletedList><ListItem>Keep to the subject, and pick the right forum for your contribution.</ListItem><ListItem>Before you write a message, check any rules about what is and is not considered acceptable in the forum. Many discussion forums have rules, aside from netiquette, about things such as links to commercial sites.</ListItem><ListItem>Take a little time to use the forum’s search facilities to see if your question or topic has already been discussed or covered in a set of frequently asked questions (FAQs). If it has, you should at least scan the existing messages to see if your points have been addressed.</ListItem><ListItem>Don’t feel you have to post immediately. Take your time to see what is being discussed and get a feel for the group you’re joining. This very sensible behaviour has the unfortunate name of <i>lurking </i>but is quite acceptable online. If you want to post, many discussion groups have a forum devoted to new users where they can introduce themselves to other readers. These are always good places to get started.</ListItem><ListItem>Try to keep your messages short and to the point. People don’t want to read long, rambling messages, especially if they can’t work out what response you’re looking for.</ListItem><ListItem>Write a concise subject line (title) for your message – people often won’t spend time reading messages unless the subject line looks relevant.</ListItem><ListItem>Keep to one subject (topic of discussion) per message. If you want to cover another subject, do it in another message.</ListItem><ListItem>When replying to a message, quoting part of that earlier message can be helpful so that readers can easily see what you are referring to. Add your response <i>after </i>the quoted material, not before it. And keep your quotation short and to the point, otherwise the resulting messages will get longer and longer.</ListItem><ListItem>If you ask a question and it is answered, thank the person who responded. It’s not only polite, it also shows that the discussion has come to an end.</ListItem><ListItem>If you’ve reached a point where you disagree with someone and neither of you is going to change your opinion (Figure 9), realise the conversation is over, agree to disagree, and move on.</ListItem></BulletedList><Figure id="fig008"><Image alt="" height="" src="https://www.open.edu/openlearn/ocw/pluginfile.php/328397/mod_oucontent/oucontent/6159/tu100_b1_p1_f08.eps.png" src_uri="https://openuniv.sharepoint.com/sites/tmodules/tu100/block1/tu100_b1_p1_f08.eps.png" webthumbnail="false" width="100%" x_folderhash="64863f14" x_contenthash="6aabc8bc" x_imagesrc="tu100_b1_p1_f08.eps.png" x_imagewidth="190" x_imageheight="232"/><Caption><Number suppressprefix="true">Figure 9</Number>Online discussions can become addictive!</Caption><Description>This is a cartoon showing someone at a desk, typing on a computer while talking to someone else off-screen. They are asked ‘Are you coming to bed?’ and reply ‘I can’t. This is important.’ When asked ‘What?’ they reply ‘Someone is WRONG on the internet.’</Description></Figure><Activity id="act008"><Heading><Number suppressprefix="true">Activity 8</Number>(exploratory)</Heading><Multipart><Part><Question><Paragraph>The following is a quiz on netiquette which can be used to test your understanding of what you have studied so far in this section. </Paragraph><Paragraph>Writing in capitals has the same effect as shouting.</Paragraph></Question><Interaction><SingleChoice><Right><Paragraph>True</Paragraph></Right><Wrong><Paragraph>False</Paragraph></Wrong></SingleChoice></Interaction></Part><Part><Question><Paragraph>You can write what you like as long as you put a smiley face after it.</Paragraph></Question><Interaction><SingleChoice><Wrong><Paragraph>True</Paragraph></Wrong><Right><Paragraph>False</Paragraph></Right></SingleChoice></Interaction></Part><Part><Question><Paragraph>You should always quote the whole of someone’s message when replying.</Paragraph></Question><Interaction><SingleChoice><Wrong><Paragraph>True</Paragraph></Wrong><Right><Paragraph>False</Paragraph></Right></SingleChoice></Interaction></Part><Part><Question><Paragraph>Lurking is considered to be bad netiquette.</Paragraph></Question><Interaction><SingleChoice><Wrong><Paragraph>True</Paragraph></Wrong><Right><Paragraph>False</Paragraph></Right></SingleChoice></Interaction></Part><Part><Question><Paragraph>If you disagree with someone you should acknowledge what they have said first.</Paragraph></Question><Interaction><SingleChoice><Right><Paragraph>True</Paragraph></Right><Wrong><Paragraph>False</Paragraph></Wrong></SingleChoice></Interaction></Part><Part><Question><Paragraph>If you have several ideas to discuss, it is better to put each one in a different short message than combine them into one long message.</Paragraph></Question><Interaction><SingleChoice><Right><Paragraph>True</Paragraph></Right><Wrong><Paragraph>False</Paragraph></Wrong></SingleChoice></Interaction></Part><Part><Question><Paragraph>It is very important to keep a discussion going until you have convinced everyone to agree with your point of view.</Paragraph></Question><Interaction><SingleChoice><Wrong><Paragraph>True</Paragraph></Wrong><Right><Paragraph>False</Paragraph></Right></SingleChoice></Interaction></Part></Multipart></Activity></SubSection></Section><Section id="sec003_002"><Title><Number>3.2</Number> Ethical and legal considerations</Title><Paragraph><SideNote><Heading>Break point</Heading><SideNoteParagraph>This would be a good point to take a break if you need to do something else before returning later.</SideNoteParagraph></SideNote>In using a computer for communications you have many rights of free expression, but you also have certain responsibilities to respect others and to have some awareness of privacy and confidentiality in relation to online communications. You should be aware of the following points:</Paragraph><BulletedList><ListItem>An email is generally considered to be equivalent to a private letter, and should not be quoted or forwarded to anyone else without the permission of the original sender. This can be particularly poorly observed in companies (even those whose employees are told to assume that all online communications are for the recipient’s eyes only, unless otherwise stated).</ListItem><ListItem>Besides the informal rules of netiquette, most forums have a code of conduct and conditions of use that govern acceptable behaviour. For example, the use of the online forums provided by The Open University is covered by its Computing Code of Conduct. You will usually find a forum’s terms of use linked from its home page, or listed in the code of conduct that you are asked to agree to when you first register for an account.</ListItem><ListItem>Considerations of copyright and <GlossaryTerm>plagiarism</GlossaryTerm><i> </i>(cheating by using another person’s work as if it were your own) apply to online discussions. If you are quoting something written by someone else, put it in quotation marks and acknowledge the source.</ListItem><ListItem>Some forums are not wholly public, in which case messages should not be copied outside the forum. The forum’s terms of use may specify this.</ListItem></BulletedList></Section><Section id="sec003_003"><Title><Number>3.3</Number> Copyright</Title><Paragraph>One of the reasons the Web has grown so quickly, and one of its most fascinating aspects, is that almost anyone can publish almost anything on it. It is very easy to find information, images, audio and video files on the Web, which you can then save and incorporate into your own material.</Paragraph><Paragraph>Copying is so easy that people often make the mistake of assuming that everything on the Web is freely available. This is not the case: most information you will come across is likely to be covered by copyright law. This applies not only to online television programmes, music, photographs, books and so on, but also to information – for example, in the form of online academic papers or simply in someone’s blog.</Paragraph><Paragraph>Material not subject to copyright is said to belong in the <GlossaryTerm>public domain</GlossaryTerm><i> </i>and can be used by anyone. Older works of art and literature, such as the works of Shakespeare and Beethoven, are in the public domain. However, individual printings, adaptations or recordings of those works are copyrighted to the publisher or performer. The situation can become very complicated because the duration and extent of copyright differs between countries. For example, material may be in the public domain in the USA but still under copyright in the UK. As a result, it is always wise to assume that any third-party material (that is, material originating from someone else) is still protected by copyright unless you’re sure it’s in the public domain.</Paragraph><Paragraph>Copyright holders can prosecute individuals and organisations for infringing their rights; in recent years, music and film companies have sued individuals for very large sums of money. Below are some general points you should bear in mind.</Paragraph><BulletedList><ListItem>You should seek the author’s permission if you wish to use any copyrighted material. Just because something is on the Web does not mean it is freely available for you to use.</ListItem><ListItem>Many websites have usage policies explaining how their material can be used. Some are more restrictive than others, so make sure you find and follow the relevant policies.</ListItem><ListItem>Information published online may have been put there by someone who is not the copyright holder.</ListItem><ListItem>When quoting text in your own academic work (other than in assignment answers – see below), the generally accepted guideline from copyright legislation is that you can use a whole chapter or up to 5% of any one book without seeking permission, but you must give a full reference to show where it has come from.</ListItem></BulletedList><Paragraph>This may all seem rather intimidating, but it’s not quite as bad as you might fear – fortunately, copyright law makes some concessions to students. As a result, you don’t have to ask permission to use copyrighted material in answering an assignment question, although you must still include references. However, if you want to reuse the same material for any other purpose at a later date, normal copyright law applies and you must seek permission.</Paragraph></Section><Section id="sec003_004"><Title><Number>3.4</Number> Good academic practice</Title><Paragraph>Many courses will encourage students to use the Web as a resource. Students use it as part of their studies and in their assignments, and they should find it a great help in understanding and practising the things they learn.</Paragraph><Paragraph>However, using information found on the Web in this way can cause problems unless you take a little care. When using material written by other people you can quote their words, but good academic practice is that such quotations should always be <i>limited </i>and <i>acknowledged</i>. This applies whether you’re quoting from this unit or from other sources such as websites, journals or newspapers.</Paragraph><Paragraph>It can be very tempting to copy and paste large chunks of text into your notes – and possibly then into assignment answers – without giving a reference. However, that is very bad academic practice. It’s far better to use quotations sparingly and to rewrite most of the material in your own words. This allows you to show that you’ve understood the material and it also helps you to remember it.</Paragraph><Paragraph>In addition, it’s good academic practice to give a reference to the source of any third-party material you include in your own work. Not doing so is not only impolite, as you’re failing to acknowledge the help that someone else’s work has given you; it’s regarded as plagiarism and is never acceptable.</Paragraph><Paragraph>To help students, university websites often provide a guide on how to reference sources of information correctly, including those you might find online. </Paragraph></Section><Section id="sec003_005"><Title><Number>3.5</Number> Section summary</Title><Paragraph>In this section I’ve discussed some of the ways in which you can make good use of the Web, both for interacting with other people and for finding information. When working online it is also important to consider how to protect yourself and your computer, and that’s what I’ll turn to next.</Paragraph></Section></Session><Session id="sess004"><Title>4 Online safety</Title><Paragraph><SideNote><Heading>Timings</Heading><SideNoteParagraph>This is the fourth section of this unit. It should take you around two hours to complete. If you don’t have time to work through it all at once, there are break points where you can stop and return later.</SideNoteParagraph></SideNote>The internet provides many ways for people to get in touch with each other, but this ease of contact can have downsides for the unwary. It can expose internet users to the dangers of malicious software, to unsolicited and nuisance emails, and to a variety of hoaxes. In this section I’ll describe some of these problems and suggest how you can protect yourself from them.</Paragraph><Section id="sec004_001"><Title>4.1 Malware</Title><Paragraph>Software designed to cause damage is known as <GlossaryTerm>malware</GlossaryTerm>. There are several types of malware, three of which are described below. However, be aware that as malware evolves to avoid detection, the boundaries between the different categories are tending to blur.</Paragraph><Paragraph>The best-known type of malware is probably the <GlossaryTerm>virus</GlossaryTerm>. This is a piece of software that has been written to attack software on your computer, often with the specific intention of causing harm – deleting files, for example. A virus attaches itself to other software on your computer and activates when that software is run. Viruses are so called because they are designed to spread quickly and easily from one computer to another via internet connections or external storage devices such as memory sticks.</Paragraph><Paragraph>Another type of malware is the <GlossaryTerm>worm</GlossaryTerm>. This is a piece of malicious software that runs ‘in the background’, doing some damage to your computer even though you may not realise it is running. Worms can make copies of themselves, and those copies can spread via an internet connection. A worm typically consumes resources by running on a computer; in a major attack, all of a computer’s processing resources could be used in running the worm and its copies.</Paragraph><Paragraph>Finally, the <GlossaryTerm>trojan</GlossaryTerm> is a digital equivalent of the legendary wooden horse that smuggled Greek soldiers into Troy. It appears to be legitimate software, such as a screensaver, but behind the scenes it is causing damage – perhaps allowing someone else to gain control of the computer, copying personal information, deleting information, or using email software to pass itself on to other computers.</Paragraph><SubSection><Title>Protecting your computer</Title><Paragraph>There are three main ways to protect your computer against malware.</Paragraph><BulletedList><ListItem>Ensure that your computer has the latest <GlossaryTerm>patch</GlossaryTerm> from the producer of your <GlossaryTerm>operating system (OS)</GlossaryTerm>. Microsoft, Apple and other producers frequently issue patches for their products.</ListItem><ListItem>Make sure other software is kept up to date – Adobe Reader, Flash, Java and web browsers (such as Internet Explorer, Opera, Firefox, etc.) to name just a few. As new malware is discovered, so new versions of software are released that guard against it.</ListItem><ListItem>Install <GlossaryTerm>anti-virus software</GlossaryTerm> and keep it up to date. Anti-virus software catches a very high percentage of malware, but only if the version on your computer is regularly updated. Remember that if you don’t use Windows, it is still possible to pass on files infected with malware to Windows users. That’s why the main job of anti-virus software for Apple’s OS X is to check files for things that could infect Windows machines.</ListItem></BulletedList><Paragraph>In addition, you can use a piece of software called a <GlossaryTerm>firewall</GlossaryTerm>. This tries to stop unauthorised access to your computer without impeding your own authorised online access. There may be a firewall built into your computer’s operating system; others may be present in the hardware that connects your computer to the internet.</Paragraph><Paragraph>As well as the technical protections described above, you should protect yourself by using anti-virus software to scan any files you receive before you open them. This should include:</Paragraph><BulletedList><ListItem>files you download from the Web</ListItem><ListItem>files given to you on removable media such as a CD or memory stick</ListItem><ListItem>files attached to emails.</ListItem></BulletedList><Paragraph>Bear in mind that no reputable software company sends unsolicited email messages with attachments, claiming to be giving you an update.</Paragraph></SubSection></Section><Section id="sec004_002"><Title>4.2 Spam</Title><Paragraph><GlossaryTerm>Spam</GlossaryTerm> is the general term for unsolicited emails sent to large numbers of people. Such emails could be hoax messages designed to mislead, or they could be used to advertise a product.</Paragraph><Paragraph>In terms of advertising, spam email is similar to the marketing leaflets and letters that drop through your letterbox at home. However, this paper mail is subject to legislation that tightly controls the range of products and services being offered. The equivalent legislation does not yet exist in the electronic world, although new laws are being introduced. For example, in the USA the federal law ‘Controlling the Assault of Non-Solicited Pornography and Marketing’ (CAN-SPAM) took effect in January 2004, whilst in Europe the EU ‘Directive on Privacy and Electronic Communications’ came into force in the latter part of 2003. Though such national legislation is intended to limit the volume of spam email, in practice this is a very difficult task because the internet crosses national borders. Spam can be sent from one country to another, and countries that have legislation find it hard to enforce their rules in countries that do not.</Paragraph><Paragraph>Spam email can be sent only if the <i>spammer </i>(the person initiating the spam) has a collection of email addresses to send to. Common ways to ‘harvest’ email addresses include:</Paragraph><BulletedList><ListItem>company databases</ListItem><ListItem>websites</ListItem><ListItem>online discussion groups</ListItem><ListItem>including links in images within emails, which when clicked by the recipient inform the spammer that the message has been opened</ListItem><ListItem>infecting unprotected computers with malicious software to look for addresses.</ListItem></BulletedList><Paragraph>Spammers may harvest vast numbers of email addresses, but not immediately know whether a particular email address is ‘live’ (actually in use) – it could be that the original owner of the address no longer uses it. So beware of spam emails that appear to give you the option to unsubscribe from a mailing list (very often by offering a web link to click on). If you select this option, this will verify to the spammers that your email address is live; they can then continue to send you spam, or even sell your email address to other spammers. So using the unsubscribe option can increase your spam rather than reduce it.</Paragraph><Paragraph>Below are some guidelines for minimising the spam you receive.</Paragraph><BulletedList><ListItem>Don’t reply to spam emails.</ListItem><ListItem>Don’t use the unsubscribe option in response to unrequested emails.</ListItem><ListItem>Don’t reveal your email address unless you want to receive mail from a particular source.</ListItem><ListItem>Don’t post your email address on a website.</ListItem><ListItem>Don’t use your regular email address when registering on websites or joining discussion groups. Either create a new email address for these purposes or use a spare one that you’re happy to abandon if necessary (e.g. a web-based email account such as those offered by Yahoo, Microsoft, Google, etc.).</ListItem><ListItem>Set your email software to filter out unwanted messages. Most email software is equipped with ‘junk mail’ filters that can be set to identify and remove spam messages as they arrive in your inbox. Additionally, your <GlossaryTerm>internet service provider (ISP)</GlossaryTerm> may filter incoming mail for spam before it even reaches your inbox.</ListItem><ListItem>Ensure that all other users of your computer follow the above guidance.</ListItem></BulletedList></Section><Section id="sec004_003"><Title>4.3 Hoaxes<SideNote><Heading>Break point</Heading><SideNoteParagraph>This would be a good point to take a break if you need to do something else before returning later.</SideNoteParagraph></SideNote></Title><Paragraph>A hoax message aims to mislead, often relying on the naivety of its recipients. One of the most notorious hoaxes concerned the so-called ‘Good Times virus’. This hoax is described by Sophos (n.d.), a company that develops anti-virus software, as follows. (Remember this is a hoax, so please don’t spread the news about the Good Times virus as so many others did!)</Paragraph><Quote><Paragraph>Probably the most successful virus hoax of all time, Good Times has been scaring people since 1994. It’s still going strong, despite the fact that it is completely untrue; there is no such virus, and indeed it is impossible for a virus to do what is claimed for Good Times.</Paragraph><Paragraph>The hoax started off simply: it warned people not to read or download any email with the subject of “Good Times”, because the messages were viral and would erase their hard drives. Later, more detail was added, telling of the damage that would be done to the user’s computer system.</Paragraph><Paragraph>The end of the spoof warning contained an exhortation to “Forward this to all your friends. It may help them a lot.” […] In their thousands, people did, and still do.</Paragraph><Paragraph>The secret to the success of the hoax is that it successfully taps into computer users’ fears about computers, security and the Internet, and contains pseudo-technical babble that sounds convincing.</Paragraph></Quote><Paragraph>This description indicates how convincing the message in this case was. Hoax messages can spread rapidly via email and forums, often passed on unwittingly by work colleagues, family, friends and even reputable online retailers. Unfortunately, users who fall for hoaxes can cause problems both for themselves and for others. A hoax can generate spam (when, as with Good Times, it directs the recipient to pass on the message), cause files to be deleted unnecessarily and potentially harmfully (by directing the user to delete them), and generally cause panic.</Paragraph><Paragraph>Like Sophos, most anti-virus software vendors maintain information on hoaxes on their websites, so you can check such sites if you suspect a hoax. Alternatively you can use a search engine: by searching for significant terms contained within the hoax message, you may find reports on reputable sites such as the Sophos site.</Paragraph></Section><Section id="sec004_004"><Title>4.4 Phishing</Title><Paragraph>A particular kind of hoax message aims to persuade users to disclose private information such as their credit card details and PIN (Personal Identification Number). This is described as <GlossaryTerm>phishing</GlossaryTerm>. The recipient of the message may be directed to a hoax website where they are requested to part with their details. Figure 10 shows an example of an email that I received.</Paragraph><Figure id="fig009"><Image alt="" height="" src="https://www.open.edu/openlearn/ocw/pluginfile.php/328397/mod_oucontent/oucontent/6159/tu100_b1_p1_f09.tif.png" src_uri="https://openuniv.sharepoint.com/sites/tmodules/tu100/block1/tu100_b1_p1_f09.tif.png" webthumbnail="false" width="100%" x_folderhash="64863f14" x_contenthash="cb746ee0" x_imagesrc="tu100_b1_p1_f09.tif.png" x_imagewidth="512" x_imageheight="457"/><Caption><Number suppressprefix="true">Figure 10</Number>An attempt at phishing</Caption><Description><Paragraph>This is an email claiming to be from </Paragraph><Paragraph>“HSBC Bank PLC”&lt;pontiusfamily@netzero.net&gt;</Paragraph><Paragraph>sent on 02 March 2009 at 21:14:46. The subject of the email is</Paragraph><Paragraph>‘Security Alert: Protect Your Online Banking’</Paragraph><Paragraph>The text of the email is</Paragraph><Paragraph>‘Dear HSBC customer,<br/>Barclays is proud to announce about their new updated secure system.<br/>We updated our new SSL servers to give our customers a better, fast and secure online banking service.<br/>Please click here proctect your account.<br/>Regards,<br/>The HSBC Bank PLc’</Paragraph><Paragraph>The text ‘click here’ is in blue to show that it is a hyperlink.</Paragraph></Description></Figure><Activity id="act009"><Heading><Number suppressprefix="true">Activity 9</Number>(exploratory)</Heading><Question><Paragraph>Looking at the email in Figure 10, what warning signs are there that might alert you to the fact that this is an attempt at phishing?</Paragraph></Question><Discussion><Paragraph>Below are the warning signs I noted when I received this email.</Paragraph><BulletedList><ListItem>Although the sender’s email address is described as ‘HSBC Bank PLC’, the actual address – pontiusfamily@netzero.net – appears to have nothing whatsoever to do with the bank; instead it sounds like a private email address.</ListItem><ListItem>The email address of ‘netzero.net’ refers to an internet service provider – NetZero – based in the USA. I can’t imagine that a bank based in the UK would contact me from an email address supplied by an internet service provider in another country.</ListItem><ListItem>There is confusion about which bank this email is meant to be from, as the message refers to both HSBC and Barclays.</ListItem><ListItem>The message exhibits poor grammar and spelling – ‘proctect’, for example. I think it unlikely that such errors would be present in genuine messages from my bank.</ListItem><ListItem>The message is not addressed to the recipient (me) by name. This can indicate a message sent randomly to large numbers of email addresses.</ListItem></BulletedList><Paragraph>The above points, along with the fact that I don’t actually manage my bank account online, convinced me not to follow the instructions in the message. Yet despite all these warning signs, some people do hand over their details in this way.</Paragraph></Discussion></Activity><Paragraph><b>It’s very important not to click on any links in these sorts of messages. </b>Even if you don’t enter your account details, making any response at all may confirm to the phisher that your email address is valid, leaving you open to further hoaxes and spam. Simply clicking on a link also risks your computer being infected with malware that could distribute the same message to all the email addresses – including those of your work colleagues, family and friends – stored on your computer.</Paragraph><Paragraph>One way to check this kind of message is to position your mouse pointer over the link (‘Click here’ in the Figure 10 example) and look at the web address that appears either as pop-up text or at the bottom of the message window. If it seems to be unrelated to the sender of the message then you should be even more suspicious. After receiving the email shown in Figure 10, I searched online and found a reputable site (millersmiles.co.uk) that contained the information shown in Figure 11.</Paragraph><Figure id="fig010"><Image alt="" height="" src="https://www.open.edu/openlearn/ocw/pluginfile.php/328397/mod_oucontent/oucontent/6159/tu100_b1_p1_f10.tif.png" src_uri="https://openuniv.sharepoint.com/sites/tmodules/tu100/block1/tu100_b1_p1_f10.tif.png" webthumbnail="false" width="100%" x_folderhash="64863f14" x_contenthash="6f629e4e" x_imagesrc="tu100_b1_p1_f10.tif.png" x_imagewidth="471" x_imageheight="573"/><Caption><Number suppressprefix="true">Figure 11</Number>Information about a phishing attempt</Caption><Description>This is a screenshot of a web page describing a phishing email very similar to the one in Figure 10. It points out that the email sends recipients to a spoof website that looks nothing like the real bank site, and that HSBC Bank never send their users emails requesting personal details in this way.</Description></Figure><Paragraph>Most phishing messages try to get you to provide some personal information (Figure 12). Clearly those trying to get your online banking details are aiming to get access to your money. However, others could be trying to access your email, blog, instant messaging or online auction accounts (if you have any), then use these accounts to distribute more phishing emails.</Paragraph><Figure id="fig011"><Image alt="" height="" src="https://www.open.edu/openlearn/ocw/pluginfile.php/328397/mod_oucontent/oucontent/6159/tu100_b1_p1_f11_small.png" src_uri="https://openuniv.sharepoint.com/sites/tmodules/tu100/block1/tu100_b1_p1_f11_small.png" webthumbnail="false" width="100%" x_folderhash="64863f14" x_contenthash="bffc912b" x_imagesrc="tu100_b1_p1_f11_small.png" x_imagewidth="500" x_imageheight="146"/><Caption><Number suppressprefix="true">Figure 12</Number> Phishing: fooling someone into giving away secret information</Caption><Description><Paragraph>This is a cartoon strip with four pictures. It shows an online exchange between one person (shown in the first three pictures) and three people shown in an office in the fourth picture, two of whom are wearing peaked caps.</Paragraph><Paragraph>The first picture shows the single person reading instructions from a computer screen. The instructions say ‘Email account setup. To verify your identity, we need to ask you a question nobody else could answer.’</Paragraph><Paragraph>The second picture has a question and answer, saying ‘Q: Where are the bodies buried?’ The person starts to type an answer of ‘Behind the’.</Paragraph><Paragraph>The third picture shows the person has stopped typing and is thinking.</Paragraph><Paragraph>The fourth picture shows the three people reading what the first person types. The answer they see says ‘Behind the … Nice try.’ One of the three responds with ‘Damn.’</Paragraph></Description></Figure><Paragraph>If you have a job that provides you with an email account then you have probably also seen messages claiming to be from your company’s <GlossaryTerm>IT</GlossaryTerm> department, asking you to enter your username and password into a website to reset your email account. I’ve certainly had them sent to my Open University email account. As with requests for you to disclose your financial details, you should be careful when disclosing your username and password. A phone call to the relevant people in the company should be sufficient to find out whether or not the request is genuine.</Paragraph></Section><Section id="sec004_005"><Title>4.5 Managing your identity online</Title><Paragraph><SideNote><Heading>Break point</Heading><SideNoteParagraph>This would be a good point to take a break if you need to do something else before returning later.</SideNoteParagraph></SideNote>As we live more of our lives online, so it becomes more important for us to be aware of and, as far as possible, try to manage the information that others can access about us online. As a general guideline, before you place any kind of information about yourself on the Web you should think about the impression you would like potential employers, new friends, your parents or your children to get of you if they searched for you online. Stories of people being disciplined or even losing their jobs as a result of inappropriate comments or photographs on their blogs or social networking sites show that this isn’t a hypothetical situation. For some employers, checking the information that is available online about job applicants is as much a part of the selection process as taking up references.</Paragraph><Activity id="act010"><Heading><Number suppressprefix="true">Activity 10</Number>(exploratory)</Heading><Question><Paragraph>Enter your name into a search engine and review what you find.</Paragraph><NumberedList class="lower-alpha"><ListItem>What is revealed about you?</ListItem><ListItem>What is revealed about other people with the same name as you? If you have a common name then it may be hard to tell the difference between you and others with the same name. However, you should be able to get an impression – and possibly even some photographs – of a few individuals who share your name. If you can’t find anyone with your name, try looking for the name of a family member or friend. </ListItem></NumberedList></Question><Discussion><NumberedList class="lower-alpha"><ListItem>My name (John Woodthorpe) isn’t very common, so most of the links I found do refer to me. They include articles and papers I wrote both before and after I started working for The Open University, as well as links to the OU website and some defunct ones to a website I used to run and took down many years ago. I didn’t find my Facebook page because the privacy settings mean that it isn’t publicly available.</ListItem><ListItem>There were several references to a company director who shares my name. I also found a couple of Facebook users, including one in New Zealand. Most surprisingly, I found a reference to a couple whose names are the same as mine and my wife’s – as far as I can tell, they run (or perhaps ran) a guest house in Bulgaria. In addition, there were several links to genealogy sites where people are trying to trace their family trees, and quite a few references to people called John from places called Woodthorpe.</ListItem></NumberedList><Paragraph>This so-called ‘ego surfing’ or ‘vanity surfing’ is an interesting thing to do from time to time. Overall I haven’t found anything unpleasant or embarrassing, but I’m old enough for any youthful indiscretions to have happened long before they could have been recorded online. I also have a range of usernames that don’t resemble my real name and so aren’t easily connected to me. They aren’t used for anything nefarious, but I see no reason why I should make it easy for others to find out everything about me.</Paragraph></Discussion></Activity><Paragraph>Several online communities offer good advice on managing your online identity - the links are given below. It’s not something to get overly worried about, but it is worth being aware of the impression that others can get by following the trail of your online activities.</Paragraph><Paragraph><a href="http://lifehacker.com/357460/manage-your-online-reputation">Manage your online reputation</a></Paragraph><Paragraph><a href="http://lifehacker.com/164222/geek-to-live--how-to-deal-with-internet-meanies">How to deal with internet meanies.</a></Paragraph><Paragraph><a href="http://www.commoncraft.com/video/protecting-reputations-online ">Protecting reputations online</a></Paragraph></Section><Section><Title>4.6 Section summary</Title><Paragraph>In this section I’ve discussed ways in which you can protect your computer and yourself online, ranging from taking sensible precautions against malware to guarding against presenting information about yourself to the world that you might later regret. In the next section you’ll learn more about the development of the computer. </Paragraph></Section></Session><Session><Title>5 What’s inside my computer, and what makes it work?</Title><Paragraph>The next section of this unit is based around a video called ‘Inside the box’ and should take you one to two hours to complete. It will give you an overview of a computer from the perspectives of a computer engineer and a computer scientist. The video has been divided into three ten-minute sections, which you will watch at intervals throughout the text.</Paragraph><Section><Title>5.1 Peripherals</Title><Paragraph>This section will introduce you to a range of peripherals connected to a typical desktop PC, and show you how the computer engineer and computer scientist each view the communication between the peripherals and the main PC.</Paragraph><Activity id="act011"><Heading><Number suppressprefix="true">Activity 11</Number> (exploratory)</Heading><Question><Paragraph>Below is the video that you need to watch for this activity. This consists of the introduction and first section (entitled ‘Outside to inside – peripherals’) of the ‘Inside the box’ video. You will need your computer’s speakers or headphones to listen to it.</Paragraph><MediaContent height="270" src="https://www.open.edu/openlearn/ocw/pluginfile.php/328397/mod_oucontent/oucontent/6159/tu100_b2_p1_vid_inside_the_box_1_large.mp4" type="video" width="480" x_manifest="tu100_b2_p1_vid_inside_the_box_1_large_1_server_manifest.xml" x_filefolderhash="3072f6d7" x_folderhash="3072f6d7" x_contenthash="36c07a82"><Caption>Inside the box: introduction and section 1</Caption><Description><Paragraph>This video is eleven minutes and five seconds long.</Paragraph><Paragraph>The main presenter, Spencer Kelly, and two co-presenters, Dr Darien Graham-Smith and Dr Parisa Eslambolchilar, are standing around a table discussing various computer components in front of them such as the PC, a mouse and a keyboard.</Paragraph><Paragraph>Parisa draws a diagram on a piece of paper. It depicts a large square (the computer) with a smaller box inside at the top (the processor) and another box at the bottom (the memory). In between these two boxes to the right is another box (input/output devices). Arrows (labelled data control and address buses) go to the processor, memory and input/output devices.</Paragraph><Paragraph>‘Outside to inside – peripherals’ is displayed on the screen.</Paragraph><Paragraph>Spencer disconnects the computer from all the peripherals and hands the mouse and connector, keyboard and connector, monitor and connector each in turn to Darien, who explains how they work. Parisa does likewise. She places the connectors on the input/output box on her diagram. Data is shown coming out of the input/output box.</Paragraph><Paragraph>Darien and Parisa each discuss how the printer and connector work from their own perspectives. Again data is shown coming out of and going into the input/output box when the connector and the printer are placed near it. The presenters then continue to discuss standards.</Paragraph><Paragraph>A digital camera is then connected by Darien to the computer using a connector. The connector is then placed on the input/output box on the diagram. They then look at the mains plug and discuss its purpose.</Paragraph><Paragraph>The peripherals are placed next to the diagram and data is shown flowing between these.</Paragraph><Paragraph>End of text description.</Paragraph></Description><Transcript><Paragraph>[Graphic title: Inside the box]</Paragraph><Paragraph>[Music – duration 00:12]</Paragraph><Speaker>Spencer Kelly</Speaker><Remark>Most of us use computers in our everyday lives, and usually we’re happy to think of them just as tools for word processing, playing games and so on. But in this video we’re going to go inside these faceless boxes, and we’re going to think of a computer from two extreme viewpoints. We’re going to look at the physical hardware from the point of view of an engineer, and then we’re going to consider the theoretical point of view from a computer scientist.</Remark><Remark>Now, you can think about a computer in many different ways. Whatever you do, it’ll be between these two extremes.</Remark><Remark>So here’s a typical setup that you may have at home. Let’s consider the physical viewpoint first, that of an engineer. Dr Darien Graham-Smith is Technical Editor of PCPro. Hiya.</Remark><Speaker>Darien Graham-Smith</Speaker><Remark>Hi there.</Remark><Speaker>Spencer</Speaker><Remark>OK, take a look at this. What do you see?</Remark><Speaker>Darien</Speaker><Remark>Well, as you say, I’m interested in the physical hardware. I think about the components that are in this computer that might make it suitable for maybe to be a general-purpose desktop computer or maybe a specialist computer such as for controlling the engine of a car. Obviously this is a desktop computer, so I might be interested in how much memory it has or what connectors it has for connecting to different peripherals.</Remark><Speaker>Spencer</Speaker><Remark>OK, Darien, thank you. Hold it there, we’re going to bring in the computer scientist now. Dr Parisa Eslambolchilar is a computer scientist and a Lecturer in Computing at Swansea University. Parisa, hi.</Remark><Speaker>Parisa Eslambolchilar</Speaker><Remark>Hi, Spencer.</Remark><Speaker>Spencer</Speaker><Remark>What interests you about this particular computer then?</Remark><Speaker>Parisa</Speaker><Remark>I’m interested to find out how to solve problems with these computers. I’m rarely interested in the physical form of computers, but I’m interested to find out what capabilities these computing devices have and how to tell this computer – these computers to do things efficiently.</Remark><Speaker>Spencer</Speaker><Remark>OK. Would you mind showing us?</Remark><Speaker>Parisa</Speaker><Remark>Yes. When I look at this computer, what I see is a big box called ‘computer’. And inside this box we have a processor, which is capable of carrying out instructions. We have memory, which is capable of holding data and instructions later the processor is going to perform. And we have input/output devices as described by Darien.</Remark><Speaker>Spencer</Speaker><Remark>And so that’s how the computer talks to the rest of the world.</Remark><Speaker>Parisa</Speaker><Remark>Exactly. These three bits are communicating with each other, and these are called data or instruction buses.</Remark><Speaker>Spencer</Speaker><Remark>So you’re interested just in the arrows. You don’t care what the arrows are made of. Darien comes in and says we can’t use ink, we’ve got to use copper or something else.</Remark><Speaker>Parisa</Speaker><Remark>Yes. This is my generic feel when I look at any computing device. A processor, memory, input/output devices.</Remark><Speaker>Spencer</Speaker><Remark>So you’re not interested in the make and the model.</Remark><Speaker>Parisa</Speaker><Remark>Not at all.</Remark><Speaker>Spencer</Speaker><Remark>As long as they’ve got those bits …</Remark><Speaker>Parisa</Speaker><Remark>Not at all.</Remark><Speaker>Spencer</Speaker><Remark>… you can do your job.</Remark><Speaker>Parisa</Speaker><Remark>Exactly.</Remark><Speaker>Spencer</Speaker><Remark>OK. Right, it’s time to look at this computer system in detail. We’re going to start with the components that are outside the box, then we’re going to go inside and we’re going to dismantle what we find in there. Now in doing this it’s very likely that we’re going to damage or destroy some of the components inside the computer. So please don’t try this at home. If you do open up your computer, remember to disconnect it from the mains first and remember that power supplies can store power for quite a long time, so treat the inside of a computer with care.</Remark><Paragraph>[Graphic title: Outside to inside – peripherals]</Paragraph><Paragraph>[Music – duration 00:08]</Paragraph><Speaker>Spencer</Speaker><Remark>Now, we’ll start by looking at the external devices that are plugged into the system box: keyboard and mouse. Whip the plugs out of the back. Darien, what do you find interesting about that little fella?</Remark><Speaker>Darien</Speaker><Remark><i>(Laughs)</i> Well, not an awful lot. This is a fairly standard mouse and as you can see it’s got a standard connector. This is a PS2 connector. You move the mouse, it generates an electrical signal, that goes through this plug and into the computer.</Remark><Speaker>Spencer</Speaker><Remark>OK. And how about – don’t you just love cables? – the keyboard.</Remark><Speaker>Darien</Speaker><Remark>Yes, well, once again this is a standard keyboard, I’m sure this’ll be familiar, and it’s got a standard connector. In fact, that’s the same standard. That’s another PS2 connector, though it’s colour coded so you don’t get them mixed up. Press the key, generates an electrical signal, goes through the plug into the computer.</Remark><Speaker>Spencer</Speaker><Remark>Both devices talk to the computer using exactly the same type of plug, then.</Remark><Speaker>Darien</Speaker><Remark>That’s right, yes, they’re fairly simple devices.</Remark><Speaker>Parisa</Speaker><Remark>Thank you, Darien. In my view, mouse and keyboard are both input devices.</Remark><Remark>If you go back to the initial drawing I had to present a generic model of a computing system, mouse and keyboard are going into the box presented as the input/output or peripheral devices.</Remark><Remark>Mouse and keyboard are both generating electrical signals which represent symbolic information such as the key pressed or the mouse movement. These two devices are continuously capturing the data and then entering them into the computing system where it can be processed later.</Remark><Speaker>Spencer</Speaker><Remark>So different signals mean different key presses, different button presses, different movements, the computer will do different things based on those signals.</Remark><Speaker>Parisa</Speaker><Remark>Exactly.</Remark><Speaker>Spencer</Speaker><Remark>Yeah. Right, we’ve done input, let’s do output. Darien, the monitor.</Remark><Speaker>Darien</Speaker><Remark>Yes, the monitor. This here is a 19-inch flat-screen model, a fairly standard part of many desktop setups, and it connects by another standard connector. This is called a DVI connector. It takes the electrical signals from the computer, relays them to the screen, which then displays them as images. That’s what I make of it.</Remark><Speaker>Parisa</Speaker><Remark>In my view this display is just an output device, and I can actually take the plug back to the peripheral box and represent it as an output port.</Remark><Remark>I’m interested to know what symbolic information or instructional data I need to send to this device to actually make it display the data I want to, and I’m not interested to know what kind of display it is or what kind of connector it has.</Remark><Speaker>Spencer</Speaker><Remark>So the information that comes out of the processor needs to be turned into something that we humans can read on the screen.</Remark><Speaker>Parisa</Speaker><Remark>Exactly.</Remark><Speaker>Spencer</Speaker><Remark>Right, that’s the monitor. Over the other side we’ve got a printer. Darien, just a straightforward output device?</Remark><Speaker>Darien</Speaker><Remark>You’d think so, wouldn’t you? I mean, you send your pages to the printer and it prints them. But sometimes the printer needs to talk back to the computer, for example to say it’s out of paper. So there’s two-way communication going on there.</Remark><Speaker>Spencer</Speaker><Remark>This is an input and an output device.</Remark><Speaker>Darien</Speaker><Remark>That’s right.</Remark><Speaker>Spencer</Speaker><Remark>OK.</Remark><Speaker>Darien</Speaker><Remark>And it happens over another standard interface, this time USB.</Remark><Speaker>Parisa</Speaker><Remark>Thank you, Darien. I put back this cable on the peripheral device box.</Remark><Remark>In my view, printers are interesting devices with interesting behaviour. They can interrupt the main computer at any time. If you think about an example in real life, they can be like a scenario of reading a book and the doorbell rings, you bookmark the page you were reading and you answer the doorbell, come back and resume the reading from the place you paused.</Remark><Speaker>Spencer</Speaker><Remark>So that’s a fairly simple interruption then. The computer’s the one reading the book, the printer is at the door, and then it can just stop what it’s doing and then come back and resume it afterwards. That sounds pretty simple.</Remark><Speaker>Parisa</Speaker><Remark>Exactly, exactly. But this is a simplest scenario, we can imagine for responding to an interrupt. But imagine a different scenario – for instance, you are juggling and the doorbell rings. It’s not as easy as bookmarking the page.</Remark><Speaker>Spencer</Speaker><Remark>You can’t leave them hanging there while you go to the door, yeah.</Remark><Speaker>Parisa</Speaker><Remark>Exactly. So what can you do? You can either shout to the person at the door and say wait, or you let the balls fall on the floor and then you go to the door and come back and restart the juggling.</Remark><Remark>But it’s not always as simple as this scenario. How about responding to a fire alarm? What happens if you’re juggling and the fire alarm goes on? Can you respond to that in the same way as you responded to the doorbell?</Remark><Speaker>Spencer</Speaker><Remark>So you’re interested in looking at responding to different types of interruptions in different ways and possibly having to restart more of the process afterwards depending on how you left it.</Remark><Speaker>Parisa</Speaker><Remark>Exactly. So developing models of computing devices to respond to interrupts efficiently is a challenging subject for a computer scientist.</Remark><Speaker>Spencer</Speaker><Remark>Now, when we were talking about the connectors, one word stood out for me – especially from you, Darien – and that’s standard.</Remark><Speaker>Darien</Speaker><Remark>Yes. Standards are what make it possible for the computer to talk to all these different devices. The standard will define the physical size and shape of the connector, and it will also specify the power requirements and the sort of electrical signals that have to travel back and forth.</Remark><Speaker>Spencer</Speaker><Remark>OK, and these standards are available to all device manufacturers?</Remark><Speaker>Darien</Speaker><Remark>Absolutely, yes. And that makes it very easy. I can go to a shop and I can buy a new monitor or a new printer and I can be confident that they will work with my PC.</Remark><Speaker>Spencer</Speaker><Remark>Parisa, are standards important to you as a computer scientist?</Remark><Speaker>Parisa</Speaker><Remark>Yes, I do use standards but they are not the same standards as engineers use. I work with symbolic data and information, and I’m interested to know how computers store or manipulate the data. So I need to make sure there is a common interpretation for these symbols when I transfer the data from one device to another device.</Remark><Speaker>Spencer</Speaker><Remark>Right, so if you bought a new monitor, different make, you need to guarantee that it’s going to show the same information.</Remark><Speaker>Parisa</Speaker><Remark>Exactly.</Remark><Speaker>Spencer</Speaker><Remark>So we are going to hear the word ‘standard’ an awful lot more. You have been warned.</Remark><Remark>Just one more device to get rid of first. Darien, smile.</Remark><Speaker>Darien</Speaker><Remark>Ah yes, the digital camera. Well, of course, once you’ve taken your photographs you upload them to the PC via a standard connector again, USB.</Remark><Speaker>Spencer</Speaker><Remark>Surely not.</Remark><Speaker>Darien</Speaker><Remark>Oh yes.</Remark><Speaker>Parisa</Speaker><Remark>For me this is only an input/output device. I can put this USB cable in the peripheral devices box.</Remark><Speaker>Spencer</Speaker><Remark>OK, good, and let’s just lose this cable as well.</Remark><Speaker>Darien</Speaker><Remark>Yes, that’s perhaps the most important standard of all because without that one the computer can’t do anything.</Remark><Speaker>Spencer</Speaker><Remark>Now surely we’re all in agreement on that one.</Remark><Speaker>Parisa</Speaker><Remark>Well, not really. For me, it only makes the hardware work. I can still reason, I can still solve computational problems or develop the theories which can be used for the computation later …</Remark><Speaker>Spencer</Speaker><Remark>All without electricity.</Remark><Speaker>Parisa</Speaker><Remark>… without electricity.</Remark><Speaker>Spencer</Speaker><Remark>OK. So, as I understand it, as an engineer you’re looking at these external devices as having standard interfaces that match the standard interface on the system box. Yeah?</Remark><Speaker>Darien</Speaker><Remark>That’s right.</Remark><Speaker>Spencer</Speaker><Remark>And as a computer scientist you’re thinking about these devices as a way of transferring standard symbolic data into and out of this chap here.</Remark><Speaker>Parisa</Speaker><Remark>That’s right.</Remark><Speaker>Spencer</Speaker><Remark>Excellent. Go on, try it.</Remark><Speaker>Parisa</Speaker><Remark>Thank you.</Remark><Speaker>Spencer</Speaker><Remark>You’ll love it. Electricity. Brilliant.</Remark></Transcript></MediaContent></Question></Activity></Section><Section><Title>5.2 Opening the case</Title><Paragraph>Figure 13 shows a picture of the inside of a fairly standard desktop PC (click on this to see a larger view with labels).</Paragraph><MediaContent height="598" src="https://www.open.edu/openlearn/ocw/pluginfile.php/328397/mod_oucontent/oucontent/6159/tu100_b2_p1_f10.swf" type="flash" webthumbnail="true" width="780" x_folderhash="3072f6d7" x_contenthash="50af6d7d" x_smallsrc="tu100_b2_p1_f10.swf.jpg" x_smallfullsrc="\\dog\PrintLive\Courses\tu100\block_02\e1i1\part_1\published\images\tu100_b2_p1_f10.swf.jpg" x_smallwidth="512" x_smallheight="398"><Caption><Number suppressprefix="true">Figure 13</Number> The interior of a typical desktop PC</Caption><Description>This figure is a photograph of the inside of a typical desktop personal computer. Clearly visible are a cooling fan and the hard disk drives. A circuit board, the ‘motherboard’, takes up most of the background in the image. A power supply casing can be seen in the top left-hand corner of the box. Smaller components can be seen attached to the motherboard; some of these are themselves circuit boards. The majority of the motherboard is hidden by wiring, some of which can be seen to connect the hard disk drives to the motherboard, and some of which clearly terminates in the power supply. The general impression is that there is a lot of clutter and ‘stuff’ connected together.</Description></MediaContent><Paragraph>To make sense of all this clutter I could take a computer engineering view of the system and think about the detailed wiring, voltages, electric currents, circuit boards, power supplies, cooling fans, etc. However, few people really need to think about a computer system in this way. Instead we can think of the computer as a series of standard parts connected by standard wiring, with standard communication protocols exchanging data in standard formats.</Paragraph><Paragraph>Figure 14 provides an abstract, high-level look at the content of a desktop computing system. Inside the box I’ve reduced the detail to just the <GlossaryTerm>central processing unit (CPU)</GlossaryTerm> (otherwise known as the central processor), the <GlossaryTerm>memory</GlossaryTerm> and the <GlossaryTerm>bus</GlossaryTerm>es connecting them together, with everything outside the box connected through interfaces. The external components are the input, output and storage devices that we can typically expect to be connected to the system, and the network access points through which the desktop system can connect to a wider network of computers and devices. </Paragraph><Figure><Image alt="" height="" src="https://www.open.edu/openlearn/ocw/pluginfile.php/328397/mod_oucontent/oucontent/6159/tu100_b2_p1_f11.eps.png" src_uri="file://dog/PrintLive/Courses/tu100/block_02/e1i1/part_1/published/images/tu100_b2_p1_f11.eps.png" webthumbnail="true" width="100%" x_folderhash="3072f6d7" x_contenthash="04ff505e" x_imagesrc="tu100_b2_p1_f11.eps.png" x_imagewidth="776" x_imageheight="445" x_smallsrc="tu100_b2_p1_f11.eps.small.png" x_smallfullsrc="\\dog\PrintLive\Courses\tu100\block_02\e1i1\part_1\published\images\tu100_b2_p1_f11.eps.small.png" x_smallwidth="506" x_smallheight="291"/><Caption><Number suppressprefix="true">Figure 14</Number> High-level representation of parts of a desktop computer</Caption><Description><Paragraph>The figure shows four main boxes, labelled ‘inside the box’, ‘standard hardware interfaces’, ‘ input, output and storage devices’ and ‘computer network access’.</Paragraph><Paragraph>The box labelled ‘inside the box’ contains two smaller boxes: ‘central processing unit’ and ‘memory’. These are linked to each other and to the ‘standard hardware interfaces’ box by a three-way arrow labelled ‘data, address and control buses’.</Paragraph><Paragraph>The ‘standard hardware interfaces box’ contains the labels ‘serial’, ‘IDE/ATA’, ‘parallel’, ‘PCI’, ‘USB’, ‘SCSI’, ‘SATA’ and ‘midi’; this box touches the ‘inside the box’ box, which is on its left, and both of the other two boxes, which are on its right.</Paragraph><Paragraph>The ‘input, output and storage devices’ box contains the labels ‘speakers’, ‘monitors’, ‘mouse’, ‘internal hard drives’, ‘keyboards’, ‘sound processing cards’, ‘CD read-writers’, ‘printers’, ‘scanners’, ‘external hard drives’, ‘graphics cards’, ‘DVD read-writers’ and ‘musical instruments’. It connects to the standard hardware interfaces box. The ‘computer network access’ box contains the labels ‘wireless card’, ‘modem’, ‘Bluetooth’ and ‘Ethernet’. It also connects to the ‘standard hardware interfaces’ box.</Paragraph></Description></Figure></Section><Section><Title>5.3 What's inside?</Title><Paragraph>I will now examine a physical desktop PC by dismantling it and looking for the places where the processing happens. This exploration will take me down into the central processing unit, where I will see that at the lowest level of the computer there are simple electronic switches.</Paragraph><Paragraph>So let’s take a look and see what can be found inside a modern desktop computer. You should keep in mind that we can think about the computer system as a symbolic message-passing and manipulation system making use of standard data formats and communication protocols.</Paragraph><Activity id="act012"><Heading>12 (Exploratory)</Heading><Question><MediaContent height="270" src="https://www.open.edu/openlearn/ocw/pluginfile.php/328397/mod_oucontent/oucontent/6159/tu100_b2_p1_vid_inside_the_box_2_large.mp4" type="video" width="480" x_manifest="tu100_b2_p1_vid_inside_the_box_2_large_1_server_manifest.xml" x_filefolderhash="3072f6d7" x_folderhash="3072f6d7" x_contenthash="fd7da032"><Caption>Inside the box: section 2</Caption><Description><Paragraph>This video is eight minutes and six seconds long.</Paragraph><Paragraph>Opening the case – what’s inside?</Paragraph><Paragraph>The main presenter, Spencer Kelly, and two co-presenters, Dr Darien Graham-Smith and Dr Parisa Eslambolchilar, are standing around a system box discussing various computer components. Spencer removes the side and labels appear pointing to the various components, which are power supply, fan, CD-ROM disk, hard disk drive, battery, heat sink, memory, CPU under heat grille, expansion connectors and interface cards. Each component is removed and the presenters discuss the function of these from their own perspective.</Paragraph><Paragraph>The storage devices are removed and placed next to the memory box in the diagram created during the last video. Spencer unscrews the graphics interface card and its function is discussed. Parisa draws a diagram of the graphics card in the same format as the diagram for the computer, showing that the three units – graphics processor, memory, and input and output ports – are communicating with each other. The graphics card is placed on the diagram. The graphics card is placed by the input and output device box in the original diagram. A two-way arrow illustrates data moving between the two devices. The same procedure is repeated with the digital camera.</Paragraph><Paragraph>Spencer takes hold of an aerial at the back of the computer and pulls out the wireless card. The presenters discuss the function of this device. The card is placed next to the input and output box on the diagram and data is shown flowing between the two. Spencer then pulls out some cables that connect components within the computer together. Parisa places them on the diagram, showing how they connect the system together and enable data to flow between the components. They then discuss the case. A diagram shows fans turning and air flowing through the computer to keep everything cool.</Paragraph><Paragraph>End of text description.</Paragraph></Description><Transcript><Paragraph>[Graphic title: Opening the case – what’s inside?]</Paragraph><Paragraph>[Music – duration 00:12]</Paragraph><Speaker>Spencer Kelly</Speaker><Remark>Let us now turn our attention to the components inside the system box. Now Darien, is this a fairly standard PC?</Remark><Speaker>Darien Graham-Smith</Speaker><Remark>Yeah, I mean, it’s not a brand new one obviously, but you’ll find systems like this in plenty of businesses and homes.</Remark><Speaker>Spencer</Speaker><Remark>OK. Parisa, is any of this of interest to a computer scientist?</Remark><Speaker>Parisa Eslambolchilar</Speaker><Remark>I very rarely look inside my computers. I leave it to the hardware people.</Remark><Speaker>Spencer</Speaker><Remark>You have people to do that? She actually has people …</Remark><Speaker>Parisa</Speaker><Remark><i>(Laughs) </i>I’m only interested in what the machine can do.</Remark><Speaker>Spencer</Speaker><Remark>Right. Now Darien, there’s a fan in here. What’s that about?</Remark><Speaker>Darien</Speaker><Remark>Well, the central processing unit which is inside the computer, it can get very hot in use, it can get to more than 80 degrees Celsius, and that’s actually hot enough for it to destroy itself. So we have a fan inside there, we also have a heat sink with thermal paste on it there, and that keeps it all cool.</Remark><Speaker>Spencer</Speaker><Remark>OK, Parisa.</Remark><Speaker>Parisa</Speaker><Remark>The fan has nothing to do with my generic view of computing. This is only an engineering component.</Remark><Speaker>Spencer</Speaker><Remark>Right. [to Darien] You can keep that, then.</Remark><Remark>And I recognise this as well. This is the power supply, and these are the power cables that supply electricity to all the components inside. Now Darien, the message I’m getting from you is that this is yet another standard component, it’s just there to make all the other bits work, yeah?</Remark><Speaker>Darien</Speaker><Remark>That’s right. If you’re building a PC you need to make sure that all the components are receiving the right power through the right connectors, and that means using a standard power supply.</Remark><Speaker>Spencer</Speaker><Remark>OK, and Parisa, the message I’m getting from you is anything that helps the components to actually physically operate is not part of your view of computing.</Remark><Speaker>Parisa</Speaker><Remark>Yes, that’s right.</Remark><Speaker>Spencer</Speaker><Remark>OK.</Remark><Remark>[pause]</Remark><Remark>More standard components here. That’s the DVD drive, and this is the internal hard disk drive.</Remark><Speaker>Darien</Speaker><Remark>That’s right. These are both storage devices, but they’re a little bit different. This one’s self-contained; this one uses removable disks, obviously. Also they’ve got different connectors. This one uses a SATA <i>(pronounced: satter)</i> or SATA <i>(pronounced: sarter)</i> connector; this one has the older IDE interface.</Remark><Speaker>Parisa</Speaker><Remark>In my view of computing devices, these two are both memory devices and both capable of storing symbolic information and data permanently.</Remark><Speaker>Spencer</Speaker><Remark>Now, I recognise this because I’ve just put a new one in my computer. This is a graphics interface card. Now this is a pretty old one, but the newer ones will actually have a fan on top as well. I guess that’s because they generate quite a lot of heat, yeah?</Remark><Speaker>Darien</Speaker><Remark>That’s right, yes, graphics cards have their own processor – it’ll also have its own memory. And they’re both optimised to produce 2D and 3D images at very high speeds, so yes, it does generate quite a lot of heat.</Remark><Speaker>Parisa</Speaker><Remark>Yes, graphic cards used to be quite simple output devices, but modern graphic processing units have become so specialised they’ve become actually a computing device in their own right. They are capable of running image-processing algorithms and they can do any computational algorithms such as codebreaking very, very efficiently. So I can draw the same generic model for the graphic processing unit. So I can actually have the same big box but this time for the graphics card, with the graphics processor and the memory to store the symbolic data and just outside I have input/output devices. And these three units are communicating and talking to each other in the communication channels or data buses.</Remark><Speaker>Spencer</Speaker><Remark>So just to be clear, you are considering this graphics card as both a component of this computer and a computer in its own right.</Remark><Speaker>Parisa</Speaker><Remark>Yes, exactly. So in my view this is both an example of an input/output device in this generic model and also a computing device in its own right.</Remark><Remark>And these two symbolic manipulation devices are communicating and exchanging symbolic data continuously and just talking to each other.</Remark><Speaker>Spencer</Speaker><Remark>So is this what you do, then, when you’ve got complex components like this? You consider them as two different computers that exchange information and also one will control the other if necessary.</Remark><Speaker>Parisa</Speaker><Remark>Exactly. Or take the example of the digital camera. This is a very complex computing device. It’s got memory, it’s got a processor, it’s got input and output units and also the communication channels. But when you connect the digital camera to the main computer, the main computer sends symbolic instructions to this device and they start exchanging symbolic data with each other.</Remark><Speaker>Spencer</Speaker><Remark>And the same applies to other devices as well, so it sounds like a pretty powerful generalisation.</Remark><Speaker>Parisa</Speaker><Remark>Exactly.</Remark><Speaker>Spencer</Speaker><Remark>OK. Now, this has got an aerial on it, so I guess that makes this the wireless card.</Remark><Speaker>Darien</Speaker><Remark>That’s right. The wireless card lets the PC connect to a wireless network, and most laptops now have built-in wireless adapters so you can connect to the internet at home or perhaps in a coffee shop, for example.</Remark><Speaker>Parisa</Speaker><Remark>Yes, in my view this is an example of an input/output interface device. It turns symbolic electronic data inside a computer into a symbolic wireless signal outside and vice versa.</Remark><Speaker>Spencer</Speaker><Remark>Now, there’s a few wires left inside here and they’re not actually connected to the power supply, so what are these for?</Remark><Speaker>Darien</Speaker><Remark>Well, these cables simply connect some of the components together and they connect to some of the external ports, and generally these just bring everything together into one complete system.</Remark><Speaker>Spencer</Speaker><Remark>It’s a complete mess in here, I tell you. There you go.</Remark><Speaker>Parisa</Speaker><Remark>Oh, thank you. In my view these are data address and control buses. They allow the communication between the processor, memory, input/output devices to take place. So they allow the models of input/output devices, processor and the memory I have built to be treated as a single interconnected system.</Remark><Speaker>Spencer</Speaker><Remark>Right then. Well, let’s just remove the final piece of the puzzle. Let’s get rid of the case.</Remark><Speaker>Darien</Speaker><Remark>Well, don’t discard the case because this is a component as well. Obviously it needs to be big enough to hold all the various parts of the computer, it needs to have the correct mountings, and also we’ve spoken about fans – it needs to be designed to allow air to flow through to keep everything cool.</Remark><Remark>If you’re designing a high-end desktop system you could spend quite a long time just thinking about the air flow.</Remark><Speaker>Spencer</Speaker><Remark>OK, fair enough. I stand corrected.</Remark><Remark>Right, so we’ve been inside the box, and we’ve disconnected the various components attached using this wiring to this central circuit board here. Now, from an engineering viewpoint these are all the bits that make the computer work: the power, the cooling, the wiring and, of course, the standard components connected using standard interfaces. The computer scientist has a general model which ignores the specific detail of the hardware and concentrates instead on what the computer is capable of doing.</Remark></Transcript></MediaContent></Question></Activity><Paragraph>The important point to establish is that the computer operates by its subsystems exchanging symbolic values. The exchange of symbols is governed by protocols, and electronic components ensure that the symbol representations (such as voltage levels, timed signals, etc.) are correct for each subsystem. When a complex sequence of symbols makes up a message, <i>either</i> the computer executes an algorithm (represented as another set of symbols) that implements a communications protocol, <i>or</i> the electronic components involved in the message exchange are constructed in such a way that they follow a series of steps that implement the protocol.</Paragraph><Paragraph>To a computer engineer the power supplies, cooling fans, wiring, etc. are important because they make the computer work, but to a computer scientist or a software engineer they’re simply the stuff that allows the computer science – the implementation of the algorithms – to happen.</Paragraph><Paragraph>Now let’s think about what is happening inside the central processing unit of the computer.</Paragraph></Section><Section><Title>5.4 Motherboard and CPU</Title><Activity id="act017"><Heading><Number suppressprefix="true">Activity 13</Number> (exploratory)</Heading><Question><Paragraph>Watch the third section of the ‘Inside the box’ video (entitled ‘Deep inside – the motherboard and CPU’), which continues the exploration of a desktop PC by giving you an overview of the motherboard and the CPU. In this closing section of the video you will see how the transistor bridges the computer science and engineering views.</Paragraph><MediaContent height="270" src="https://www.open.edu/openlearn/ocw/pluginfile.php/328397/mod_oucontent/oucontent/6159/tu100_b2_p1_vid_inside_the_box_3_large.mp4" type="video" width="480" x_manifest="tu100_b2_p1_vid_inside_the_box_3_large_1_server_manifest.xml" x_filefolderhash="3072f6d7" x_folderhash="3072f6d7" x_contenthash="91e5df84"><Caption>Inside the box: section 3</Caption><Description><Paragraph>This video is 7 minutes and 59 seconds long.</Paragraph><Paragraph>Deep inside – the motherboard and CPU.</Paragraph><Paragraph>The main presenter, Spencer Kelly, and two co-presenters, Dr Darien Graham-Smith and Dr Parisa Eslambolchilar, are standing around a table discussing a printed circuit board. Labels appear on the board showing serial and parallel ports, CPU, memory, audio output, USB and LAN connectors, BIOS, keyboard and mouse connectors, BATA connectors, IDE connectors, PCI connectors, onboard speaker, expansion slot and wiring. Darien removes the memory modules and Parisa places these next to the CPU on the diagram. Spencer then removes the CPU (small square card-like device with many pins on it) and the presenters discuss it. It is placed on the processor box in the diagram and discussed further.</Paragraph><Paragraph>The video changes to a view of the outside of the Intel building. Steve Cutler of Intel talks about how people use computers. ‘Horsepower meets brain power’ is displayed on the screen. A range of different processors is shown. A yellow and black warning sign indicating an area where there are electrostatic discharge sensitive devices is shown. A man removes a cover from the side of a computer and then takes the processor out.</Paragraph><Paragraph>The video presentation then returns to the three presenters, who discuss transistors.</Paragraph><Paragraph>End of text description.</Paragraph></Description><Transcript><Paragraph>[Graphic title: Deep inside – the motherboard and CPU]</Paragraph><Paragraph>[Music – duration 00:10]</Paragraph><Speaker>Spencer Kelly</Speaker><Remark>There’s not much left to examine now. We’re left with a large printed circuit board, lots of chips and sockets all over the place. Now, the CPU and the memory are both here – before we get to that, Darien, what else is on this board?</Remark><Speaker>Darien Graham-Smith</Speaker><Remark>Well on this board, the motherboard, there are lots of chips that control the various connectors, such as the keyboard and mouse connectors, or here we have the drive connectors for DVD drives or hard disks.</Remark><Speaker>Spencer</Speaker><Remark>And then there’s wiring and there’s sensors, I know, and there’s other stuff as well. There’s a battery here, now what’s that about?</Remark><Speaker>Darien</Speaker><Remark>Yes, on the motherboard there’s a clock and the computer can also remember a couple of basic settings, even when it’s disconnected from the mains.</Remark><Speaker>Spencer</Speaker><Remark>So the battery keeps that information alive?</Remark><Speaker>Darien</Speaker><Remark>Yes.</Remark><Speaker>Spencer</Speaker><Remark>And Parisa, this is still just engineering for you?</Remark><Speaker>Parisa</Speaker><Remark>It is indeed. For me it doesn’t hold much interest. For me it’s all hardware engineering.</Remark><Speaker>Spencer</Speaker><Remark>Well hang on, ’cos things are about to get more interesting. Darien, unleash the memory, where’s that?</Remark><Speaker>Darien</Speaker><Remark>Yes, these here are the memory modules and each one has a big row of memory chips on it, all the same. Thank you for that. They connect via a standard interface as you can see.</Remark><Speaker>Spencer</Speaker><Remark>You can have 1, 2, 3 or 4 on this one, can’t you?</Remark><Speaker>Darien</Speaker><Remark>Yes.</Remark><Speaker>Spencer</Speaker><Remark>Yeah. OK, thanks for the memory. Parisa, this is going to fit into your model, isn’t it?</Remark><Speaker>Parisa</Speaker><Remark>Indeed, so it can go to the memory box where it stores the symbolic data and instruction which will be used by the central processing unit.</Remark><Speaker>Spencer</Speaker><Remark>Talking of which, that is all that’s left, so if I just flip this up here we get to the heart – indeed, the brain – of the computer. This is the central processing unit. Darien, this is a really complicated thing, isn’t it?</Remark><Speaker>Darien</Speaker><Remark>That’s right. The CPU, central processing unit, is what makes this a computer. The CPU is able to actually perform operations, to work out calculations and to send signals back and forth between itself and the various components of the PC. Those little pins there that go into the socket, the electrical signals travel on those pins.</Remark><Speaker>Spencer</Speaker><Remark>And there are lots more than any other device that I’ve seen. There’s hundreds of them.</Remark><Speaker>Darien</Speaker><Remark>There are hundreds indeed, and newer processors have even more. And inside there, there are literally millions of tiny transistors. So it’s an extremely complicated piece of technology.</Remark><Speaker>Spencer</Speaker><Remark>This is what it’s all about, isn’t it?</Remark><Speaker>Parisa</Speaker><Remark>It is indeed an excellent piece of engineering which can go to the model, in the model, the processor box. But in my view it’s still a physical component which is capable of carrying out really complex computation and processing algorithms.</Remark><Remark>But it’s not the only way of doing the computation and processing. In old days researchers built mechanical computers by using gears, levers and cogs. And in recent days researchers are building computers by using molecular, biological, hydraulic and quantum technologies. So in my view this old central processing unit can be modelled the same way as I modelled before.</Remark><Remark>But the winning piece of all this central processing unit and in general-purpose computers are switches called transistors. The processor which carries out symbolic manipulation on the symbolic data relies heavily on the transistor logic-based circuits.</Remark><Speaker>Spencer</Speaker><Remark>I see. OK, well the CPU is – as we’ve established – an incredibly complex thing, so let’s hear more about processor development from someone involved in making them.</Remark><Speaker>Steve Cutler</Speaker><Remark>Intel’s primary business is really the design, development and manufacture of microprocessors, the central processing units that go into typical computer applications – desktop PCs, laptop PCs, servers, those kind of devices.</Remark><Remark>These days people want to do other things. They want to communicate, they want to collaborate, they want to share information – videos, pictures, things like that, perhaps. And so the use you make of a computing device is quite different from considering how you’d actually design one of those devices. But of course the two are closely linked in many ways.</Remark><Remark>So the internal instruction sets are focused onto the end application primarily, which we identify by looking at the market trends to try and see, you know, how we can take advantage of future trends and build them in.</Remark><Remark>The types of processors you’d get in traditional computing devices will look and feel fairly similar. Devices for laptops will probably be the smallest package we can put a device into. The desktop processors will be somewhere in between. Server processors will be bigger still, probably, because typically they are slightly higher power, means they generate more heat and the bigger package means it’s easier to remove the heat from the device and do it. So, you know, there’s many different physical flavours of these devices to allow you to build exactly the device you want for its end purpose.</Remark><Remark>So it does take quite some time to go from the theoretical to the practical device itself, and there’s a lot of stress in between those two as you work out what is possible and what is not.</Remark><Remark>If we look back in time, the first microprocessor that Intel developed – the first microprocessor anybody developed that was commercially available, the 4004: 2300 transistors. If we look at today’s processors, the most common devices on the market for desktop and laptop consumption were up to 560 million transistors with the Intel Core family of processors, and for server processors even more so. So the Itanium family of processors, up to two billion transistors these days. So to try and do an analogy to help you understand this, you know, let’s suppose we say transistors are homes for people. So 2300 homes, a small town perhaps. Two billion homes, we’re looking at pretty much every home in the world, I would say. So we’ve gone from interconnecting a small town to interconnecting the entire world in terms of interconnecting the transistors on our processors.</Remark><Remark>So trying to design a device of that complexity really does require you to break it down into smaller subsections and into modular pieces. And then just ensure that the individual modules interface to each other correctly and communicate correctly so you end up with a fully functional final design.</Remark><Remark>But at the lowest level of this design it still comes down to the transistors on the silicon. And that’s, you know, where Intel puts in a huge amount of research and development effort. So yeah, ultimately from our point of view everything comes down to how many transistors can we put on a piece of silicon.</Remark><Speaker>Spencer</Speaker><Remark>Now, I noticed that both of you mentioned the transistor when you were talking about the CPU. We’ve also heard that the transistor level is the lowest level of processing, so could this possibly be where your two different views coincide?</Remark><Speaker>Parisa</Speaker><Remark>Yes, it probably is. I can still model or represent an on and off state of the transistor using binary. I can model the binary processing using the Boolean algebra, so I can develop the representation of the data and instruction which can be embedded in my models.</Remark><Speaker>Darien</Speaker><Remark>Yes, we can build devices which realise your models. We can construct circuits which directly reflect your symbolic representations.</Remark><Speaker>Spencer</Speaker><Remark>See, friends really. And without the underlying model of computation, the hardware engineer will have nothing to build – and without the hardware, the computer scientist just has theoretical tools for computation. But because these two distinct views can come together to turn theory into hardware, we have the rich variety of computing systems that have found their place in so many aspects of our daily lives.</Remark></Transcript></MediaContent></Question></Activity></Section><Section><Title>5.5 Section summary</Title><Paragraph>In this section I looked inside a typical desktop computer and considered it, not as a collection of wires, power supplies and electrical circuits, but as a collection of functional components connected by wired data buses used to exchange symbolic data through appropriate standard interfaces.</Paragraph></Section></Session><Session><Title>Conclusion</Title><Paragraph>In this unit I’ve introduced several aspects of our increasingly digital lives. You’ve heard about the ever more significant role that digital technologies are playing in our information society, in areas ranging from entertainment to public services. Along with the opportunities available in the online world, you’ve also been introduced to some of the potential problems and how to avoid them.</Paragraph><Paragraph>I then went on to look inside a typical desktop computer and considered it, not as a collection of wires, power supplies and electrical circuits, but as a collection of functional components connected by wired data buses used to exchange symbolic data through appropriate standard interfaces.</Paragraph></Session><Session><Title>Keep on learning</Title><Figure><Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/328397/mod_oucontent/oucontent/6159/ol_skeleton_keeponlearning_image.jpg" x_folderhash="c95e54bc" x_contenthash="d3c986e6" x_imagesrc="ol_skeleton_keeponlearning_image.jpg" x_imagewidth="300" x_imageheight="200"/></Figure><Paragraph> </Paragraph><InternalSection><Heading>Study another free course</Heading><Paragraph>There are more than <b>800 courses on OpenLearn</b> for you to choose from on a range of subjects. </Paragraph><Paragraph>Find out more about all our <a href="http://www.open.edu/openlearn/free-courses?utm_source=openlearn&amp;utm_campaign=ol&amp;utm_medium=ebook">free courses</a>.</Paragraph><Paragraph> </Paragraph></InternalSection><InternalSection><Heading>Take your studies further</Heading><Paragraph>Find out more about studying with The Open University by <a href="http://www.open.ac.uk/courses?utm_source=openlearn&amp;utm_campaign=ol&amp;utm_medium=ebook">visiting our online prospectus</a>. </Paragraph><Paragraph>If you are new to university study, you may be interested in our <a href=" http://www.open.ac.uk/courses/do-it/access?utm_source=openlearn&amp;utm_campaign=ol&amp;utm_medium=ebook">Access Courses</a> or <a href=" http://www.open.ac.uk/courses/certificates-he?utm_source=openlearn&amp;utm_campaign=ol&amp;utm_medium=ebook">Certificates</a>.</Paragraph><Paragraph> </Paragraph></InternalSection><InternalSection><Heading>What’s new from OpenLearn?</Heading><Paragraph>
                    <a href="http://www.open.edu/openlearn/about-openlearn/subscribe-the-openlearn-newsletter?utm_source=openlearn&amp;utm_campaign=ol&amp;utm_medium=ebook">Sign up to our newsletter</a> or view a sample.</Paragraph><Paragraph> </Paragraph></InternalSection><Box type="style3"><Paragraph>For reference, full URLs to pages listed above:</Paragraph><Paragraph>OpenLearn – <a href="http://www.open.edu/openlearn/free-courses?utm_source=openlearn&amp;utm_campaign=ol&amp;utm_medium=ebook">www.open.edu/openlearn/free-courses</a>
                </Paragraph><Paragraph>Visiting our online prospectus – <a href="http://www.open.ac.uk/courses?utm_source=openlearn&amp;utm_campaign=ol&amp;utm_medium=ebook">www.open.ac.uk/courses</a>
                </Paragraph><Paragraph>Access Courses – <a href=" http://www.open.ac.uk/courses/do-it/access?utm_source=openlearn&amp;utm_campaign=ol&amp;utm_medium=ebook">www.open.ac.uk/courses/do-it/access</a>
                </Paragraph><Paragraph>Certificates – <a href=" http://www.open.ac.uk/courses/certificates-he?utm_source=openlearn&amp;utm_campaign=ol&amp;utm_medium=ebook">www.open.ac.uk/courses/certificates-he</a>
                </Paragraph><Paragraph>Newsletter ­– <a href=" http://www.open.edu/openlearn/about-openlearn/subscribe-the-openlearn-newsletter?utm_source=openlearn&amp;utm_campaign=ol&amp;utm_medium=ebook">www.open.edu/openlearn/about-openlearn/subscribe-the-openlearn-newsletter</a>
                </Paragraph></Box></Session></Unit><BackMatter><Glossary><GlossaryItem><Term>anti-virus software</Term><Definition>Software that is specifically written to identify and tackle known viruses.</Definition></GlossaryItem><GlossaryItem><Term>Automated teller machines (ATM)</Term><Definition>A machine that allows bank customers to perform certain transactions, such as withdrawing cash from their bank account. Also known as a <i>cash machine </i>or <i>cashpoint</i>.</Definition></GlossaryItem><GlossaryItem><Term>biometric</Term><Definition>A term that refers to the identification of people using biological characteristics such as fingerprints, iris recognition and DNA analysis.</Definition></GlossaryItem><GlossaryItem><Term>bus</Term><Definition>An electrical pathway connecting parts of a computer system to allow symbols to flow from one part of the system to another.</Definition></GlossaryItem><GlossaryItem><Term>cable</Term><Definition>A set of wires or optical fibres assembled, with a protective coating, for use as a communication medium.</Definition></GlossaryItem><GlossaryItem><Term>central processing unit</Term><Definition>The command centre of a computer system that interprets and executes program instructions, and controls system input and output and the storage and retrieval of data. Also known as the <i>central processor</i>.</Definition></GlossaryItem><GlossaryItem><Term>copyright</Term><Definition>A legal protection that guarantees that creators of content are rewarded for their work and protects the rights of users.</Definition></GlossaryItem><GlossaryItem><Term>database</Term><Definition>A set of computer-based data that has been organised so that it can be read, written, updated and searched. An example might be a library catalogue.</Definition></GlossaryItem><GlossaryItem><Term>digital rights management (DRM)</Term><Definition>A range of technologies used by copyright owners to control how the content they produce is used.</Definition></GlossaryItem><GlossaryItem><Term>digital technology</Term><Definition>Any technology that is based on representing data as sequences of numbers, i.e. as digital data.</Definition></GlossaryItem><GlossaryItem><Term>emoticons</Term><Definition>Text characters or images that indicate someone’s mood by representing a simple facial expression. Text-based emoticons such as :-) are usually intended to be ‘read’ by tilting your head to one side. Also known as <i>smileys</i>.</Definition></GlossaryItem><GlossaryItem><Term>firewall</Term><Definition>A software or hardware filter on a network. In its simplest form, a firewall looks at incoming or outgoing data and decides whether to block it.</Definition></GlossaryItem><GlossaryItem><Term>forum</Term><Definition>An area on the internet designed for discussion, usually on a specific topic. Also known as a <i>bulletin board system (BBS)</i>.</Definition></GlossaryItem><GlossaryItem><Term>global positioning system (GPS)</Term><Definition>A set of satellites that continuously transmit their position so that anyone with a suitable receiver can obtain very accurate positioning information.</Definition></GlossaryItem><GlossaryItem><Term>hardware</Term><Definition>The physical components of a computer system. These include the large components such as the screen, the small component parts such as circuit boards, and all the connecting cables.</Definition></GlossaryItem><GlossaryItem><Term>information and communication technology (ICT)</Term><Definition>Technology used in the conveying, manipulation and storage of data by electronic means.</Definition></GlossaryItem><GlossaryItem><Term>information society</Term><Definition>A term used to describe the social and economic changes related to the development and widespread use of information technologies.</Definition></GlossaryItem><GlossaryItem><Term>IT</Term><Definition>IT stands for information technology. This term is often used to mean the same as ICT.</Definition></GlossaryItem><GlossaryItem><Term>instant messaging</Term><Definition>Text-based communication between people who are online at the same time.</Definition></GlossaryItem><GlossaryItem><Term>internet</Term><Definition>The global internetwork that has grown from a US government-funded project started in the 1960s.</Definition></GlossaryItem><GlossaryItem><Term>internet service provider (ISP)</Term><Definition>A commercial organisation that provides access to the internet for both individuals and organisations.</Definition></GlossaryItem><GlossaryItem><Term>malware</Term><Definition>Malicious software designed to enter computer systems without the knowledge of the owner. Includes viruses, trojans and worms.</Definition></GlossaryItem><GlossaryItem><Term>memory</Term><Definition>The part of a computer system that stores programs and data while they are waiting to be executed by a CPU.</Definition></GlossaryItem><GlossaryItem><Term>modem</Term><Definition>A box of electronics placed between a computer and a telephone line to convert the digital signals from the computer into a form that can be sent by telephone.</Definition></GlossaryItem><GlossaryItem><Term>moderator</Term><Definition>A forum user who has responsibility for managing the forum and ‘moderating’ discussions to ensure they follow the forum rules.</Definition></GlossaryItem><GlossaryItem><Term>netiquette</Term><Definition>A set of guidelines for online behaviour.</Definition></GlossaryItem><GlossaryItem><Term>network</Term><Definition>A collection of devices that can communicate with each other. Networks vary in size and complexity, connecting anything from a few devices to many millions.</Definition></GlossaryItem><GlossaryItem><Term>network society</Term><Definition>A term that is sometimes used interchangeably with ‘information society’, but which emphasises how the flow of information depends on networks.</Definition></GlossaryItem><GlossaryItem><Term>online discussion group</Term><Definition>A group of people, often with common interests or aims, communicating over the internet.</Definition></GlossaryItem><GlossaryItem><Term>operating system (OS)</Term><Definition>A collection of programs that manages a computer’s resources, provides an interface between the user and the computer, and organises the running of other programs. Examples include Windows, Mac OS and Linux.</Definition></GlossaryItem><GlossaryItem><Term>patch</Term><Definition>A temporary fix to a bug or security problem in a particular piece of software (such as a web browser or an operating system). A patch modifies existing software rather than replacing it with a new version.</Definition></GlossaryItem><GlossaryItem><Term>phishing</Term><Definition>The act of sending a hoax email message that aims to persuade users to disclose private information such as credit card details or PINs. Hoax websites are also used as part of these scams.</Definition></GlossaryItem><GlossaryItem><Term>plagiarism</Term><Definition>Using the work of others to gain some form of benefit without formally acknowledging that the work came from someone else.</Definition></GlossaryItem><GlossaryItem><Term>portal</Term><Definition>A website that provides a way in to a number of sites grouped together by organisation, topic, geography, etc.</Definition></GlossaryItem><GlossaryItem><Term>program</Term><Definition>A step-by-step set of precise instructions for telling a computer how to carry out a particular task.</Definition></GlossaryItem><GlossaryItem><Term>public domain</Term><Definition>A term referring to any created content that is not subject to copyright. Material that is ‘in the public domain’ may be used freely by anyone.</Definition></GlossaryItem><GlossaryItem><Term>smart device</Term><Definition>An electronic device that processes information and exchanges it with other devices.</Definition></GlossaryItem><GlossaryItem><Term>SMS</Term><Definition>The ‘short message system’ that allows text messages to be sent between mobile phones. SMS messages can also be sent between other devices, such as computers and landline phones.</Definition></GlossaryItem><GlossaryItem><Term>social networking</Term><Definition>The activities involved in building and maintaining online relationships and communities.</Definition></GlossaryItem><GlossaryItem><Term>software</Term><Definition>The programs that control the functioning of a computer system.</Definition></GlossaryItem><GlossaryItem><Term>spam</Term><Definition>Unsolicited (junk) email. Spammers typically send an email to a distribution list consisting of millions of ‘harvested’ email addresses.</Definition></GlossaryItem><GlossaryItem><Term>trojan</Term><Definition>Malicious software that is disguised as a legitimate program, but that in the background is running some malicious code.</Definition></GlossaryItem><GlossaryItem><Term>truth table</Term><Definition>A table of Boolean values in which the columns represent the input values and the intermediate and result values of Boolean operations, and the rows represent the combination of input values and the corresponding intermediate and output values. Used to show the output of Boolean operators and expressions for all possible combinations of input values</Definition></GlossaryItem><GlossaryItem><Term>ubiquitous</Term><Definition>A term describing something that seems to be everywhere at the same time.</Definition></GlossaryItem><GlossaryItem><Term>virus</Term><Definition>Malicious software that is designed to attack software on users’ computers, spreading quickly and easily from one computer to another.</Definition></GlossaryItem><GlossaryItem><Term>World Wide Web</Term><Definition>An internet service that links computer files such as documents, images, audio and video. These files may be located on any computer connected to the internet. Also known as the <i>Web</i>.</Definition></GlossaryItem><GlossaryItem><Term>worm</Term><Definition>Malicious software that replicates itself and infects computers via a network.</Definition></GlossaryItem></Glossary><References><Reference>International Telecommunication Union (2006) <i>ITU Internet Report 2006: digital.life </i>[online], Geneva, Switzerland, ITU, http://www.itu.int/osg/spu/publications/digitalife/ (accessed 10 January 2010).</Reference><Reference>Sophos (n.d.) <i>Good Times </i>[online], Sophos Plc, http://www.sophos.com/security/hoaxes/goodtimes.html (accessed 12 January 2010).</Reference><Reference>Text.it (2008) <i>The Q2 2008 UK Mobile Trends Report </i>[online], Mobile Data Association, http://www.text.it/mediacentre/press_release_list.cfm?thePublicationID=6F5A90F5-15C5-F4C0-992D5F8DDAF2BDCA (accessed 1 January 2010).</Reference></References><Acknowledgements><Paragraph>This unit was written by John Woodthorpe (Sections 1–4) and Kevin Waugh (Section 5).</Paragraph><Paragraph>Except for third party materials and otherwise stated (see <a href="http://www.open.ac.uk/conditions">terms and conditions</a>), this content is made available under a <a href="https://creativecommons.org/licenses/by-nc-sa/4.0/">Creative Commons Attribution-NonCommercial-ShareAlike 4.0 Licence</a>.</Paragraph><Paragraph>The material acknowledged below is Proprietary and used under licence (not subject to Creative Commons Licence). See terms and conditions. Grateful acknowledgement is made to the following sources for permission to reproduce material in this unit:</Paragraph><Paragraph>Figure 1: © Jason Stitt/iStockphoto</Paragraph><Paragraph>Figure 2: © Michigan State University</Paragraph><Paragraph>Figure 3: © Jim Zuckerman/Alamy Images</Paragraph><Paragraph>Figure 4: Courtesy of http://xkcd.com/281/</Paragraph><Paragraph>Figure 5: Courtesy of http://xkcd.com/256/</Paragraph><Paragraph>Figure 6: Courtesy of http://xkcd.com/802/</Paragraph><Paragraph>Figure 7: © Marty Bucella/Cartoon Stock</Paragraph><Paragraph>Figure 9: Courtesy of http://xkcd.com/386/</Paragraph><Paragraph>Figure 11: © www.millersmiles.co.uk/report/8823</Paragraph><Paragraph>Figure 12: Courtesy of http://xkcd.com/565/</Paragraph><Paragraph><i>Presenter:</i></Paragraph><Paragraph>Spencer Kelly</Paragraph><Paragraph><i>On-screen contributors:</i></Paragraph><Paragraph>Dr Darien Graham-Smith, PC Pro Magazine</Paragraph><Paragraph>Dr Parisa Eslambolchilar, Swansea University</Paragraph><Paragraph>Steve Cutler, Technical Marketing Manager, Intel Corporation</Paragraph><Paragraph><i>With thanks to:</i></Paragraph><Paragraph>PC Pro Magazine</Paragraph><Paragraph>Intel Corporation</Paragraph><Paragraph>Alistair Kemp, PR Manager, Business and Technology, Intel UK</Paragraph><Paragraph>Mick Bennett</Paragraph><Paragraph> </Paragraph><Paragraph>Every effort has been made to contact copyright owners. If any have been inadvertently overlooked, the publishers will be pleased to make the necessary arrangements at the first opportunity. </Paragraph><Paragraph><b>Don't miss out:</b></Paragraph><Paragraph>If reading this text has inspired you to learn more, you may be interested in joining the millions of people who discover our free learning resources and qualifications by visiting The Open University - <a href="http://www.open.edu/openlearn/free-courses?utm_source=openlearn&amp;utm_campaign=ol&amp;utm_medium=ebook">www.open.edu/openlearn/free-courses</a></Paragraph></Acknowledgements></BackMatter><settings>
    <numbering>
        <Session autonumber="false"/>
        <Section autonumber="false"/>
        <SubSection autonumber="false"/>
        <SubSubSection autonumber="false"/>
        <Activity autonumber="false"/>
        <Exercise autonumber="false"/>
        <Box autonumber="false"/>
        <CaseStudy autonumber="false"/>
        <Quote autonumber="false"/>
        <Extract autonumber="false"/>
        <Dialogue autonumber="false"/>
        <ITQ autonumber="false"/>
        <Reading autonumber="false"/>
        <StudyNote autonumber="false"/>
        <Example autonumber="false"/>
        <Verse autonumber="false"/>
        <SAQ autonumber="false"/>
        <KeyPoints autonumber="false"/>
        <ComputerDisplay autonumber="false"/>
        <ProgramListing autonumber="false"/>
        <Summary autonumber="false"/>
        <Tables autonumber="false"/>
        <Figures autonumber="false"/>
        <MediaContent autonumber="false"/>
        <Chemistry autonumber="false"/>
    </numbering>
    <discussion_alias>Discussion</discussion_alias>
    <session_prefix/>
<version>2019050300</version></settings></Item>
