1 E-government In many countries, e-government has become part of government policy. The UK government has a large e-government project under way, as do the governments of the USA, Australia and Japan, to name just a few. The ‘e’ at the start of ‘e-government’ stands for ‘electronic’, and e-government usually refers to the use by governments of ICTs. In many ways e-government is not a single activity but many activities. However, in the UK and many other countries, there is a degree of central c
1.6.2 Different types of sound Sounds come in four categories.
Sound effects. Many UIs contain a range of warning beeps and reassuring sounds confirming that operations have been completed. These can include naturalistic sounds, such as the sound of a piece of screwed-up paper dropping into a waste paper basket.
Music. Many composers use computer systems to compose music, and programs such as games make extensive use of music. Short sequences of mus
1.3.4 How to use colour to good effect The effective use of colour is a complex and technical area. In Table 2 we have listed some general guidelines. References 4.3.1 Confidentiality, integrity and availability To preserve the value of an information asset, an organisation needs to sustain simultaneously its scarcity and its shareability within their respective regions. This is the critical high-level information security goal for any information asset; it is the entire rationale of an information security management system. To maintain the security of an information asset, an organisation must: either make the information asset unavailable in i 1 Why is information security important? This unit introduces you to information security and its management. A succinct definition of information security might run as follows: Information security is the collection of technologies, standards, policies and management practices that are applied to information to keep it secure. But why is it important to secure information? And how should its security be managed? To s 7.3 ADV: Some spam mail includes ‘ADV:’ in the title. This indicates that it is part of the system used in the US to allow spam mail but to highlight that it is an advertisement. You can then make an informed choice as to whether to read or delete the message. ADV: also allows users of email systems that have filtering facilities, such as Outlook, Eudora or Pegasus, to set a rule that will automatically remove the message. The way this works is that some email systems allow you to define a s 1 What this unit is about The recent huge increases in ownership of home computers and ever-widening access have been obvious boons to many peoples' lives but, as with many things that improve life, there is a downside. The downside with computers is that software crashes, hardware fails and some Internet users want to cause havoc or vandalise your computer. In this unit we will look at a few of the problems that other people may cause you. Normally when we talk about malicious software we are referring to virus 3.1 Searching for your ancestors In this section we consider searching for information about your ancestors. We cannot hope to cover all the techniques and information required to research genealogy, family history and local history; there is only time in this unit to scratch the surface. Some of the activities here are open-ended; please do not spend too long on them. If the subject interests you, you can revisit it after the course finishes, making use of the genealogical resources in the Appendix. 4.5 WiFi network structure A WiFi network can operate in one of two different modes: ad hoc mode or infrastructure mode
In an ad hoc network, stations communicate with each other directly, without the need for any intermediary or central control. This means that when one WiFi device comes within range of another, a direct communication channel can be set up between them. This is known as peer-to-peer communication. Additional devices can join the network, all communicating with each o 4.4 An introduction to WiFi WiFi (from ‘Wireless Fidelity’) is used to connect devices together in one of two network configurations known as ‘ad hoc’ and ‘infrastructure’. We shall explain these terms shortly. (As a starting point, though, you could look up the terms ‘ad hoc’ and ‘infrastructure’ in your dictionary.) In wireless LANs, nodes are usually referred to as stations – probably because each communicating device acts as a radio station with transmitter and receiver. These func 4.2 Basic principles of wireless transmission I've never quite lost the sense of wonder at the way information can be transmitted with no visible link between the sender and recipient. When I was a child I used to think that sound came through the wire linking my family's radio to the mains electricity supply (I was born before the days of battery-powered transistor radios) and I couldn't understand why my parents referred to it as ‘the wireless’ – since clearly it wasn't. I now know that the wire simply fed the radio with the elec 4.1 Introduction The focus of Section 3 was on LANs that use some kind of physical medium (for example, copper wires or fibre-optic cables) to connect together network nodes. In this section we'll be examining wireless networks – that is, networks that transmit data through the air (or space) using radio waves. There's nothing new about wireless: the principles of transmitting information using radio waves were discovered over a century ago. However, using radio waves to provide the transmission links 2.2 What are signals? To convey data from one point to another we need to represent the data by means of a signal. We can think of a signal as a deliberate variation in some property of the medium used to convey the data. Some examples are: an electrical voltage travelling along copper wires between your telephone and the local exchange; pulses of light (though we might not be able to see them) in a fibre-optic cable; the radio emissions t 1.1 Getting an overview This section starts with an article from a technical journal – the sort that is read by academics and professionals working in a related technical field. It sets the scene for some of the technologies and issues that you will be encountering later in this unit. We're not going to ask you to read the entire article, but we would like you to get an idea of the article's contents, the kind of points the author is making, and the range of issues that it throws up. With this aim in mind, w Learning outcomes When you have completed your study of this unit, you should be able to: understand and use correctly terms introduced in this unit in relation to communication networks; understand general principles involved in data exchange between ICT devices; work with numbers expressed in scientific notation, and use the Windows calculator to perform calculations on these numbers. Acknowledgements The content acknowledged below is Proprietary (see terms and conditions). This content is made available under a Creative Commons Attribution-NonCommercial-ShareAlike 2.0 Licence
Grateful acknowledgement is made to the following sources for permission to reproduce material in this unit: 2 2 Conclusion The versatile tiny transistor is now at the heart of the electronics industry. In the video clips you have seen the history of the incredible shrinking chip, its Scottish connections, and an explanation of the physics that make chips work as well as a reconstruction of making a transistor using the crude techniques of yesteryear. Introduction This unit focuses on the creation of a semiconductor transistor – a versatile tiny transistor that is now at the heart of the electronics industry. In the video clips, the history of the incredible shrinking chip, its Scottish connections and an explanation of the physics that make chips work are accompanied by a reconstruction of making a transistor using the crude techniques of yesteryear. 4.2 Representing data But if all the data and computer instructions within a computer are represented by 1s and 0s, how can this limited set of conditions be used to represent, for instance, every letter of the alphabet that might be typed into a computer from a keyboard? Activity 4 showed that there are four possible combinations
Table 2: Making e
Author(s):