0% found this document useful (1 vote)
609 views57 pages

IT 111: Introduction To Information Technology (IT)

This document provides an introduction to key concepts in information technology (IT), including definitions, types of computers and their components, computer memory measurements, and functions of IT. It defines IT and information and communications technology (ICT), noting they are often used interchangeably. It describes the basic hardware and software components of a computer system and how computers manage information. It also defines key terms like data, information, and computer memory units (bit, byte, megabyte, gigabyte, terabyte). [END SUMMARY]

Uploaded by

Emmanuel
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
Download as pdf or txt
0% found this document useful (1 vote)
609 views57 pages

IT 111: Introduction To Information Technology (IT)

This document provides an introduction to key concepts in information technology (IT), including definitions, types of computers and their components, computer memory measurements, and functions of IT. It defines IT and information and communications technology (ICT), noting they are often used interchangeably. It describes the basic hardware and software components of a computer system and how computers manage information. It also defines key terms like data, information, and computer memory units (bit, byte, megabyte, gigabyte, terabyte). [END SUMMARY]

Uploaded by

Emmanuel
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
Download as pdf or txt
Download as pdf or txt
You are on page 1/ 57

IT 111: Introduction to

Information Technology (IT)

Lecture 1: Introduction to IT/ICT


Layout of Lecture#1
1) Definition of terms: ICT, IT, Data,
Information, Information System,
and Computer.
2) Computers & Types of Computers
3) Parts of Computer
4) Computer Memory Measurements
5) Information Security
IT and ICT
 IT
• Stands for Information Technology
 ICT
• Stands for Information Communications
Technology.

 NOTE:
• The two terminologies are sometimes used
interchangeably.
IT and ICT
 Definition:
• Is the collection of computer hardware and software
that is used to manage information and data.

 Main components:
• Computer hardware
• Computer hardware
• Manage information or data
IT and ICT
 Computer hardware
• Refers to the physical (can be seen physically) parts of a
computer.
• Examples:
• Monitor, Keyboard, Mouse, Printer, Scanner, Memory card, ….
IT and ICT
 Computer software
• Refers to a collection of instructions that is used to tell
the computer what to do.
• Examples:
• Operating Systems (Windows 7/8/10, Android, iOS…)
• Web browsers (Opera, Firefox, Internet Explorer, Google
Chrome)
• Media players (like VLC)
• Microsoft Office Suite (Word, Excel, PowerPoint, …)
• WhatsApp, Instagram, Twitter, …
• Accounting Packages (quickbooks, Freshbooks, Xero…)
IT and ICT
 Computer software
IT and ICT
 Manage information or data
• Receive, store, manipulate (process), transmit
(transfer), protect and retrieve information or data.
Computer System
 Also known as Information System.
 Definition:
• Is a set of connected components used for collecting,
processing, storing and distributing information.
 Examples:
• Udom application system, udom sr, ….
Computer System
 Components of a computer system:
• Hardware
• Software
• Networks
• People
• Data
Computer System
 Components of a computer system:
• Hardware
• Computer hardware…
• Software
• Computer software…
• Networks
• A set of several computer devices connected together so as
to enable communication among them.
• People
• Users (students, instructors, …), IT department individuals
• Data
• Number of students, courses, instructors, ….
Computer System
Data
 Data are raw facts and figures that on their own
have no meaning.
• These can be any alphanumeric characters i.e. text,
numbers, symbols.
• Examples:
• Yes, Yes, No, Yes, No, Yes, No, Yes
• 42, 63, 96, 74, 56, 86
• 100, 150
• NOTE:
• None of the above data sets have any meaning until they are
given a CONTEXT and PROCESSED into a useable form.
Data Into Information
 To achieve its aims the organisation will need
to process data into information.
 Data needs to be turned into meaningful
information and presented in its most useful
format.
 Data must be processed in a context in order
to give it meaning.
Data Into Information
Information
 Is data that has been processed within a
context to give it meaning.

OR

 Is data that has been processed into a


form that gives it meaning.
Examples

Yes, Yes, No, Yes, No, Yes,


Raw Data No, Yes, No, Yes, Yes

Responses to the market


Context research question – “Would
you buy brand x at price y?”
Processing

Information ???
Examples

Raw Data 42, 63, 96, 74, 56, 86

Juma’s scores in the six


Context modules

Processing

Information ???
Example

100, 150
Raw Data

The previous and current


Context readings of a customer’s
gas meter
Processing

Information ???
Summary

Information = Data + Context + Meaning

Processing
Data – raw facts and figures.

Information – data that has been processed (in a context) to give it meaning.
Computer
 An electronic device that can be instructed to
accept, process, store, and present data and
information.
 Main parts of a computer:
• Computer hardware
• Monitor, Speaker, keyboard, mouse, …
• Computer Software
• Operating system, web browsers, media players,
accounting packages, …
Computer
 A general purpose computer has the
following hardware components:
• Central Processing Unit (CPU)
• Memory (fast, expensive, short-term memory)
• Mass storage device (slower, cheaper, long-term
memory)
• Input device
• Output device
Computer
 Central Processing Unit (CPU)
• Is the heart of the computer and executes the
instructions (software) which tell the computer what to
do.
• This component is also known as the brains of the computer.
 Memory (fast, expensive, short-term memory)
• Is the component that (temporarily) stores data,
software and intermediate results.
• This is sometimes referred to as RAM (Random Access
Memory)
Computer
 Mass storage device (slower, cheaper, long-
term memory)
• This is the component that allows a computer to
permanently store large amounts of data,
information and software.
• This includes hard drives or disks, USB-drive (flash
disks/drives),memory card, CD-ROM,…
Computer
 Input device
• This is a device used to enter data and instruction
to a computer.
• Examples: Keyboard, mouse,…
 Output device
• This is a devise used to send data and information
from a computer to another device.
OR
• This is device that allows someone to see what the
computer has accomplished.
• Examples: Monitor, printer, speaker, …
Computer
Types of Computers
 Types of computers (based on size and
capacity) – four types:
• Super computer
• Mainframe computers
• Minicomputers
• Microcomputers
Types of Computers
 Super computer
• Is the type of computer that has the highest
processing power of its time.
OR
• It is an extremely fast computer that can perform
hundreds of millions of instructions per second.
• NOTE:
• You will not need this for just accessing Facebook or
Instagram.
• It is usually used for a lot of complex tasks like weather
forecasting, quantum mechanics, modeling molecular
structures, ….
Types of Computers
 Mainframe computer
• Is a type of computer that is huge, with very high
processing power, but less than the supercomputer.

• They are used by organizations that need to store


and process large amounts of data and information.
• Used by big companies, government agencies and
banks.
 Minicomputers
• Is the type of computer that can support up to 200
users at the same time.
• It’s like a less powerful mainframe computer, and is
about the size of a refrigerator.
Types of Computers
 Microcomputers
• Is a type of computer that is widely used and the
fastest growing type of computer.
• It is the cheapest compared to the other three types
of computers.
• It is especially designed for general usage like
entertainment, education and work purposes.
• Well known manufacturers of Micro-computer are
Dell, HP, Acer, Apple, Samsung, Sony & Toshiba.
• Examples:
• Desktop computers, Gaming consoles, Sound &
Navigation system of a car, Netbooks, Notebooks, PDA’s,
Tablet PC’s, Smartphones, Calculators.
Functions of Information Technology
Functions of Information Technology
(Continued)
 Capture
• The process of compiling detailed records of activities.
• Entering the records into the computer or system.

 Processing
• Is the process of converting, analyzing, computing, and synthesizing all
forms of data or information.
• Examples of processing:
• Data Processing
• Information Processing
• Word Processing
• Image Processing
• Voice Processing
The Functions of Information Technology
(Continued)
 Generation
• Is the process of organizing information into a useful
form, whether as numbers, text, sound, or visual
image.
 Storage and Retrieval:
• Storage is the computer process of retaining
(keeping) information for future use.
• Retrieval is the process by which a computer locates
and copies stored data or information for further
processing or for transmission to another user.
The Functions of Information Technology
(Continued)

 Transmission
• Is the computer process of distributing information
over a communications network.
• Electronic Mail, or E-Mail
• Voice Messaging, or Voice Mail
Computer Memory Measurements
 Computers understands bits – 0’s and 1’s.
 A bit:
• Is the smallest unit of data in a computer.
• A bit has a single binary value, either 0 or 1.
Information (or computer) Security
 The terms below usually refer to more or less
the same concept:
• Information security
• IT security
• Computer Security
• Cyber security

 Meaning:
• Is the protection of data, information and computer
systems from harm, theft and unauthorized use.
Information (or computer) Security
 The main concepts:
• Confidentiality
• Integrity
• Availability
Information (or computer) Security
Information (or computer) Security
 Confidentiality
• Is the protection of data and information from
unauthorized disclosure.
OR
• Means only authorized users can access the data
resources and information.

• NOTE:
• A loss of confidentiality is the unauthorized disclosure of
data and information.
Information (or computer) Security
 Integrity
• Isthe protection against improper or unauthorized
modification or destruction of data or information.
OR
• Means only authorized users should be able to
modify the data or information when needed.

• NOTE:
•A loss of integrity is the unauthorized modification or
destruction of data or information.
Information (or computer) Security
 Availability:
• Means ensuring timely and reliable access (and
use) to data or information and computer systems.
OR
• Means data or information and computer system
should be timely available to users when needed.

• NOTE:
• A loss of availability is the disruption of timely access to
(or use of) data or information or computer system.
Information (or computer) Security
Computer Security Terminologies
 Adversary (threat agent)
• An entity (person or organization) that attacks or
compromises the security of data or information or
computer system of an individual or organization.

 Attack
• Is an action that compromises the security of data
or information or computer system of an individual
or organization.
Computer Security Terminologies
 Threat
• Is a possible danger that might exploit a
vulnerability.
 Vulnerability
• Is a flaw or weakness in a computer system that
could be exploited (used) to violate the computer
system’s security policy.
 Authenticity
• The property of being genuine and being able to be
verified and trusted.
• Verifying that users are who they say they are and that
each input arriving at the computer system came from a
trusted source
Computer Security Terminologies
 Security Policy
• A set of rules and practices that specify or
regulate how a computer system or organization
provides security services to protect sensitive
and critical computer system resources.
Computer Security Terminologies
 Countermeasure
• Is an action, device, procedure or technique that reduces,
eliminates or reports the possibility of data, information or
computer system being compromised.

 Risk
• An expectation of loss expressed as the probability that a
particular threat will exploit a particular vulnerability with a
particular harmful result.
Computer Security Terminologies
 System Resource (Asset)
• Is data or information contained in computer system.
OR
• Is a service provided by a computer system.
OR
• Is a component of a computer system, can be hardware or
software.
OR
• Is a facility that houses a computer system or systems and
its components.
Computer Security Terminologies
Security Attacks
Security Attacks
 Interruption
• This is an attack on availability.
 Interception
• This is an attack on confidentiality.
 Modification
• This is an attack on integrity.
 Fabrication
• This is an attack on authenticity.
Malware
 The term malware came from two words:
• Malicious
• Software
 Simply put: Malware = Malicious software

 Definition:
• Malware is a program or software (a set of instructions)
that has harmful or malicious intentions to data,
information or computer system of an individual or
organization.

 Malware can damage or destroy data,


information or computer system.
Malware
 Below are some types of malware:
• Virus
• Worm
• Trojan
• Spyware
• Adware
Malware
 Virus
• Is a type of malware that attaches itself to another
program or file and performs malicious actions when
that program is opened.
• It depends on one to open a file or program containing the
virus for it (virus) to work.
 Worm
• Is a type of malware that maliciously reproduces
itself and spreads from computer to computer.
• It does not need a host file, host program or external action
for it (worm) to work.
Malware
 Trojan
• Is a type of malware that presents itself as a very
useful software or file, but once downloaded, it
performs its malicious actions.
• It can be used to gain access to sensitive data and then
modify, block or delete the data.

 Spyware
• Is a type of malware that performs its malicious
actions secretly and reports back to a remote user.
• It is often used to steal financial or personal information.
Malware
 Adware
• Is a type of malware that is used to collect data on
your computer usage and provide appropriate
advertisements to you.
Malware
END

END

You might also like