IT 111: Introduction To Information Technology (IT)
IT 111: Introduction To Information Technology (IT)
NOTE:
• The two terminologies are sometimes used
interchangeably.
IT and ICT
Definition:
• Is the collection of computer hardware and software
that is used to manage information and data.
Main components:
• Computer hardware
• Computer hardware
• Manage information or data
IT and ICT
Computer hardware
• Refers to the physical (can be seen physically) parts of a
computer.
• Examples:
• Monitor, Keyboard, Mouse, Printer, Scanner, Memory card, ….
IT and ICT
Computer software
• Refers to a collection of instructions that is used to tell
the computer what to do.
• Examples:
• Operating Systems (Windows 7/8/10, Android, iOS…)
• Web browsers (Opera, Firefox, Internet Explorer, Google
Chrome)
• Media players (like VLC)
• Microsoft Office Suite (Word, Excel, PowerPoint, …)
• WhatsApp, Instagram, Twitter, …
• Accounting Packages (quickbooks, Freshbooks, Xero…)
IT and ICT
Computer software
IT and ICT
Manage information or data
• Receive, store, manipulate (process), transmit
(transfer), protect and retrieve information or data.
Computer System
Also known as Information System.
Definition:
• Is a set of connected components used for collecting,
processing, storing and distributing information.
Examples:
• Udom application system, udom sr, ….
Computer System
Components of a computer system:
• Hardware
• Software
• Networks
• People
• Data
Computer System
Components of a computer system:
• Hardware
• Computer hardware…
• Software
• Computer software…
• Networks
• A set of several computer devices connected together so as
to enable communication among them.
• People
• Users (students, instructors, …), IT department individuals
• Data
• Number of students, courses, instructors, ….
Computer System
Data
Data are raw facts and figures that on their own
have no meaning.
• These can be any alphanumeric characters i.e. text,
numbers, symbols.
• Examples:
• Yes, Yes, No, Yes, No, Yes, No, Yes
• 42, 63, 96, 74, 56, 86
• 100, 150
• NOTE:
• None of the above data sets have any meaning until they are
given a CONTEXT and PROCESSED into a useable form.
Data Into Information
To achieve its aims the organisation will need
to process data into information.
Data needs to be turned into meaningful
information and presented in its most useful
format.
Data must be processed in a context in order
to give it meaning.
Data Into Information
Information
Is data that has been processed within a
context to give it meaning.
OR
Information ???
Examples
Processing
Information ???
Example
100, 150
Raw Data
Information ???
Summary
Processing
Data – raw facts and figures.
Information – data that has been processed (in a context) to give it meaning.
Computer
An electronic device that can be instructed to
accept, process, store, and present data and
information.
Main parts of a computer:
• Computer hardware
• Monitor, Speaker, keyboard, mouse, …
• Computer Software
• Operating system, web browsers, media players,
accounting packages, …
Computer
A general purpose computer has the
following hardware components:
• Central Processing Unit (CPU)
• Memory (fast, expensive, short-term memory)
• Mass storage device (slower, cheaper, long-term
memory)
• Input device
• Output device
Computer
Central Processing Unit (CPU)
• Is the heart of the computer and executes the
instructions (software) which tell the computer what to
do.
• This component is also known as the brains of the computer.
Memory (fast, expensive, short-term memory)
• Is the component that (temporarily) stores data,
software and intermediate results.
• This is sometimes referred to as RAM (Random Access
Memory)
Computer
Mass storage device (slower, cheaper, long-
term memory)
• This is the component that allows a computer to
permanently store large amounts of data,
information and software.
• This includes hard drives or disks, USB-drive (flash
disks/drives),memory card, CD-ROM,…
Computer
Input device
• This is a device used to enter data and instruction
to a computer.
• Examples: Keyboard, mouse,…
Output device
• This is a devise used to send data and information
from a computer to another device.
OR
• This is device that allows someone to see what the
computer has accomplished.
• Examples: Monitor, printer, speaker, …
Computer
Types of Computers
Types of computers (based on size and
capacity) – four types:
• Super computer
• Mainframe computers
• Minicomputers
• Microcomputers
Types of Computers
Super computer
• Is the type of computer that has the highest
processing power of its time.
OR
• It is an extremely fast computer that can perform
hundreds of millions of instructions per second.
• NOTE:
• You will not need this for just accessing Facebook or
Instagram.
• It is usually used for a lot of complex tasks like weather
forecasting, quantum mechanics, modeling molecular
structures, ….
Types of Computers
Mainframe computer
• Is a type of computer that is huge, with very high
processing power, but less than the supercomputer.
Processing
• Is the process of converting, analyzing, computing, and synthesizing all
forms of data or information.
• Examples of processing:
• Data Processing
• Information Processing
• Word Processing
• Image Processing
• Voice Processing
The Functions of Information Technology
(Continued)
Generation
• Is the process of organizing information into a useful
form, whether as numbers, text, sound, or visual
image.
Storage and Retrieval:
• Storage is the computer process of retaining
(keeping) information for future use.
• Retrieval is the process by which a computer locates
and copies stored data or information for further
processing or for transmission to another user.
The Functions of Information Technology
(Continued)
Transmission
• Is the computer process of distributing information
over a communications network.
• Electronic Mail, or E-Mail
• Voice Messaging, or Voice Mail
Computer Memory Measurements
Computers understands bits – 0’s and 1’s.
A bit:
• Is the smallest unit of data in a computer.
• A bit has a single binary value, either 0 or 1.
Information (or computer) Security
The terms below usually refer to more or less
the same concept:
• Information security
• IT security
• Computer Security
• Cyber security
Meaning:
• Is the protection of data, information and computer
systems from harm, theft and unauthorized use.
Information (or computer) Security
The main concepts:
• Confidentiality
• Integrity
• Availability
Information (or computer) Security
Information (or computer) Security
Confidentiality
• Is the protection of data and information from
unauthorized disclosure.
OR
• Means only authorized users can access the data
resources and information.
• NOTE:
• A loss of confidentiality is the unauthorized disclosure of
data and information.
Information (or computer) Security
Integrity
• Isthe protection against improper or unauthorized
modification or destruction of data or information.
OR
• Means only authorized users should be able to
modify the data or information when needed.
• NOTE:
•A loss of integrity is the unauthorized modification or
destruction of data or information.
Information (or computer) Security
Availability:
• Means ensuring timely and reliable access (and
use) to data or information and computer systems.
OR
• Means data or information and computer system
should be timely available to users when needed.
• NOTE:
• A loss of availability is the disruption of timely access to
(or use of) data or information or computer system.
Information (or computer) Security
Computer Security Terminologies
Adversary (threat agent)
• An entity (person or organization) that attacks or
compromises the security of data or information or
computer system of an individual or organization.
Attack
• Is an action that compromises the security of data
or information or computer system of an individual
or organization.
Computer Security Terminologies
Threat
• Is a possible danger that might exploit a
vulnerability.
Vulnerability
• Is a flaw or weakness in a computer system that
could be exploited (used) to violate the computer
system’s security policy.
Authenticity
• The property of being genuine and being able to be
verified and trusted.
• Verifying that users are who they say they are and that
each input arriving at the computer system came from a
trusted source
Computer Security Terminologies
Security Policy
• A set of rules and practices that specify or
regulate how a computer system or organization
provides security services to protect sensitive
and critical computer system resources.
Computer Security Terminologies
Countermeasure
• Is an action, device, procedure or technique that reduces,
eliminates or reports the possibility of data, information or
computer system being compromised.
Risk
• An expectation of loss expressed as the probability that a
particular threat will exploit a particular vulnerability with a
particular harmful result.
Computer Security Terminologies
System Resource (Asset)
• Is data or information contained in computer system.
OR
• Is a service provided by a computer system.
OR
• Is a component of a computer system, can be hardware or
software.
OR
• Is a facility that houses a computer system or systems and
its components.
Computer Security Terminologies
Security Attacks
Security Attacks
Interruption
• This is an attack on availability.
Interception
• This is an attack on confidentiality.
Modification
• This is an attack on integrity.
Fabrication
• This is an attack on authenticity.
Malware
The term malware came from two words:
• Malicious
• Software
Simply put: Malware = Malicious software
Definition:
• Malware is a program or software (a set of instructions)
that has harmful or malicious intentions to data,
information or computer system of an individual or
organization.
Spyware
• Is a type of malware that performs its malicious
actions secretly and reports back to a remote user.
• It is often used to steal financial or personal information.
Malware
Adware
• Is a type of malware that is used to collect data on
your computer usage and provide appropriate
advertisements to you.
Malware
END
END