0% found this document useful (0 votes)
106 views127 pages

Merged

The document discusses the history and key components of information technology and computers. It covers topics like characteristics of computers, generations of computers from the first to modern, and components of information technology like hardware, software, networks and databases.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
106 views127 pages

Merged

The document discusses the history and key components of information technology and computers. It covers topics like characteristics of computers, generations of computers from the first to modern, and components of information technology like hardware, software, networks and databases.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 127

The University of Agriculture

Peshawar, Pakistan

Applications of Information and


Communication Technology(ICT)

Lecture 1
Mr. Noor Ul Arfeen

Institute of Computer Science and Information Technology (ICS/IT), Faculty of Management and Computer Sciences
Lecture Outline
 Introduction
 Characteristics of Computer
 History and Generations of Computer
 Computer System and its Components

Institute of Computer Science and Information Technology (ICS/IT), Faculty of Management and Computer Sciences 2
Information Technology ?
 Information Technology (IT) refers to the use, development, and management of technology and
systems for the storage, retrieval, transmission, and manipulation of data. It encompasses a broad
range of technologies, including computers, software, networks, databases, and electronic systems.
The primary goal of Information Technology is to facilitate the efficient and effective processing of
information in various forms.

 Information Technology plays a crucial role in modern society and is fundamental to the operations
of businesses, government agencies, educational institutions, and individuals. It has evolved
rapidly, contributing to advancements in various fields and influencing the way people
communicate, work, and access information.

Institute of Computer Science and Information Technology (ICS/IT), Faculty of Management and Computer Sciences 3
Key Component of Information Technology
• Hardware: This includes computers, servers, storage devices, and other physical equipment used
for data processing.
• Software: Refers to the programs, applications, and operating systems that enable the execution of
various tasks on hardware.
• Networks: Involves the communication infrastructure that enables the transfer of data between
devices and systems. This can include local area networks (LANs), wide area networks (WANs),
and the internet.
• Databases: Store and organize data in a structured manner, allowing for efficient retrieval and
manipulation. Database management systems (DBMS) are used to manage these databases.
• Cybersecurity: Involves measures to protect IT systems, networks, and data from unauthorized
access, attacks, and damage.
• Cloud Computing: Involves the delivery of computing services, including storage, processing
power, and software, over the internet.
• Information Systems: Refers to the combination of hardware, software, data, people, and
procedures that work together to process and manage information within an organization.

Institute of Computer Science and Information Technology (ICS/IT), Faculty of Management and Computer Sciences 4
Introduction
• Information:
• Knowledge obtain from investigation, study or instruction

• Communication:
• Process in which two or more computers or devices transfer data, instructions,
and information.

• Technology:
• The application of scientific knowledge to the practical aims of human life.

Institute of Computer Science and Information Technology (ICS/IT), Faculty of Management and Computer Sciences 5
Introduction (Conti..)
• Computer word derived from Latin language “Compute” which means to
calculate.
or
• Computer is a machine which takes Data (Input), Process it and make new
readable Information (Output).
or
• Computer is a machine or device that performs processes, calculations and
operation based on instruction provided by a software or hardware
programs.
or
• A computer is an electronic machine that can process data, store and retrieve
data and performs calculations faster and efficiently that human.

Institute of Computer Science and Information Technology (ICS/IT), Faculty of Management and Computer Sciences 6
How Computer Works ?
• Three main points of computer concept.

• Input
• Give data or instruction to computer
• Process
• Set of instructions stored in computer system
• Output
• Set of results after processing the inputs

Institute of Computer Science and Information Technology (ICS/IT), Faculty of Management and Computer Sciences 7
Characteristics of Computer
• There are some characteristics of
Computer
• Memory
• Automation
• Reliability
• Versatility
• Speed
• Accuracy
• diligence

Institute of Computer Science and Information Technology (ICS/IT), Faculty of Management and Computer Sciences 8
Characteristics of Computer (Conti..)
• Memory
o Built-in memory called primary memory
o Removable memory called secondary memory
• Automation
o Accomplished using program
o Complete a task with little human interaction
• Reliability
o A computer is reliable as it gives consistent result for similar set of data i.e., if we
give same set of input any number of times, we will get the same result.
• Versatility
o Versatility refers to the capability of a computer to perform different kinds of works
with same accuracy and efficiency.
o Able to adapt or be adapted to many different functions or activities.

Institute of Computer Science and Information Technology (ICS/IT), Faculty of Management and Computer Sciences 9
Characteristics of Computer (Conti..)
• Speed
o A computer works with much higher speed and accuracy compared to humans while
performing mathematical calculations. Computers can process millions (1,000,000)
of instructions per second. The time taken by computers for their operations is
microseconds and nanoseconds.

• Accuracy
o Computers perform calculations with 100% accuracy. Errors may occur due to data
inconsistency or inaccuracy.

• Diligence
o A computer can perform millions of tasks or calculations with the same consistency
and accuracy. It doesn’t feel any fatigue or lack of concentration. Its memory also
makes it superior to that of human beings.

Institute of Computer Science and Information Technology (ICS/IT), Faculty of Management and Computer Sciences 10
History of Computer
• The first use of computer was recorded in 1613.

• Tally Stick
• An ancient memory aid device to record and document number, quantities or
even message.

Institute of Computer Science and Information Technology (ICS/IT), Faculty of Management and Computer Sciences 11
History of Computer (Conti..)
• Napier’s Bones
o Invented by John Napier in 1614
o Allowed the operator to multiply, divide
o Calculate Square and Cube roots by moving the rods

Source: https://en.wikipedia.org/wiki/Napier%27s_bones
Institute of Computer Science and Information Technology (ICS/IT), Faculty of Management and Computer Sciences 12
History of Computer (Conti..)
• Slide Rule
o Invented by William oughtred in 1622
o Based on Napier’s idea
o Used for Multiplication, division, roots, logarithm and trigonometry
o Not normally used for addition and subtraction

Source: https://en.wikipedia.org/wiki/Slide_rule#/media/File:Sliderule.PickettN902T.agr.jpg
Institute of Computer Science and Information Technology (ICS/IT), Faculty of Management and Computer Sciences 13
History of Computer (Conti..)
• Pascale
o Invented by Blaise Pascal in 1642
o It was its limitation for addition and subtraction
o It was too expensive

Source: https://en.wikipedia.org/wiki/Pascal%27s_calculator#/media/File:Pascaline-CnAM_823-1-IMG_1506-black.jpg

Institute of Computer Science and Information Technology (ICS/IT), Faculty of Management and Computer Sciences 14
History of Computer (Conti..)
• Stepped Rockoner
o Invented by Gottfried Wilhelm Leibniz in 1672
o It can Add, Subtract, Multiply and Divide numbers automatically

Source: https://en.wikipedia.org/wiki/Stepped_reckoner#/media/File:Leibnitzrechenmaschine.jpg

Institute of Computer Science and Information Technology (ICS/IT), Faculty of Management and Computer Sciences 15
History of Computer (Conti..)
• Abacus
o Invented in Babylonia in 2400 B. C.
o Performs basic arithmetic operations

Source: https://en.wikipedia.org/wiki/Abacus#/media/File:Abacus_(PSF).png

Institute of Computer Science and Information Technology (ICS/IT), Faculty of Management and Computer Sciences 16
History of Computer (Conti..)
• First Computer Program
• The first computer program was written by Augusta Ada Byron in 1840

Institute of Computer Science and Information Technology (ICS/IT), Faculty of Management and Computer Sciences 17
Generations of Computer
• First generation (1940-1956)
o The first-generation computer had the following features and components

• Hardware
o The Hardware used in first generation computer was Vacuum Tube and Punch Card

• Feature
o It support machine language
o It had slow performance
o It occupied large space/size due to the use of vacuum tube
o It had a poor storage capacity
o It consumed a lot of electricity and generated a lot of Heat

Institute of Computer Science and Information Technology (ICS/IT), Faculty of Management and Computer Sciences 18
Generations of Computer (Conti..)
• Memory
o The memory was 4000 bits

• Data Input
o The input was only provided through hard-wired programs in the computer, mostly
through punched cards and paper tapes.

• Example
o ENIC (Electronic Numeric Integrator and Calculator)
o UNIVAC (Universal Automatic Computer 1)

Institute of Computer Science and Information Technology (ICS/IT), Faculty of Management and Computer Sciences 19
Generations of Computer (Conti..)
• Second generation (1956-1963)
• Several advancements in the first-gen computers led to the development of second-
generation computers. Following are various changes in features and components of
second-generation computers

• Hardware
• The Hardware used in Second generation computer was Transistor and Magnetic
Tap

• Feature
• Batch Operating System (A Batch Operating System (BOS) is a computer system that allows
multiple users to use it, without direct communication between them. It achieves this by keeping all users
in separate 'batches', meaning they can't interact with each other directly)
• Faster and Smaller in size
• Reliable and energy efficient than the previous generation
• Less costly than the previous generation

Institute of Computer Science and Information Technology (ICS/IT), Faculty of Management and Computer Sciences 20
Generations of Computer (Conti..)
• Memory
o The capacity of the memory was 32,000 bits

• Data Input
o The input was provided by Punch Card

• Example
o Honeywell 400
o CDC 1604 (Control Data Corporation)
o IBM 7030 (International Business Machine)

Institute of Computer Science and Information Technology (ICS/IT), Faculty of Management and Computer Sciences 21
Generations of Computer (Conti..)
• Third generation (1964-1971)
o Following are the various components and features of the third-generation computers

• Hardware
• The hardware used in the third generation of computers are
o Integrated Circuits made from semi-conductor materials
o Large capacity disks and magnetic tapes

• Feature
o Supports time-sharing OS (A time-sharing operating system is an operating system design that
allows multiple users or processes to concurrently share the same system resources, such as the CPU,
memory, and peripherals.)
o Faster, smaller, more reliable and cheaper than the previous generations
o Easy to access

Institute of Computer Science and Information Technology (ICS/IT), Faculty of Management and Computer Sciences 22
Generations of Computer (Conti..)
• Memory
o The capacity of the memory was 128,000 bits

• Data Input
o The input was provided through keyboards and monitors

• Example
o CDC 6600 (Control Data Corporation)
o IBM 360/370 (International Business Machine)
o PDP 8/11 (Programmed Data Processor)

Institute of Computer Science and Information Technology (ICS/IT), Faculty of Management and Computer Sciences 23
Generations of Computer (Conti..)
• Fourth generation (1972-2010)
• Following are the various components and features of the fourth-generation
computers
• Hardware
• The hardware used in the Fourth generation of computers are
• ICs with Very Large-Scale Integration (VLSI) technology
• Semiconductor memory
• Magnetic tapes and Floppy
• Feature
• Multiprocessing & distributed OS
• Object-oriented high-level programs supported
• Small & easy to use; hand-held computers have evolved
• No external cooling required & affordable
• This generation saw the development of networks and the internet
• It saw the development of new trends in GUIs and mouse

Institute of Computer Science and Information Technology (ICS/IT), Faculty of Management and Computer Sciences 24
Generations of Computer (Conti..)
• Memory
o The capacity of the memory was 100 million bits

• Data Input
o The input was provided through improved handheld devices, keyboard and mouse.

• Example
o Apple II
o VAX 9000 (Virtual Address eXtension)
o CRAY 1 (super computers)

Institute of Computer Science and Information Technology (ICS/IT), Faculty of Management and Computer Sciences 25
Generations of Computer (Conti..)
• Fifth generation (2010-Present)
o These are the modern and advanced computers. Significant changes in the
components and operations have made fifth generation computers handy and more
reliable than the previous generations.

• Hardware
• The hardware used in the Fourth generation of computers are
o Integrated Circuits with VLSI (Very-Large Scale Integration) and Nano
technology
o Large capacity hard disk with RAID (Redundant Array of Inexpensive Disks)
support
o Powerful servers, Internet, Cluster computing

Institute of Computer Science and Information Technology (ICS/IT), Faculty of Management and Computer Sciences 26
Generations of Computer (Conti..)
• Feature
o Powerful, cheap, reliable and easy to use.
o Portable and faster due to use of parallel processors and Super Large Scale Integrated
Circuits.
o Rapid software development is possible.

• Memory
o The capacity of the memory is Unlimited

• Data Input
o The input is provided through CDROM, Optical Disk and other touch and voice
sensitive input devices.
• Example
o IBM (International Business Machine)
o Pentium
o PARAM (PARAllel Machine)

Institute of Computer Science and Information Technology (ICS/IT), Faculty of Management and Computer Sciences 27
Components of Computer System
• There are Two main component parts of Computer
1. Hardware
2. Software

• Hardware:
o Physical parts of Computer system. Which we can see, and touch is called hardware.
i.e., Keyboard, Mouse, Monitor, Printer

• Software:
o Logical parts of computer system. Which we can see but can’t touch.

Institute of Computer Science and Information Technology (ICS/IT), Faculty of Management and Computer Sciences 28
Advantage of Computer
• Fast medium communication with compared to postal or telegraphs communication.

• Send any type of message or anything in written or photograph to any part of the world
through internet facility.

• Download any type of material from the internet.

• Arithmetic problems can be easily sorted out through computer.

• A video conference a users can’t only see each other, but they can talk to each other
anywhere in the world.

Institute of Computer Science and Information Technology (ICS/IT), Faculty of Management and Computer Sciences 29
Disadvantage of Computer
• Computer can’t think and they can’t do any job unless they are first programmed with
specific instructions human being are design algorithms/programs for computer to
perform a specific task.

• Computer can’t decide. Computer is incapable of decision making as they do not possess
the essential elements necessary to take a decision I: e Knowledge, Information,
Intelligence and the ability to judge.

• Computer can’t express their ideas. Computer can’t express or explain any types of idea
with human beings unless they are not programming it.

• Computer can’t implement. Though/even computers are helpful in storage of data and can
contain the contents of encyclopedia, but they can’t implement any policies anywhere
without human beings.

Institute of Computer Science and Information Technology (ICS/IT), Faculty of Management and Computer Sciences 30
Recommended Book
• Rahman Ali and Asmat Ali (2021). Introduction to Computers and ICT (2nd Edition).
Peshawar, Pakistan : Al-ilum Publication.

Institute of Computer Science and Information Technology (ICS/IT), Faculty of Management and Computer Sciences 31
The University of Agriculture
Peshawar, Pakistan

Applications of Information and


Communication Technology(ICT)

Lecture 2
Mr. Noor Ul Arfeen

Institute of Computer Science and Information Technology (ICS/IT), Faculty of Management and Computer Sciences
Lecture Outline
 Types of Computer
 Uses of Computers in society
 Basic Computer System Architecture
 Computer Memory
 Primary Storage
 Secondary Storage
 System Software
 Application Software

Institute of Computer Science and Information Technology (ICS/IT), Faculty of Management and Computer Sciences 2
Types of Computer
• Since the invent of the first computer, there are different computers in size and
processing

• There are some major types of Computer


1. Supper computer
2. Mainframe computer
3. Mini computer
4. Micro computer

Institute of Computer Science and Information Technology (ICS/IT), Faculty of Management and Computer Sciences 3
Types of Computer (Conti.)
 Super Computer
• The most power full computer
• Handle large and complex problems/calculations
• Process trillion of operation per second
• Found in research organization

Institute of Computer Science and Information Technology (ICS/IT), Faculty of Management and Computer Sciences 4
Types of Computer (Conti.)
• Super-computer are the most powerful in terms of the performance and data
processing. These are specialized and task specific. Computer used by large
organizations. These computers are used for research and exploration purpose, like
NASA (National Aeronautics and Space Administration) uses super computers for
launching space shuttles, controlling them and for space exploration purposes.
Super-computer are very expensive and very large in size. It can be
accommodated in large air-conditioned rooms and some super computers are
spanning an entire building. Presently China’s “Tianhe 2” is the world faster
super-computer. It can perform 100 pita flops i:e Quadrillions of floating-point
operations per second. Super-computer mostly use for space exploration,
earthquake studies weather frosting and
nuclear weapon testing.

Institute of Computer Science and Information Technology (ICS/IT), Faculty of Management and Computer Sciences 5
Types of Computer (Conti.)
Mainframe Computer
• Designed for huge volume of data
• Used for large organization
• Handle thousand of users
• Users access through a terminal

Institute of Computer Science and Information Technology (ICS/IT), Faculty of Management and Computer Sciences 6
Types of Computer (Conti.)
• MAINFRAME COMPUTER: Main frame are not as powerful as super-
computer but certainly they are quite expensive and many large firms and GOVT
ORG uses main frame to run their business operations. Main frame can also be
accommodated in large air-conditioned rooms because of its size, Main frame are
not fastest in term of data processing and storage capacity as super-computer.
However, it can also process and store large amount of data. Mainframe mostly
uses in banks, educational institutions and insurance companies to store data about
customers, students and insurance policy Holders.

Institute of Computer Science and Information Technology (ICS/IT), Faculty of Management and Computer Sciences 7
Types of Computer (Conti.)
Mini computer
• Also known is mid range computer
• Used for small business
• Not too much faster as compared to super-computer

Institute of Computer Science and Information Technology (ICS/IT), Faculty of Management and Computer Sciences 8
Types of Computer (Conti.)
• MINI COMPUTERS: Minicomputer is used by small business and firm’s
microcomputer is also called “MID RANGE COMPUTER”. These are small
machines and can be accommodated on a disk mini-computers are not faster in
processing and data storage as compared to super-computer and main frame
computer. Minicomputer is not designed for a single user minicomputer can be
used by companies and organization for specific purposes.

Institute of Computer Science and Information Technology (ICS/IT), Faculty of Management and Computer Sciences 9
Types of Computer (Conti.)
Micro Computer
• Also known is individual computer
• Desktop computer
• Cell phone
• Personal digital assistant (PDA)
• Tablets

Institute of Computer Science and Information Technology (ICS/IT), Faculty of Management and Computer Sciences 10
Types of Computer (Conti.)
• Micro computer are widely used and fastest growing computers. These computers
are the cheapest as compared to other three types of computers. Micro computers
are specially designed for general usage like entertainment, education and work
purposes. Micro computer can also be called a personal computer (PC). Because it
be used by a single uses.

Institute of Computer Science and Information Technology (ICS/IT), Faculty of Management and Computer Sciences 11
Uses of Computers
Computer in Home
• Many homes have multiple computers
• Many Pakistanis homes have internet
• Computer are used for:
• Online shopping
• Entertainment
• Communication
• Learning

Computers in small business


• Makes business more profitable
• Allows owner to manage

Institute of Computer Science and Information Technology (ICS/IT), Faculty of Management and Computer Sciences 12
Uses of Computer (Conti.)
Computers in Technology
• Advancement in any technological field without computer is unthinkable
• All technology is dependent on computer
• Applications areas
• Energy monitoring
• Construction
• Agriculture
• Automobile
• Textile
• Transport

Institute of Computer Science and Information Technology (ICS/IT), Faculty of Management and Computer Sciences 13
Uses of Computer (Conti.)
Computer in Business
• A computer has high speed of calculation, accuracy, reliability or versatility, which
has made it an integrated form in all business organization.
• Uses of computer in business
• Payroll calculations
• Budgeting
• Sales analysis
• Financial forecasting
• Managing employee database
• Maintenance of stock

Institute of Computer Science and Information Technology (ICS/IT), Faculty of Management and Computer Sciences 14
Uses of Computer (Conti.)
Computer in Banking
• Now-a-days banking is almost totally dependent on computer banking provide the
following facilities through computer was
• Online accounting facilities which include checking current account balance,
Making deposit and overdrafts, Checking interest charges, shares and trust
records.
• ATM machine which are completely automatic are making easier for customers to
deal with bank.

Institute of Computer Science and Information Technology (ICS/IT), Faculty of Management and Computer Sciences 15
Uses of Computer (Conti.)
Computer in Health Care
• Computer has become an important part in hospitals, Labs, and dispensaries they are
being used in hospitals to keep the record of patients and medicines. It is also used in
scanning and diagnosing different diseases ECG, EEG, ULTRASOUND, CT SCAN
etc. are also done by computerized machines
• New treatments possible
• Scheduling of patient is improved
• Delivery of medicine is safer
• X-Ray, CT Scan etc. machine is running with the help of computer
• E-Healthcare, relationship between healthcare organization (Hospitals) and patient
• Application of internet and related technology
• Improve access, efficiency, effectiveness, quality of health process

Institute of Computer Science and Information Technology (ICS/IT), Faculty of Management and Computer Sciences 16
Uses of Computer (Conti.)
Military
• Computers are largely used in defense modern tasks, Missiles weapons etc. Some of
the military area where computer has been use is.
• Missile control
• Military communication
• Military operation and planning
• Smart weapon

Institute of Computer Science and Information Technology (ICS/IT), Faculty of Management and Computer Sciences 17
Computer Architecture
• Computer is basically a machine that simplifies complicated task
• should maximize performance and reduce costs as well as power consumption
• different components in the Computer System Architecture are Input Unit, Output
Unit, Storage Unit, Arithmetic Logic Unit, Control Unit etc.

Source: https://en.wikipedia.org/wiki/Von_Neumann_architecture#/media/File:Von_Neumann_Architecture.svg
Institute of Computer Science and Information Technology (ICS/IT), Faculty of Management and Computer Sciences 18
Computer Architecture (Conti.)
• Input Unit: The input unit provides data to the computer system from the outside.
So, basically it links the external environment with the computer. It takes data
from the input devices, converts it into machine language and then loads it into the
computer system. Keyboard, mouse etc. are the most used input devices.

• Control Unit: This unit controls all the other units of the computer system and so
is known as its central nervous system. It transfers data throughout the computer
as required including from storage unit to central processing unit and vice versa.
The control unit also dictates how the memory, input output devices, arithmetic
logic unit etc. should behave.

Institute of Computer Science and Information Technology (ICS/IT), Faculty of Management and Computer Sciences 19
Computer Architecture (Conti.)
• Arithmetic Logic Unit: All the calculations related to the computer system are
performed by the arithmetic logic unit. It can perform operations like addition,
subtraction, multiplication, division etc. The control unit transfers data from
storage unit to arithmetic logic unit when calculations need to be performed. The
arithmetic logic unit and the control unit together form the central processing unit.

• Storage Unit: Storage unit contains many computer components that are used to
store data. It is traditionally divided into primary storage and secondary storage.
Primary storage is also known as the main memory and is the memory directly
accessible by the CPU. Secondary or external storage is not directly accessible by
the CPU. The data from secondary storage needs to be brought into the primary
storage before the CPU can use it. Secondary storage contains a large amount of
data permanently.

Institute of Computer Science and Information Technology (ICS/IT), Faculty of Management and Computer Sciences 20
Computer Architecture (Conti.)
• Output Unit: The output unit provides the results of computer process to the users
i.e.; it links the computer with the external environment. Most of the output data is
the form of audio or video. The different output devices are monitors, printers,
speakers, headphones etc.

Institute of Computer Science and Information Technology (ICS/IT), Faculty of Management and Computer Sciences 21
Memory
• Memory is the most essential part of the computer system.
• Computer memory is a storage device / place which is used for Data /
Information Storage.
• Memory is used for both the instruction to be executed and data.
• The CPU access each location in the memory by using the unique
number, called Memory Address.

Institute of Computer Science and Information Technology (ICS/IT), Faculty of Management and Computer Sciences 22
Types of Memory
Primary Memory:
• Primary storage is also known as the main memory and is the memory directly
accessible by the CPU. Some primary storage devices are…
• Directly Communicate with CPU.

RAM (Random Access Memory)


• RAM is random access memory. It is volatile i.e., the data in RAM is lost when the
power is switched off. RAM is the major form of primary memory as it is quite fast.
However, it is also quite expensive.
• SRAM: Stands for Static Random Access Memory.
• Data remains in SRAM as long as there is power supply.

• DRAM: stands for Dynamic Random Access Memory.


• data can be stored in the DRAM only when it is refreshed frequently.

Institute of Computer Science and Information Technology (ICS/IT), Faculty of Management and Computer Sciences 23
Types of Memory (Conti..)
ROM (Read Only Memory)
• ROM is read only memory. This memory cannot be changed, it can only be read as
required. Since ROM is unchangeable memory, it is used by data and programs that
are frequently required and seldom changed, like the system boot program.

• PROM: Programmable Read only memory.


o It can be modified once by use.
o It can be programmed only once and is not erasable.

• EPROM: Erasable Programmable Read Only Memory.


o It can be erased and reprogramed many times.
o Data can be erased with the help of Ultra Violet rays.
o Normally uses in Micro-controller.

• EEPROM: Electrically Erasable Programmable Read Only Memory.


o It can programed and erased electrically.
o Normally uses in BIOS system.

Institute of Computer Science and Information Technology (ICS/IT), Faculty of Management and Computer Sciences 24
Types of Memory (Conti..)
Cache Memory:
• Cache is used to store data and instructions that are frequently required by the CPU,
so it doesn't have to search them in the main memory. This is a small memory that is
also very fast.
• This temporary storage area, known as a cache, is more readily available to the
processor than the computer's main memory source. It is also called CPU
memory because it is typically integrated directly into the CPU chip or placed on a
separate chip with a bus interconnect with the CPU.

Institute of Computer Science and Information Technology (ICS/IT), Faculty of Management and Computer Sciences 25
Types of Memory (Conti..)
Cache Memory (Conti..):
o Cache memory is a high speed memory, which is small in size.
o It acts like buffer between CPU and the main memory.
o It holds the data and programs which are frequently used by the CPU.
o There are three level of cache memory.

 Level 1 (L2).
o Memory is presented inside the CPU.
o It can work as the same speed as of the CPU.
o Each core of CPU have its own L1 cache.
 Level 2 (L2).
o It can be present inside or outside the CPU and slower than L1 cache.
o Each core of CPU can have its own L2 cache or they can share single L2 cache.
 Level 3 (L3).
o It is located outside the CPU, and slower than L1 & L2.
o It is share by all the core of a CPU.

Institute of Computer Science and Information Technology (ICS/IT), Faculty of Management and Computer Sciences 26
Types of Memory (Conti..)
Computer Registers
• Registers are a type of computer memory used to quickly accept, store, and transfer data and
instructions that are being used immediately by the CPU. The registers used by the CPU are
often termed as Processor registers.
• A processor register may hold an instruction, a storage address, or any data (such as bit
sequence or individual characters).
• The computer needs processor registers for manipulating data and a register for holding a
memory address. The register holding the memory location is used to calculate the address of
the next instruction after the execution of the current instruction is completed.

Institute of Computer Science and Information Technology (ICS/IT), Faculty of Management and Computer Sciences 27
Types of Memory (Conti..)
Register Symbol Number of bits Function
Data register DR 16 Holds memory operand

Address register AR 12 Holds address for the


memory
Accumulator AC 16 Processor register
Instruction register IR 16 Holds instruction code

Program counter PC 12 Holds address of the


instruction
Temporary register TR 16 Holds temporary data
Input register INPR 8 Carries input character

Output register OUTR 8 Carries output character

Institute of Computer Science and Information Technology (ICS/IT), Faculty of Management and Computer Sciences 28
Types of Memory (Conti..)
• The Data Register (DR) contains 16 bits which hold the operand read from the memory
location.
• The Memory Address Register (MAR) contains 12 bits which hold the address for the
memory location.
• The Program Counter (PC) also contains 12 bits which hold the address of the next
instruction to be read from memory after the current instruction is executed.
• The Accumulator (AC) register is a general purpose processing register.
• The instruction read from memory is placed in the Instruction register (IR).
• The Temporary Register (TR) is used for holding the temporary data during the
processing.
• The Input Registers (IR) holds the input characters given by the user.
• The Output Registers (OR) holds the output after processing the input data.

Source: https://www.javatpoint.com/computer-registers
Institute of Computer Science and Information Technology (ICS/IT), Faculty of Management and Computer Sciences 29
Types of Memory (Conti..)
Secondary Memory:
• Secondary or external storage is not directly accessible by the CPU. The data from
secondary storage needs to be brought into the primary storage before the CPU can
use it. Secondary storage contains a large amount of data permanently. The different
types of secondary storage devices are….

Hard Disk:
• Hard disks are the most famously used secondary storage devices. They are round,
flat pieces of metal covered with magnetic oxide. They are available in many sizes
ranging from 1 to 14-inch diameter.

Institute of Computer Science and Information Technology (ICS/IT), Faculty of Management and Computer Sciences 30
Types of Memory (Conti..)
• Floppy Disk:
• They are flexible plastic discs which can bend, coated with magnetic oxide and are
covered with a plastic cover to provide protection. Floppy disks are also known as
floppies and diskettes.

Institute of Computer Science and Information Technology (ICS/IT), Faculty of Management and Computer Sciences 31
Types of Memory (Conti..)
Memory Card:
• This has similar functionality to a flash drive but is in a card shape. It can easily plug
into a port and removed after its work is done.

Flash Drive:
• This is also known as a pen drive. It helps in easy transportation of data from one
system to another. A pen drive is quite compact and comes with various features and
designs.

SSD (Solid State Drive):


• A storage device containing non-volatile flash memory, used in place of a hard disk
because of its much greater speed

Institute of Computer Science and Information Technology (ICS/IT), Faculty of Management and Computer Sciences 32
Software
Software refers to a set of instructions, programs, or data that enables a computer
or other hardware to perform specific tasks. It is a broad term that encompasses
everything that is not hardware. that is, the physical components of a computer
system. Software is intangible and consists of code, scripts, algorithms, and data
that instruct the computer on how to perform various operations.

Institute of Computer Science and Information Technology (ICS/IT), Faculty of Management and Computer Sciences 33
Types of Software
System Software
• It is general-purpose software.
• System Software maintains the system resources and gives the path for application
software to run.
• Low-level languages are used to write the system software.
• System Software programming is more complex than application software
• Without system software, the system stops and can’t run.

Operating Systems (OS): Controls and manages hardware resources, providing a user
interface and facilitating communication between software and hardware. Examples
include Windows, mac OS, Linux, and Android.

Device Drivers: Enable communication between the operating system and hardware
devices like printers, graphics cards, and input devices.

Utilities: Tools that perform specific tasks related to system management, maintenance,
and optimization.
Institute of Computer Science and Information Technology (ICS/IT), Faculty of Management and Computer Sciences 34
Types of Software (Conti..)
Application Software
• it’s a specific purpose software.
• Application software is built for specific tasks.
• high-level languages are used to write the application software.
• Application software programming is simpler in comparison to system software.

 Types of Software Based on Distribution and Licensing:


• Proprietary Software:
• Developed and distributed by a company, and users typically need to purchase a license.
• Examples include Microsoft Office, Adobe Creative Cloud, and many commercial
applications.
• Open-Source Software:
• Developed collaboratively, and the source code is freely available for users to view, modify,
and distribute.
• Examples include the Linux operating system, the Apache web server, and the Firefox web
browser.
Institute of Computer Science and Information Technology (ICS/IT), Faculty of Management and Computer Sciences 35
Types of Software (Conti..)
• Productivity Software: Tools that help users create, edit, and manage documents, spreadsheets,
presentations, and databases. Examples include Microsoft Office, Google Workspace, and LibreOffice.
• Web Browsers: Software for accessing and interacting with content on the internet, such as Chrome,
Firefox, Safari, and Edge.
• Media Players: Applications for playing audio and video files, like VLC Media Player, iTunes, and
Windows Media Player.
• Graphics Software: Programs for creating and editing visual content, including Adobe Photoshop,
Illustrator, and Corel DRAW.
• Development Tools: Software used by developers to create applications, websites, and software
solutions. Examples include Integrated Development Environments (IDEs) like Visual Studio, Eclipse,
and X code.
• Gaming Software: Video games and related applications that entertain users and often involve
interactive experiences.
• Communication Software: Tools for communication, such as email clients (Outlook, Thunderbird),
instant messaging apps (WhatsApp, Slack), and video conferencing platforms (Zoom, Microsoft
Teams).

Institute of Computer Science and Information Technology (ICS/IT), Faculty of Management and Computer Sciences 36
Comparison Chart of Sys. And App. Software

Institute of Computer Science and Information Technology (ICS/IT), Faculty of Management and Computer Sciences 37
Comparison Chart of Sys. And App. Software (Conti..)

Institute of Computer Science and Information Technology (ICS/IT), Faculty of Management and Computer Sciences 38
Note for the Students
• Note: Dear Students you can Download Books/Lectures and other
helping material form the given link.

• Link: https://cslearnerr.com/applications-of-information-and-
communication-technologyict/

Institute of Computer Science and Information Technology (ICS/IT), Faculty of Management and Computer Sciences 39
The University of Agriculture
Peshawar, Pakistan

Applications of Information and


Communication Technology(ICT)

Lecture 3
Mr. Noor Ul Arfeen

Institute of Computer Science and Information Technology (ICS/IT), Faculty of Management and Computer Sciences
Lecture Outline
 Data
 RAID
 Office automation system
 Transmission processing system
 Management information system
 Accounting information system

Institute of Computer Science and Information Technology (ICS/IT), Faculty of Management and Computer Sciences 2
Data
 Introduction to Data: Data is a value or set of values.
OR
Data are facts that concern with people, person, place, event,
objects etc.
 Data Item: A single unit of value in data is called data item e.g. Name, Address,
Roll No. etc.
 Group data item: The data Item divided into sub item is called group data item.
E.g.: name is divided into sub First Name, Middle Name, Last Name so the name
is a group data item.

Institute of Computer Science and Information Technology (ICS/IT), Faculty of Management and Computer Sciences 3
Data (Conti.)
 Elementary Data Item:
• The data item that are not divided into sub items are called Elementary Data
Item. E.g. Roll number which are not sub divided, so, roll number is an
elementary item.

Institute of Computer Science and Information Technology (ICS/IT), Faculty of Management and Computer Sciences 4
RAID (Redundant Array of Independent Disks)
Definition of RAID: RAID stands for Redundant Array of Independent Disks.
Purpose: Enhance data storage performance, reliability, and capacity.
Origin: Developed by David Patterson, Garth A. Gibson, and Randy Katz at the University of
California, Berkeley in 1987.

A method of mirroring or striping data on clusters of low-end disk drives; data is


copied onto multiple drives for faster throughput, error correction, fault tolerance
and improved mean time between failures.

Institute of Computer Science and Information Technology (ICS/IT), Faculty of Management and Computer Sciences 5
RAID (Conti.)
RAID 0 (Striping)
 Distributing data across multiple disks for improved performance.
 No redundancy; if one disk fails, data is lost.
 Commonly used for high-performance applications like video editing.

RAID 1 (Mirroring)
 Data is duplicated on two or more disks.
 Provides fault tolerance; if one disk fails, data remains accessible.
 Slower write performance compared to RAID 0 but faster read performance.

Institute of Computer Science and Information Technology (ICS/IT), Faculty of Management and Computer Sciences 6
Office Automation System
Overview:
• Definition: Integration of computer hardware and software to facilitate routine
office tasks and streamline workflow.
• Aims to enhance productivity, collaboration, and communication within an
organization.

Key Components:
• Word Processing: Creation and editing of documents.
• Spreadsheet Software: Numerical data analysis and manipulation.
• Communication Tools: Email, calendars, and messaging applications.
• Database Management: Storage and retrieval of structured data.

Institute of Computer Science and Information Technology (ICS/IT), Faculty of Management and Computer Sciences 7
Office Automation System (Conti.)
Advantages:
• Streamlined document creation and collaboration.
• Enhanced communication and information sharing.
• Increased efficiency in routine office tasks.

 Applications:
• Document creation and collaboration.
• Email and calendar management.
• Data analysis and reporting.

Institute of Computer Science and Information Technology (ICS/IT), Faculty of Management and Computer Sciences 8
Transaction Processing System
Overview:
• Foundation for operational processes, capturing and processing day-to-day
transactions in real-time.
• Crucial for maintaining data integrity and ensuring reliable business
operations.
 Key Characteristics:
• High Volume: Handles a large number of transactions efficiently.
• Reliability: Ensures accuracy and consistency in transaction processing.
• Speed: Processes transactions in real-time.

Institute of Computer Science and Information Technology (ICS/IT), Faculty of Management and Computer Sciences 9
Transaction Processing System (Conti.)
 Examples:
• Point of Sale (POS) systems.
• Online banking transactions.
• Inventory management systems.
Applications:
• Retail sales and transactions.
• Financial transactions.
• Inventory and supply chain management.

Institute of Computer Science and Information Technology (ICS/IT), Faculty of Management and Computer Sciences 10
Management Information System
• Overview:
• Focuses on providing information to support managerial decision-making.
• Integrates data from various sources into comprehensive reports and
dashboards.
• Key Components:
• Data Collection: Gathers data from different departments and sources.
• Data Processing: Analyzes and transforms raw data into meaningful
information.
• Information Delivery: Presents information to support strategic decision-
making.

Institute of Computer Science and Information Technology (ICS/IT), Faculty of Management and Computer Sciences 11
Management Information System (Conti. )
Advantages:
• Improved decision-making at various organizational levels.
• Enhanced efficiency through streamlined information flow.
• Better strategic planning and resource allocation.
Applications:
• Financial reporting and analysis.
• Sales and marketing analysis.
• Human resources planning and performance management.

Institute of Computer Science and Information Technology (ICS/IT), Faculty of Management and Computer Sciences 12
Accounting Information System
Overview:
• Focuses on collecting, storing, processing, and reporting financial
information.
• Integrates accounting principles with technology to support financial
management.
 Key Functions:
• General Ledger: Central repository for financial data.
• Accounts Payable/Receivable: Tracks money owed and money due.
• Financial Reporting: Generates financial statements for decision-making.

Institute of Computer Science and Information Technology (ICS/IT), Faculty of Management and Computer Sciences 13
Accounting Information System (Conti.)
Advantages:
• Improved accuracy and efficiency in financial transactions.
• Enhanced financial reporting and compliance.
• Facilitates audit and control processes.
Applications:
• Financial statement preparation.
• Budgeting and forecasting.
• Auditing and compliance.

Institute of Computer Science and Information Technology (ICS/IT), Faculty of Management and Computer Sciences 14
Conclusion

• In conclusion, the integration and effective utilization of Office Automation,


Transaction Processing, Management Information, and Accounting Information
Systems are pivotal for the success of modern businesses. Understanding the
nuances of each system and their integration can empower organizations to make
informed decisions, streamline operations, and maintain a competitive edge in
today's dynamic business environment.

Institute of Computer Science and Information Technology (ICS/IT), Faculty of Management and Computer Sciences 15
Note for the Students
• Note: Dear Students you can Download Books/Lectures and other
helping material form the given link.

• Link: https://cslearnerr.com/applications-of-information-and-
communication-technologyict/

Institute of Computer Science and Information Technology (ICS/IT), Faculty of Management and Computer Sciences 16
The University of Agriculture
Peshawar, Pakistan

Applications of Information and


Communication Technology(ICT)

Lecture 4
Mr. Noor Ul Arfeen

Institute of Computer Science and Information Technology (ICS/IT), Faculty of Management and Computer Sciences
Lecture Outline
 Data Communication
 Components of data communication
 Communication Protocol
 Data Transmission
 Satellite and Mobile Communication
 Data Communication types

Institute of Computer Science and Information Technology (ICS/IT), Faculty of Management and Computer Sciences 2
Data Communication
 The term telecommunication means communication at a distance.
 The word data refers to information presented in whatever form is agreed upon
by the parties creating and using the data.
 Data communications are the exchange of data between two devices via some
form of transmission medium such as a wire cable.
 Communication Systems are the combination of hardware (physical equipment's)
and software (programs).
 Data communication is the process of transferring data from one place to another
or between two locations. It allows electronic and digital data to move between
two networks, no matter where the two are located geographically, what the data
contains, or what format they are in

Institute of Computer Science and Information Technology (ICS/IT), Faculty of Management and Computer Sciences 3
Components of Data Communication
 A Communication System has five basic components:
• Message: The data to be transmitted or communicated, which can include numbers,
text, photos, sound, or video.
• Sender: The computer or device (e.g., phone, tablet) that sends the message.
• Receiver: The computer or device that receives the message, which can be different
from the sender.
• Transmission Medium: The channel through which the message is carried from
sender to receiver, such as twisted pair wire, coaxial cable, fiber optic cable, or
wireless.
• Protocol: The set of rules that govern the communication between computers.
These rules are followed by both the sender and receiver.

Institute of Computer Science and Information Technology (ICS/IT), Faculty of Management and Computer Sciences 4
Communication Protocol
Communication protocols are sets of rules and conventions that govern the
exchange of data between devices or systems. They ensure that data is transmitted
accurately and efficiently across networks. Here are some common
communication protocols:
1. TCP/IP (Transmission Control Protocol/Internet Protocol): The foundation
of the internet and most networks. TCP handles the actual data transmission
while IP handles addressing and routing.
2. HTTP (Hypertext Transfer Protocol): Used for transferring hypertext requests
and information on the World Wide Web. HTTPS is a secure version of HTTP
that uses encryption.

Institute of Computer Science and Information Technology (ICS/IT), Faculty of Management and Computer Sciences 5
Communication Protocol (Conti.)
3. FTP (File Transfer Protocol): Used for transferring files between a client
and server on a computer network.
4. SMTP (Simple Mail Transfer Protocol): Used for sending email messages
between servers.
5. POP3 (Post Office Protocol version 3) and IMAP (Internet Message
Access Protocol): Protocols used by email clients to retrieve emails from a
mail server.
6. DNS (Domain Name System): Translates domain names to IP addresses,
allowing users to access websites using human-readable names.
7. SSH (Secure Shell): Provides secure remote login and command execution
over an insecure network.

Institute of Computer Science and Information Technology (ICS/IT), Faculty of Management and Computer Sciences 6
Data Transmission
Data transmission refers to the process of sending and receiving data from one
point to another. It's a fundamental aspect of modern communication systems,
enabling the exchange of information between devices and networks. Here's a
breakdown of key aspects:

Medium: Data can be transmitted over various mediums:


• Wired: Includes cables such as copper wires, fiber optics, and twisted pair cables.

• Wireless: Uses electromagnetic waves to transmit data, including technologies like


Wi-Fi, Bluetooth, and cellular networks.

Institute of Computer Science and Information Technology (ICS/IT), Faculty of Management and Computer Sciences 7
Data Transmission (Conti.)
Satellite Communication:
 Principle: In satellite communication, signals are transmitted between an earth
station (ground-based antenna) and one or more satellites in orbit around the
Earth.
 Components:
 Ground Station: Facilities equipped with antennas and equipment to transmit
and receive signals to and from satellites.
 Satellite: Orbiting spacecraft equipped with transponders to receive, amplify, and
retransmit signals back to Earth.

Institute of Computer Science and Information Technology (ICS/IT), Faculty of Management and Computer Sciences 8
Data Transmission (Conti.)
Applications of Satellite Communication:
 Telecommunication: Long-distance voice calls, data transfer, and internet access
in remote regions.
 Broadcasting: Direct-to-home (DTH) television, satellite radio.
 Navigation: GPS (Global Positioning System) for location tracking and
navigation.
 Remote Sensing: Weather forecasting, environmental monitoring, and earth
observation.

Institute of Computer Science and Information Technology (ICS/IT), Faculty of Management and Computer Sciences 9
Data Transmission (Conti.)
Mobile Communication
 Principle: Mobile communication involves the exchange of voice and data
between mobile devices (such as cell phones, tablets, and IoT devices) via
wireless networks.
 Components:
 Base Station: Transmits and receives signals to and from mobile devices within
its coverage area.
 Mobile Devices: End-user devices equipped with transceivers for wireless
communication.

Institute of Computer Science and Information Technology (ICS/IT), Faculty of Management and Computer Sciences 10
Data Transmission (Conti.)
Applications of Mobile Communication:
 Voice Calls: Cellular networks enable voice communication between mobile
devices.
 Messaging: SMS (Short Message Service), MMS (Multimedia Messaging
Service), and instant messaging apps.
 Internet Access: Mobile data services provide access to websites, email, social
media, and online services.
 IoT Connectivity: Enables communication between various IoT devices for
applications like smart homes, healthcare monitoring, and industrial automation.

Institute of Computer Science and Information Technology (ICS/IT), Faculty of Management and Computer Sciences 11
Types of Data Communication
1. Simplex Communication:
 In simplex communication, data is transmitted in only one direction, from the
sender to the receiver.
 The receiver can only passively listen or receive data and cannot send any
feedback or response back to the sender.
 Examples of simplex communication include television broadcasting, where the
TV station sends signals to viewers, and one-way paging systems.

Institute of Computer Science and Information Technology (ICS/IT), Faculty of Management and Computer Sciences 12
Types of Data Communication (Conti. )
2. Half-Duplex Communication:
 In half-duplex communication, data can be transmitted and received, but not
simultaneously.
 Devices can switch between sending and receiving modes, but they cannot
perform both operations simultaneously on the same communication channel.
 Communication occurs in both directions, but not at the same time, resembling a
two-way radio or walkie-talkie system.
 To communicate, one device must finish transmitting before the other device can
start transmitting.
 Half-duplex communication is common in systems where both parties need to
take turns speaking, such as in a conversation.

Institute of Computer Science and Information Technology (ICS/IT), Faculty of Management and Computer Sciences 13
Types of Data Communication (Conti. )
3. Full-Duplex Communication:
 In full-duplex communication, data can be transmitted and received simultaneously.
 Both sender and receiver can communicate with each other at the same time over the
same communication channel.
 This mode allows for bidirectional communication, resembling a telephone conversation
where both parties can speak and listen simultaneously.
 Full-duplex communication requires separate channels for sending and receiving data or
sophisticated techniques to enable simultaneous transmission and reception on the same
channel, such as frequency division or time division duplexing.
 Examples of full-duplex communication include traditional telephone networks and
modern Ethernet networks.

Institute of Computer Science and Information Technology (ICS/IT), Faculty of Management and Computer Sciences 14
Digital and Analog Transmission
Analog Transmission:
 Uses continuous signals.
 Signal represented by varying amplitude or frequency.
 Commonly used in traditional telephone lines and AM/FM radio broadcasts.
 Susceptible to interference and noise.
 Lower quality compared to digital transmission.

Institute of Computer Science and Information Technology (ICS/IT), Faculty of Management and Computer Sciences 15
Digital and Analog Transmission (Conti.)
Digital Transmission:
 Uses discrete binary digits (0s and 1s).
 Offers higher quality and reliability.
 Commonly used in modern telecommunications systems like internet
connections, digital TV, and cellular networks.
 Less susceptible to interference and noise.
 Allows for efficient use of bandwidth and integration of various data types.

Institute of Computer Science and Information Technology (ICS/IT), Faculty of Management and Computer Sciences 16
Note for the Students
• Note: Dear Students you can Download Books/Lectures and other
helping material form the given link.

• Link: https://cslearnerr.com/applications-of-information-and-
communication-technologyict/

Institute of Computer Science and Information Technology (ICS/IT), Faculty of Management and Computer Sciences 17
The University of Agriculture
Peshawar, Pakistan

Applications of Information and


Communication Technology(ICT)

Lecture 5
Mr. Noor Ul Arfeen

Institute of Computer Science and Information Technology (ICS/IT), Faculty of Management and Computer Sciences
Lecture Outline
 Networks
 Types of Network
 Local Area Network (LAN)
 Wireless Local Area Network (WLAN)
 Metropolitan Area Network (MAN)
 Wide Area Network (WAN)
 Personal Area Network (PAN)
 Physical Structure of Computer Networks
 Ring Topology
 Bus Topology
 Star Topology
 Mesh Topology

Institute of Computer Science and Information Technology (ICS/IT), Faculty of Management and Computer Sciences 2
Network
 A network refers to a collection of interconnected entities or nodes that are linked
together in some way.
 In computer networks, nodes typically refer to computers or other devices that are
connected to each other through some kind of communication medium, such as
cables or wireless signals.
 Computer networks can be local (LAN), wide-area (WAN), or global (Internet),
and can be used for various purposes such as sharing resources, communication,
and accessing information.

Institute of Computer Science and Information Technology (ICS/IT), Faculty of Management and Computer Sciences 3
Types of Computer Networks (Local Area Network)
A school lab with its ten computers networked together is an example of a local area
network.
LANs can be set up in any defined area, such as a home, a school, an office building.
LANs are most likely to be based on Ethernet technology.

Institute of Computer Science and Information Technology (ICS/IT), Faculty of Management and Computer Sciences 4
Types of Computer Networks (Wireless Local Area Network)

A WLAN, or wireless LAN, is a network that allows devices to connect and


communicate wirelessly.
Unlikely a traditional wired LAN, in which devices communicate over Ethernet
cables, devices on a WLAN communicate via Wi-Fi.

Institute of Computer Science and Information Technology (ICS/IT), Faculty of Management and Computer Sciences 5
Types of Computer Networks (Metropolitan Area Network)

A metropolitan area network is a computer network that usually spans a city or in


a large metropolitan area.
A MAN is larger than a LAN but smaller than a WAN.

Institute of Computer Science and Information Technology (ICS/IT), Faculty of Management and Computer Sciences 6
Types of Computer Networks (Wide Area Network )
A wide are network (WAN) connects computers and other resources that are miles
or even continents apart.
It covers large distance for communication between computers.
The most well-known WAN is the Internet, which may cover the entire globe.

Institute of Computer Science and Information Technology (ICS/IT), Faculty of Management and Computer Sciences 7
Types of Computer Networks (Personal Area Network)
PAN is the computer network that connects computers/devices within the range of
an individual person.
A PAN typically involves a computer, phone, tablet, printer, PDA (Personal
Digital Assistant) and other entertainment devices like speakers, video game
consoles, etc.

Institute of Computer Science and Information Technology (ICS/IT), Faculty of Management and Computer Sciences 8
Physical Structure of Computer Networks (Ring Topology)

Each device has dedicated point-to-point link with only


devices on either sides
The message travels along the ring in one direction
Each node has repeater to regenerate the message
Advantages:
Easy installation & reconfiguration, and fault isolation
Disadvantages:
Unidirectional traffic, and dependency on ring

Institute of Computer Science and Information Technology (ICS/IT), Faculty of Management and Computer Sciences 9
Physical Structure of Computer Networks (Bus Topology)

Only one cable (bus cable) acts as backbone to link all devices
Nodes are connected to bus cable through drop line and taps.
Drop line is the connection between the device and bus cable
Tap is the connector
Advantages:
Easy installation, and less cabling
Disadvantages:
Difficult reconnections, and fault isolation

Institute of Computer Science and Information Technology (ICS/IT), Faculty of Management and Computer Sciences 10
Physical Structure of Computer Networks (Star Topology)

Each device has a dedicated point-to-point link to a central controller, known as


hub.
Nodes are not directly connected but connected through hub.
Advantages:
 Less expensive, each device requires only one link and one I/O port, less cabling, robustness,
and fault identification & isolation
Disadvantages:
 The main disadvantage is its dependency on a single point

Institute of Computer Science and Information Technology (ICS/IT), Faculty of Management and Computer Sciences 11
Physical Structure of Computer Networks (Mesh Topology)

Every device has a dedicated point-to-point link to every other device


 Advantages:
 No traffic problems due to dedicated links, robustness, privacy or security, and fault
identification & isolation
Disadvantages:
 The main disadvantage is the number of cables and I/O ports

Institute of Computer Science and Information Technology (ICS/IT), Faculty of Management and Computer Sciences 12
Note for the Students
• Note: Dear Students you can Download Books/Lectures and other
helping material form the given link.

• Link: https://cslearnerr.com/applications-of-information-and-
communication-technologyict/

Institute of Computer Science and Information Technology (ICS/IT), Faculty of Management and Computer Sciences 13
The University of Agriculture
Peshawar, Pakistan

Applications of Information and


Communication Technology(ICT)

Lecture 6
Mr. Noor Ul Arfeen

Institute of Computer Science and Information Technology (ICS/IT), Faculty of Management and Computer Sciences
Lecture Outline
 Computer Virus
 Types of Computer Virus
 Impact of Computer Virus
 Signs of a Virus Infection
 Preventative Measures

Institute of Computer Science and Information Technology (ICS/IT), Faculty of Management and Computer Sciences 2
Computer Virus
 A VIRUS(Vital Information Resources Under Siege) is a program that can infect
other programs by modifying them.
 Viruses are self-replicating and are designed to infect other programs.
 The modification includes a copy of the virus program which then goes on to
infect other programs.

Institute of Computer Science and Information Technology (ICS/IT), Faculty of Management and Computer Sciences 3
Types of Computer Viruses
Malware:
• Software designed to damage or infiltrate a computer system without the user's
consent, including viruses, spyware, and adware.
Spyware:
• Spyware is a type of malware that is designed to secretly monitor and collect
information about a user's online activities without their consent. It can gather
various types of data, including browsing history, keystrokes, passwords, and
personal information.
Adware:
• Adware, short for advertising-supported software, is a type of malware that
delivers unwanted advertisements to users' computers. It often accompanies
free software downloads and generates revenue for its creators by displaying
advertisements or redirecting web traffic to sponsored websites
Institute of Computer Science and Information Technology (ICS/IT), Faculty of Management and Computer Sciences 4
Types of Computer Viruses (Conti.)
 Trojans:
• Malicious programs disguised as legitimate software to trick users into
installing them.
 Worms:
• Self-replicating malware that spreads across networks without human
intervention.
 Ransomware:
• Malware that encrypts files or locks users out of their systems, demanding
payment for their release.
 File Infector virus:
• Comes in an attached form format and affects .exe and .com files.

Institute of Computer Science and Information Technology (ICS/IT), Faculty of Management and Computer Sciences 5
Types of Computer Viruses (Conti.)
 Direct Action Virus:
• Attacks only .exe and .com files, not very harmful as it is triggered after being
executed.
 Overwrite virus:
• This type of virus deletes the information contained in the file that it infects,
rendering them partially or totally is useless once they have been infected.
 Directory Virus :
• This virus is also called File System Virus or Cluster Virus. It infects the
directory of the computer by modifying the path that is indicating the location
of a file.

Institute of Computer Science and Information Technology (ICS/IT), Faculty of Management and Computer Sciences 6
Types of Computer Viruses (Conti.)
 Browser Hijacker:
As the name suggests this virus is coded to target the user’s browser and can alter
the browser settings. It is also called the browser redirect virus because it redirects
your browser to other malicious sites that can harm your computer system.
 Multipartite Virus:
This type of virus is able to infect multiple parts of a system including the boot
sector, memory, and files. This makes it difficult to detect and contain.
 Boot sector Virus:
It infects the boot sector of the system, executing every time system is booted and
before the operating system is loaded. It infects other bootable media like floppy
disks. These are also known as memory viruses as they do not infect the file
systems.

Institute of Computer Science and Information Technology (ICS/IT), Faculty of Management and Computer Sciences 7
Impact of Computer Viruses
 Financial Losses:
• Businesses can incur significant financial losses due to downtime, data
breaches, and recovery expenses.
 Data Breaches:
• Viruses can compromise sensitive information, leading to identity theft, fraud,
and legal consequences.
 Disruption of Services:
• Viruses can disrupt critical services such as healthcare, transportation, and
utilities, affecting millions of people.

Institute of Computer Science and Information Technology (ICS/IT), Faculty of Management and Computer Sciences 8
Signs of a Virus Infection
 Slow Performance:
• Viruses consume system resources and can cause computers to slow down or
freeze.
 Unusual Pop-ups:
• Pop-up windows or advertisements may appear unexpectedly, indicating a
virus infection.
 Strange Behavior:
• Computers infected with viruses may exhibit unusual behavior, such as
crashing or restarting unexpectedly

Institute of Computer Science and Information Technology (ICS/IT), Faculty of Management and Computer Sciences 9
Preventative Measures
 Use Antivirus Software:
• Install reputable antivirus software and keep it updated to detect and remove
viruses.
 Regular Software Updates:
• Keep operating systems, software applications, and security patches up-to-date
to address known vulnerabilities.
 Strong Passwords:
• Use complex passwords and enable two-factor authentication to protect
accounts from unauthorized access.

Institute of Computer Science and Information Technology (ICS/IT), Faculty of Management and Computer Sciences 10
Note for the Students
• Note: Dear Students you can Download Books/Lectures and other
helping material form the given link.

• Link: https://cslearnerr.com/applications-of-information-and-
communication-technologyict/

Institute of Computer Science and Information Technology (ICS/IT), Faculty of Management and Computer Sciences 11

You might also like