Unit 1 - ICT
Unit 1 - ICT
Lesson 1
Introduction to Computer
1
What is ICT?
ICT means Information and Communication Technology is a broader term for Information
Technology (IT), which refers to all communication technologies, including the internet, wireless
networks, cell phones, computers, software, videoconferencing, social networking and other
media applications and services enabling users to access, retrieve, store, transmit, and manipulate
information in a digital form.
Definitions of Computer.
A computer is an electronic device, operating under the control of instructions stored in its own
memory that can accept data (input), process the data according to specified rules, produce
information (output), and store the information for future use.
Functions of Computers
The followings are four basic main functions of Computers.
1. Takes data as an input (Input function).
2. Store’s data/instructions in its memory (Storage Function)
3. Process the data and converts into information (Process function).
4. Generates the output (Output function).
2
Generations of Computers
There are five generations of computers and described in following table.
Generations Periods Technology Examples
First 1940-1956 Vacuum tube ENIAC, UNIVAC, EDVAC,
IBM-701, IBM-650
Second 1956-1963 Transistors CDC 3600, Honeywell 400,
UNIVAC 1108, IBM-7094
And many more
Third 1963-1971 Integrated Circuits (IC’s) IBM-370, PDP-8, ICL 2900,
IBM-360, PDP-11 And more
Fourth 1971-2010 Very Large-Scale Star 1000, PUP-11, IBM-
Integration (VLSI) or 4341, DEC-10
Microprocessor
Fifth 2010-Till date Ultra-Large-Scale Ultrabook, Chromebook,
Integration (ULSI) or Desktop, Laptop, Notebook
Parallel Processor or AI
(Artificial Intelligence)
Types of Computers
There are five basic types of Computers classified by size and power as follows.
Supercomputers
Supercomputers are expensive, fastest, and biggest computer. They are designed to process huge
amount of data. It has thousands of interconnected processors.
Mainframe Computers
Supercomputers are used for defense, aerospace, science, engineering, weather forecasting etc.
Examples: Kingdom of Saudi Arabia has Supercomputers like Shaheen I, Shaheen II, SANAM
and Dammam 7 etc.
Mainframe Computers
Mainframe computer is a big and centralized machine that contains large memory, huge storage
space and multiple high-grade processors. Used primarily by large scale organizations, scientific
research, and census data.
Most eminent suppliers of mainframe computers are IBM, Hitachi, Amdahl, and Unisys.
Minicomputers
Minicomputer is a mid-range computer less than mainframe and more than microcomputer
(Personal computer).
4
It supports multiprocessing and multi-tasking and can be used by small organizations and
individuals.
Workstation Computers
Workstation computer is a high-performance computer, designed for single user advanced
graphics capabilities with large storage and powerful processing.
Desktop computer – A personal computer that is designed to stay at one location and fits on or
under a desk. It typically has a monitor, keyboard, mouse, and a tower (system unit).
Laptop computer (or notebook) – A portable personal computer that is small enough to rest on
the user’s lap and can be powered by a battery. It includes a flip down screen and a keyboard
with a touchpad.
5
Tablet – A wireless touchscreen PC that is slightly smaller and weighs less than the average
laptop.
Smartphone – A mobile phone that performs many of the functions of a personal computer.
Summary
In this lesson, we learned about concepts of ICT with its importance in teaching and learning. In
addition to that learned about computer with functions, generations and types of computers.
Questions
6
4. Choose the correct main basic functions of Computer.
a) Input Function b) Store Function c) Process Function d) All
5. Which one is an expensive, fastest, and biggest computer?
a) Supercomputer b) Mainframe Computer
c) Minicomputer d) Microcomputer
7
Unit 1
Lesson 2
Components of Computers (Hardware)
8
Components of Computers
There are two types of components of computer
1) Hardware
2) Software
Hardware
Computer Hardware are the physical components of computer that one can touch and feel which
includes computer Input, Processing (System Unit), Storage, Output and Communication
Devices.
Input Devices
Input devices are used to enter data and commands into a computer system. Computers then use
their CPU to process this data and produce output.
9
Output Devices
After processing of entered data, it is converted into a format which humans can understand that
becomes useful information. After conversion, the output units display this data to users.
10
Central Processing Unit (CPU)
The Central Processing Unit (CPU) is the brain of the computer.
Memory Unit
Control Unit
Arithmetic and Logical Unit
Memory Unit
When we enter the data into the computer using an input device, the entered information
immediately gets saved in the memory unit of the Central Processing Unit (CPU).
Similarly, when the output of our command is processed by the computer, it is saved in the
memory unit before giving the output to the user.
Control Unit
Basically, the instructions taken, interpretation of entered data, issuing signals to execute the
data, and then finally retrieving the data is all done in the Control Unit.
11
Arithmetic & Logical Unit (ALU)
As the name suggests, all the mathematical calculations or arithmetic operations (addition,
subtraction, multiplication, division, and other numerical based calculations) that is arithmetical
part and the comparison of data and decision-making actions are performed by logical part in
CPU.
Memory Devices
Memory devices are any type of hardware that is used for storing and retrieving data.
There are two types of storage memories:
Primary Memory
Secondary Memory
Primary Memory
Primary Memory is a main memory of the computer. It stores the instructions, operating system
and data which required to run the computer.
There are two types of primary memories.
RAM (Random Access Memory)
ROM (Read Only Memory)
RAM (Random Access Memory)
RAM is a read and write memory; it accesses data in a random order that is why it is faster than
secondary memory.
When we are working on a file on your computer, it will temporarily store data in your RAM.
RAM allows you to perform everyday tasks like opening applications, loading webpages, editing
a document, or playing games. It also allows you to jump from one task to another without losing
your progress.
Larger the RAM of your computer, the smoother and quicker it is for you to multitask.
RAM is a volatile memory, meaning it cannot hold onto data once the system turns off (power
off). For example, if you copy a block of text, restart your computer, and then attempt to paste
that block of text into a document, we will find that our computer has forgotten the copied text.
This is because it was only stored temporarily in your RAM.
There are two types of RAM:
– DRAM (Dynamic Random-Access Memory)
– SRAM (Static Random-Access Memory)
12
ROM (Read Only Memory)
It is read only memory; it is designed for reading data. ROM is used for retrieving stored data
that are permanently fixed and cannot be rewritten.
ROM is non-volatile memory, meaning that the data stored on ROM are not lost even when the
power is shut off.
Magnetic Storage
It uses a magnetization process to write, rewrite and access data. It is covered with a magnetic
coating and stores data in the form of tracks, spots, and sectors. Hard Disk Drive (Internal or
External), Magnetic tape and Floppy Disks are common examples of Magnetic Storage.
13
Hard Disk Drives (HDD)
It stores data on a stack of rotating magnetized platters.
There are two types of Hard Disk drives.
Floppy Disk
Very old method of portable data storage where information is kept on a thin plastic disk. Few
modern computers have floppy disk drives to read Floppy Disk.
Maximum storage on a floppy disk is only about 1.44 MB
Magnetic Tape
This is also oldest form of data storage. It is a thin strip of magnetic coated plastic which is
wrapped onto a reel.
Optical storage
It stores data on an optically readable form. It’s all read and write activities are performed by
light (Usually a laser beam)
14
Optical disc is any storage media that holds content in digital format and is read using a laser
assembly is considered optical media.
The most common types of optical media are.
– Blu-ray (BD)
– Compact Disc (CD)
– Digital Versatile Disc (DVD)
15
Solid State Hard Drives (SSD’S)
SSD’S are used in place of magnetic hard disk drives (HDD) in laptops and desktops. It uses
electrical circuit technology that means no moving parts that’s why run silently and less chances
of breaking down.
Memory Stick / Pen Drive / USB Drive
It is small, portable external storage device and connected to the computer via USB (Universal
Serial Bus) port. Storage capacity Pen Drive are 4 GB to 1 TB.
Flash Memory Cards
It is also known as Secure Digital Cards (SD Cards). SD cards are small and rectangular in shape
uses the solid-state technology.
Storage capacity SD Cards are 2 GB to 1 TB.
Cloud Storage
Also, many secondary storage devices are now virtual devices residing on third-party cloud
servers hosted by many services such as Dropbox, Google Drive, Amazon Web Services (AWS),
or Microsoft Azure.
8 bits=1 Byte
1024 Bytes = 1 KB (Kilobyte)
1024 KB = 1 MB (Megabyte)
1024 MB = 1 GB (Gigabyte)
1024 GB = 1 TB (Terabytes)
Number System
16
Number System is a way to represent the numbers in the computer architecture. There are four
different types of the number system, such as:
Binary number system (base 2 and digits 0 & 1)
Octal number system (base 8 and digits 0 to 7)
Decimal number system (base 10 and digits 0 to 9)
Hexadecimal number system (base 16 and digits 0 to 9 with Alphabets A to F).
17
Repeat Steps 3 and 4, getting remainders from right to left, until the quotient becomes zero in
Step 3.
The last remainder thus obtained will be the Most Significant Digit (MSD) of the new base
number.
Example −
Decimal Number: (29)10
Calculating Binary Equivalent −
Step 1 29 / 2 14 1
Step 2 14 / 2 7 0
Step 3 7/2 3 1
Step 4 3/2 1 1
Step 5 1/2 0 1
As mentioned in Steps 2 and 4, the remainders have to be arranged in the reverse order so that
the first remainder becomes the Least Significant Digit (LSD) and the last remainder becomes
the Most Significant Digit (MSD).
Decimal Number – (29)10 = Binary Number – (11101)2.
Other Base System to Decimal System
Steps
Step 1 − Determine the column (positional) value of each digit (this depends on the
position of the digit and the base of the number system).
Step 2 − Multiply the obtained column values (in Step 1) by the digits in the
corresponding columns.
Step 3 − Sum the products calculated in Step 2. The total is the equivalent value in
decimal.
Example
Binary Number – (11101)2
Calculating Decimal Equivalent −
18
Step 3 111012 (29)10
Step 1 21 / 2 10 1
Step 2 10 / 2 5 0
Step 3 5/2 2 1
Step 4 2/2 1 0
Step 5 1/2 0 1
19
Example
Binary Number − (10101)2
Calculating Octal Equivalent −
20
Step Binary Number Hexadecimal Number
21
0 0 0 0
0 1 1 0
1 0 1 0
1 1 0 1
There are four rules for binary subtraction. These are given as following below,
0 0 0 0
0 1 0 1
1 0 1 0
1 1 0 0
Borrow 1 is required from next higher order bit to subtract 1 from 0. So, result became 0.
There are four rules for binary multiplication. These are given as following below,
0 0 0
0 1 0
1 0 0
1 1 1
Whenever at least one input is 0, then multiplication is always 0.
There are four part in any division: Dividend, Divisor, quotient, and remainder. These are given
as following rules for binary division,
0 0 Not defined
0 1 0
1 0 Not defined
22
1 1 1
Whenever divisor is 0, then result is always not defined.
Summary
In this lesson, we learned about different types of hardware components like CPU, Input, Output,
Memory, and storage devices. In addition to that units of measurements and number systems
with its operations.
Questions
1. Micro Flash Memory Cards are just smaller version of flash memory cards? (T/F)
2. RAM is non-volatile memory (T/F)
3. The Central Processing Unit (CPU) is the brain of the computers? (T/F)
23
Unit 1
Lesson 3
Components of Computers (Software)
24
Definition of Software
Software is a set of Instructions (Written in computer code) that tells hardware what to do. Most
of hardware’s are useless without software.
Types of Software
Mainly there are three types of software.
System Software
Application Software
Programming Languages
System Software
System software are used to run your computer system smoothly. System software runs things in
the background.
Microsoft Windows
MacOS (for Apple devices)
GNU/Linux
For smartphones:
Apple’s iOS
Google’s Android
Windows Phone OS
Firmware
25
Firmware is software that is stored on a computer’s motherboard or chipset which is semi-
permanent software that tells the device how to behave and how to interact with other devices. It
checks the drive for errors then queries if the operating system is present.
Example: a computer motherboard without firmware would not know how to detect the hard
drive or the video card found inside your computer. If your hard drives did not have firmware
embedded in them, they wouldn't know how fast to spin or when to stop. A wireless network
card would not know how to use a particular radiofrequency for connecting to Wi-Fi.
Device drivers
Driver software communicates with hardware and control devices and peripherals attached to a
computer. It does this by gathering input from the OS (operating system) and giving instructions
to the hardware to perform an action or other designated task.
Every component in a computer, including the video card, sound chip, keyboard, and mouse
have their own drivers.
Utility Software
Utility software is designed to analyses and optimize a device.
These apps are usually bundled with an OS. They track performance and alert the system if
there’s a problem like overheating.
Examples
Anti-malware software, hard drive cleanup, and file compression tools (like WinZip)
Application Software
Application (Apps) software is a software program, designed according to need of users or
organizations or App designed for end-users.
Examples
Microsoft Word, Microsoft Excel, Microsoft PowerPoint, Microsoft Access, Games, Multimedia
software’s etc.
Programming Languages
A programming language is a Computer language used to develop all computer programs
(Computer Software’s).
It is probably no surprise that software is created with other software.
Examples:
C, C++, C#, Java, .Net, Python etc.
Software Distribution
Here are some of the major distribution mechanisms.
26
Commercial:
A lot of software is still commercial. Any program you purchase and get a physical or digital
copy of is commercial software. Keep in mind that you do not own the software; you only own a
license that confers the right to use the software.
Examples
Microsoft Window 10, Microsoft Office 365
Open source:
Often seen as the opposite of commercial, open-source software is usually made available with
all its source code, which allows an entire community of coders to update, modify, and improve
the program. Not all open-source software is free; some is sold at retail prices.
Example
Linux OS, LibreOffice, Python
Freeware:
A lot of software is completely free to download and use. The freeware model allows publishers
to distribute its software more easily because a lot of people will be willing to try something for
free. Some freeware is also referred to as adware because while the application is free, it comes
with embedded advertising.
Examples
Adobe Reader, Skype
Shareware:
Like freeware, shareware is free to use and share with others, but only for a short time. If you
find the application useful, you have the option to pay for it to continue using it.
Examples
WinZip, Kaspersky Antivirus
Summary
In this lesson, we covered the definition of software, with different types of system, application,
programming languages and distribution mechanism of software.
Questions
27
4. Which of the following used as Application Software.
a) Microsoft Window b) Linux c) Microsoft Word d) Python
5. Linux OS is an example of?
a) Open-Source b) Freeware
c) Shareware d) Commercial
28
Unit 1
Lesson 4
Communications and Internet Technologies
Communication Network
29
Computer Communications Network in which two or more computers or devices transfer data,
instructions, and information.
The physical connection between networked computing devices is established using either cable
media or wireless media.
Types of Networks
There are three basic types of computer networks.
A network architecture
A network architecture in which each computer or process on the network is either a client or
a server.
30
Internet Technologies
The internet is a worldwide system where we can communicate, share files and lots of things
over the internet.
MAC Address:
Media Access Control, it is basically the same as IP address, but it remains unchanged.
Web Browser
Web browser is something like Google Chrome or Mozilla Firefox, a place where you can
browse through the internet.
31
HTML
HTML is the “mother tongue” of your browser.
HTML (Hyper Text Mark-up Language) is the authoring language, used to create web pages and
other information that can be displayed in a web browser.
The websites are developed in HTML and stored on Web Servers. When User types of the URL
of website, browser locates and fetches the website from server on client’s computer and
displays contents.
HTTP
HTTP (Hyper Text Transfer Protocol), the underlying protocol used by the World Wide Web.
HTTP defines how messages are formatted and transmitted, and what actions Web servers and
browsers should take in response to various commands. For example, when you enter a URL in
your browser, this sends an HTTP command to the Web server directing it to fetch and transmit
the requested Web page.
HTTPS
HTTPS (Hypertext Transfer Protocol Secure) (HTTPS) is an extension of the Hypertext Transfer
Protocol (HTTP). It is the safer version of the website; it has a padlock symbol on the top and
you can make sure that the website is not a scam.
Web servers:
Web servers are programs that use HTTP (Hypertext Transfer Protocol) to serve the files that
form Web pages to users, in response to their requests, which are forwarded by their computers’
HTTP clients.
Protocol
The Internet Protocol is known as TCP/IP.
32
A protocol is a set of rules that define how devices communicate. Here are the factors the
protocol affects when you are using the internet.
How the communication will start
The transmission speeds.
The significance of the bits being transmitted.
How the bits will be delivered (one at a time or in groups of 16 for example)
Error checking procedures used.
Summary
In this lesson, we covered the definition of communication, with different types of
Communications networks, architecture, internet technologies with protocol.
Questions
33
Unit 1
Lesson 5
Security and Ethics
34
Definition of Computer Security
Computer security, also called cybersecurity, the protection of computer systems and
information from harm, theft, and unauthorized use.
Examples:
Very weak Password - abdullah (Combination of only lowercase or uppercase)
Weak Password – Abdullah (combinations of uppercase and lowercase)
Strong Password – Abdullah1(Combination of uppercase, lowercase, and numbers)
Very Strong Password – Abdullah@1(Combination of uppercase, lowercase, number,
and symbol)
Malware
Malwares are malicious software that corrupts/harms a computer and the files on it.
Types of Malwares
35
Virus
A virus infects computer programs to corrupt, delete or move data or files and can spread to
other computer
Trojan horse
It uses malicious code to install software that seems ok but is hidden to create back doors into a
system. This typically causes loss or theft of data from an external source.
Worm
A worm is a standalone piece of malicious software that replicates itself in order to spread to
other computers. It often uses a computer network to spread itself.
Adware
Adware is software which can automatically cause pop-up and banner adverts to be displayed to
generate revenue for its author or publisher. A lot of freeware uses Adware but not always in a
malicious way. If it were malicious, it would then be classed as spyware or malware.
Phishing:
Phishing is run by a person or a creator that sends out a legitimate looking email. and as soon as
the recipient clicks on the link, they are sent to a fake website. The creator of the email can
access of personal data, and this can lead to fraud or identity theft.
Pharming:
Pharming is a code installed on a user’s hard drive or on the web server; the code will re direct
the user to a fake website without the user knowing. The creator can get access to personal data
and leads to fraud or identity theft.
Wardriving:
The act of locating and using wireless internet connections illegally; it only requires a laptop (or
other portable device), a wireless network card and antenna to pick up wireless signals. This can
potentially lead to the user’s internet time to be stolen, and it is very easy to steals a user’s
password and personal details.
Spyware:
It is a software, monitor your activities and collect sensitive information’s through internet
connection
Hacking: stealing personal information and gaining access to money. Some hackers even leak
important info.
36
Types of hackers
Basically, there are two types of Hackers. One tests the security issues; they are hired by an
organization known as white hat hackers another are for illegal hacking known as black hat
hackers.
VPN
VPN (virtual private network) it will allow you to access websites that are blocked in a firewall
because it will block your IP address.
Install an anti-virus program and keep it up-to-date and regularly run scans.
Install an anti-malware program to stop software installing without your knowledge.
Never download and install software from the Internet unless you are certain it is from a
trusted source.
Do not open email attachments unless you have scanned them first, even a picture can
carry a virus.
Do not trust cracked or hacked software as they often contain malware, Trojans.
Use Firewalls, its sits between your computer and the internet, swatting them away. Your
computer normally comes with a pre-installed firewall.
Do not click on suspicious links or pop-ups.
Backup your files.
Update your operating system.
37
Computer Ethics
Ethics for computers is used to describe the philosophical principles or laws of right and wrong
in relation to the use of computers.
Summary
In this lesson, we identified password, benefits of it and how to create good one, also we learned
about computer security, different types of viruses and how to protect computers from viruses as
well as computer ethics and unethical activities by using computer and internet.
Questions
1. To successfully access your account (Login), you must provide a valid username and
password (T/F)
2. Viruses will not harm a computer and the files on it. (T/F)
3. Computer ethics are laws of right and wrong (T/F)
38
Unit 1
Lesson 6
Key Concepts in Data Science
39
Data
Data is raw and unorganized facts such as text, number, images, audio, and video that need to be
processed. Data can be something simple and seemingly random and useless until it is organized.
Example: The student's test score is one piece of data
Information
When data is processed, organized, structured, or presented into a meaningful form, to make it
useful, it is called information.
Example: The average, percentage and total score of a students or class or of the entire school is
an information that can be derived from the given data.
Data Science
Data science is the field of data study that combines domain expertise, programming skills, and
knowledge of mathematics and statistics to extract meaningful information from data.
Internet Search:
Google search uses a Data science technology to search a specific result within a fraction of a
second.
Recommendation Systems:
To create a recommendation system. Example, "suggested friends" on Facebook or suggested
videos" on YouTube, everything is done with the help of Data Science.
Gaming world:
EA Sports, Sony, Nintendo, are using Data science technology. This enhances your gaming
experience. Games are now developed using Machine Learning technique. It can update itself
when you move to higher levels.
40
Online Price Comparison:
PriceRunner, Junglee, Shopzilla work on the Data science mechanism. Here, data is fetched from
the relevant websites using APIs.
Data Scientist
Data Engineer
Data Analyst
Statistician
Data Architect
Data Admin
Business Analyst
Data/Analytics Manager
Summary
In this lesson, we identified data, Information and data science with its application, tools, and
jobs.
Questions
42