ITM Unit 1 Notes
ITM Unit 1 Notes
Components of IT Systems
1. Hardware:
○ Definition: The physical components of an IT system that can be touched and
seen.
○ Examples: Computers, servers, routers, switches, printers, monitors, keyboards,
mice, and mobile devices.
○ Importance: Hardware provides the physical infrastructure necessary for software
to run and for data to be processed and stored.
○ Considerations: When selecting hardware, factors such as processing power,
storage capacity, energy efficiency, and compatibility with existing systems must
be considered.
2. Software:
○ Definition: The programs and applications that run on the hardware to perform
specific functions.
○ Types: a) System Software: Manages hardware resources (e.g., operating
systems like Windows, macOS, Linux). b) Application Software: Performs specific
tasks for users (e.g., word processors, web browsers, accounting software).
○ Importance: Software enables users to interact with hardware and perform
complex tasks efficiently.
○ Considerations: Software selection should be based on organizational needs,
user-friendliness, scalability, and integration capabilities with existing systems.
3. Data:
○ Definition: The raw facts and figures that are processed by the system to produce
meaningful information.
○ Types: a) Structured Data: Organized in a predefined format (e.g., databases). b)
Unstructured Data: Lacks a predefined format (e.g., emails, social media posts).
○ Importance: Data is the lifeblood of an organization, forming the basis for
analysis, decision-making, and strategic planning.
○ Considerations: Data management involves issues of storage, security, quality,
and accessibility.
4. Networks:
○ Definition: The communication systems that allow different parts of the IT system
to exchange data.
○ Types: a) Local Area Networks (LANs): Connect devices within a limited area. b)
Wide Area Networks (WANs): Connect devices across larger geographical areas.
c) Internet: A global network of interconnected computers.
○ Importance: Networks enable data sharing, resource optimization, and
collaborative work.
○ Considerations: Network design must account for speed, reliability, security, and
scalability.
5. People:
○ Definition: The users, developers, and administrators who interact with and
maintain the system.
○ Roles: a) End Users: Individuals who use the IT systems for their daily tasks. b)
IT Professionals: Specialists who design, implement, and maintain the systems.
c) Management: Decision-makers who determine IT strategies and investments.
○ Importance: People are crucial for the effective use and management of IT
systems.
○ Considerations: Training, user experience design, and change management are
essential for successful IT implementation.
6. Procedures:
○ Definition: The policies, guidelines, and best practices that govern the use and
management of the IT system.
○ Examples: a) Security protocols b) Data backup procedures c) User access
policies d) System maintenance schedules
○ Importance: Procedures ensure consistent, efficient, and secure operation of IT
systems.
○ Considerations: Procedures must be clearly documented, regularly updated, and
effectively communicated to all relevant stakeholders.
The synergy between these six components is crucial for the effective functioning of an IT
system. For instance, even the most advanced hardware and software are ineffective without
skilled people to operate them and proper procedures to guide their use. Similarly, robust
networks are essential for connecting hardware and enabling data flow, but they must be
secured through appropriate procedures and managed by competent IT professionals.
In the rapidly evolving field of IT, organizations must continually assess and update each of
these components to maintain competitive advantage and operational efficiency. This involves
staying abreast of technological advancements, investing in employee training, and regularly
reviewing and updating IT policies and procedures.
Characteristics of Computers
Computers are characterized by several key attributes that make them invaluable tools in
modern society:
1. Speed:
○ Definition: The ability to process large amounts of data and perform complex
calculations in fractions of a second.
○ Elaboration: Computer speed is typically measured in operations per second.
Modern processors can perform billions of operations per second (gigahertz).
This speed enables complex tasks like weather prediction, financial modeling,
and real-time data analysis.
○ Example: A supercomputer can perform quadrillions of calculations per second,
enabling tasks like simulating nuclear explosions or modeling climate change.
2. Accuracy:
○ Definition: The precision and correctness of computations and data processing.
○ Elaboration: Computers follow instructions exactly as given, eliminating human
errors in calculation. However, the accuracy of output depends on the accuracy
of input and the correctness of the program.
○ Example: In financial systems, computers can calculate interest on millions of
accounts without error, ensuring fairness and precision in banking operations.
3. Versatility:
○ Definition: The ability to perform a wide range of tasks across various domains.
○ Elaboration: With appropriate software, the same computer hardware can be
used for tasks ranging from word processing to video editing, scientific
simulations to playing games.
○ Example: A single smartphone can function as a calculator, camera, GPS device,
music player, and communication tool, demonstrating the versatility of modern
computing devices.
4. Storage Capacity:
○ Definition: The ability to store vast amounts of data for immediate or future use.
○ Elaboration: Modern storage devices can hold terabytes of data, equivalent to
millions of books. This capacity enables the storage of large databases,
high-resolution media, and complex software systems.
○ Example: A typical smartphone can store thousands of photos, hours of video,
and numerous apps, illustrating the massive storage capabilities in even small
devices.
5. Diligence:
○ Definition: The ability to perform repetitive tasks consistently without fatigue or
loss of concentration.
○ Elaboration: Unlike humans, computers do not get bored, tired, or distracted.
They can perform the same task millions of times with the same level of
accuracy.
○ Example: In quality control, computers can inspect thousands of products per
hour, maintaining consistent standards without fatigue.
6. Automation:
○ Definition: The capability to perform sequences of tasks automatically once
programmed.
○ Elaboration: Automation reduces the need for human intervention in routine
processes, increasing efficiency and reducing errors.
○ Example: In a smart home, a computer system can automatically adjust lighting,
temperature, and security settings based on pre-programmed preferences and
real-time data.
Classification of Computers
Computers can be classified based on various criteria, reflecting their diverse applications and
capabilities:
This classification system demonstrates the diverse landscape of computer technology, from the
massive processing power of supercomputers to the ubiquitous presence of microcomputers in
our daily lives. Each type of computer serves specific needs and contributes to the overall
advancement of technology in society.
3. Computer Architecture
Computer architecture refers to the conceptual design and fundamental operational structure of
a computer system. It provides a blueprint for the organization of computer components and
their interactions. Understanding computer architecture is crucial for optimizing system
performance, ensuring compatibility between hardware and software, and designing efficient
computing solutions.
Understanding these architectural concepts is crucial for computer scientists and engineers, as
it informs decisions about system design, performance optimization, and software development.
The choice of architecture can significantly impact a system's speed, power consumption, and
overall capabilities.
4. Computer Memory
Types of Memory
1. Primary Memory (Main Memory): a) Random Access Memory (RAM):
○ Definition: Volatile memory used for temporary storage of data and instructions
that the CPU needs immediately.
○ Characteristics:
■ Fast access time (typically nanoseconds)
■ Volatile (loses data when power is turned off)
■ Allows both read and write operations
○ Types:
■ SRAM (Static RAM): Faster but more expensive, used in CPU caches
■ DRAM (Dynamic RAM): Slower but cheaper, used as main memory
○ Applications: Storing actively used programs and data
b) Read-Only Memory (ROM): - Definition: Non-volatile memory that retains data even when
power is off, typically storing essential instructions. - Characteristics: - Non-volatile (retains data
without power) - Slower access time compared to RAM - Cannot be easily modified (or
modification is limited) - Types: - PROM (Programmable ROM): Can be programmed once -
EPROM (Erasable Programmable ROM): Can be erased and reprogrammed using ultraviolet
light - EEPROM (Electrically Erasable Programmable ROM): Can be electrically erased and
reprogrammed - Flash Memory: A type of EEPROM that allows block-wise erasing and
programming - Applications: Storing firmware, boot instructions, and other critical system data
Storage Devices
1. Hard Disk Drives (HDD):
○ Definition: Magnetic storage devices that use rotating disks to store and retrieve
digital data.
○ Characteristics:
■ High storage capacity (currently up to 20TB for consumer drives)
■ Relatively low cost per gigabyte
■ Mechanical parts make them susceptible to physical damage
■ Slower access times compared to SSDs
○ Working Principle: Data is stored on magnetic platters and read/written by
moving read/write heads
○ Applications: Mass storage in desktop computers, servers, and external storage
devices
2. Solid State Drives (SSD):
○ Definition: Storage devices that use flash memory to store data persistently.
○ Characteristics:
■ Faster read/write speeds compared to HDDs
■ No moving parts, making them more durable and quieter
■ Lower power consumption
■ Generally more expensive per gigabyte than HDDs
■ Limited write endurance (number of write operations before failure)
○ Working Principle: Data is stored in interconnected flash memory chips
○ Applications: Boot drives in computers, high-performance storage in laptops and
desktops
3. Optical Disks:
○ Definition: Storage media that use laser technology to read and write data.
○ Types: a) CD (Compact Disc): Up to 700MB storage b) DVD (Digital Versatile
Disc): Up to 17GB for dual-layer discs c) Blu-ray Disc: Up to 128GB for
quad-layer discs
○ Characteristics:
■ Portable and relatively durable
■ Slower access times compared to HDDs and SSDs
■ Read-only, write-once, and rewritable variants available
○ Applications: Distribution of software, movies, and backup storage
4. USB Flash Drives:
○ Definition: Portable storage devices that use flash memory and connect via USB
ports.
○ Characteristics:
■ Highly portable
■ Plug-and-play functionality
■ Capacities ranging from a few gigabytes to several terabytes
■ Faster than optical disks but generally slower than internal SSDs
○ Applications: Personal data transport, software installation, bootable recovery
drives
Mass Storage Systems
1. RAID (Redundant Array of Independent Disks):
○ Definition: A storage technology that combines multiple disk drive components
into a logical unit for data redundancy and performance improvement.
○ Levels:
■ RAID 0 (Striping): Improves performance but no redundancy
■ RAID 1 (Mirroring): Provides full data redundancy
■ RAID 5: Striping with distributed parity, balancing performance and
redundancy
■ RAID 10 (1+0): Combination of mirroring and striping
○ Benefits:
■ Improved data reliability
■ Increased I/O performance
■ Ability to hot-swap failed drives in some configurations
○ Applications: Enterprise servers, data centers, high-performance workstations
2. NAS (Network Attached Storage):
○ Definition: File-level data storage server connected to a computer network,
providing data access to heterogeneous network clients.
○ Characteristics:
■ Operates as a file server
■ Typically uses standard file sharing protocols like NFS or SMB
■ Often includes built-in RAID functionality
○ Benefits:
■ Centralized storage accessible by multiple users
■ Easy to set up and manage
■ Scalable by adding more drives or units
○ Applications: Small to medium-sized businesses, home networks, media servers
3. SAN (Storage Area Network):
○ Definition: A dedicated high-speed network that interconnects and presents
shared pools of storage devices to multiple servers.
○ Characteristics:
■ Provides block-level storage access
■ Uses high-speed interconnects like Fibre Channel or iSCSI
■ Allows for advanced features like data replication and disaster recovery
○ Benefits:
■ High performance and low latency
■ Centralized storage management
■ Improved storage utilization and flexibility
○ Applications: Large enterprises, data centers, environments requiring
high-performance storage
5. Cloud Computing
Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to
a shared pool of configurable computing resources (e.g., networks, servers, storage,
applications, and services) that can be rapidly provisioned and released with minimal
management effort or service provider interaction.
Key Characteristics:
1. On-demand self-service:
○ Users can provision computing capabilities as needed without requiring human
interaction with each service provider.
○ Example: Spinning up a new virtual machine or increasing storage capacity
through a web interface.
2. Broad network access:
○ Capabilities are available over the network and accessed through standard
mechanisms.
○ Supports various client platforms (e.g., mobile phones, tablets, laptops,
workstations).
3. Resource pooling:
○ The provider's computing resources are pooled to serve multiple consumers
using a multi-tenant model.
○ Different physical and virtual resources are dynamically assigned and reassigned
according to consumer demand.
4. Rapid elasticity:
○ Capabilities can be elastically provisioned and released to scale rapidly outward
and inward with demand.
○ To the consumer, the capabilities available often appear to be unlimited.
5. Measured service:
○ Cloud systems automatically control and optimize resource use by leveraging a
metering capability.
○ Resource usage can be monitored, controlled, and reported, providing
transparency for both the provider and consumer of the utilized service.
Service Models:
Deployment Models:
1. Public Cloud:
○ Services are rendered over a network that is open for public use.
○ Owned, managed, and operated by a business, academic, or government
organization, or a combination of them.
2. Private Cloud:
○ Infrastructure is provisioned for exclusive use by a single organization comprising
multiple consumers.
○ May be owned, managed, and operated by the organization, a third party, or a
combination of them.
3. Hybrid Cloud:
○ Composition of two or more distinct cloud infrastructures (private, community, or
public) that remain unique entities but are bound together by standardized or
proprietary technology.
4. Community Cloud:
○ Infrastructure is provisioned for exclusive use by a specific community of
consumers from organizations that have shared concerns.
Challenges:
1. Security and Privacy: Concerns about data security and privacy in shared environments.
2. Compliance: Meeting regulatory requirements when storing data in the cloud.
3. Vendor Lock-in: Difficulty in moving from one cloud provider to another due to
differences in platforms and services.
4. Performance: Potential latency issues for certain applications.
5. Limited Control: Less control over underlying cloud infrastructure.
A data center is a facility used to house computer systems and associated components, such as
telecommunications and storage systems. They are integral to the functioning of most modern
organizations, providing centralized storage, processing, and distribution of large amounts of
data.
1. IT Equipment:
○ Servers
○ Storage systems
○ Network devices (routers, switches)
2. Supporting Infrastructure:
○ Power distribution and backup systems
○ Cooling systems
○ Fire suppression systems
3. Physical Security:
○ Access control systems
○ Surveillance cameras
○ Biometric authentication
These challenges are interconnected, and addressing them requires a holistic approach to data
center design, operation, and management. As the demand for data processing and storage
continues to grow, innovative solutions to these challenges will be crucial for the future of data
center technology.