0% found this document useful (0 votes)
102 views

IT111 Lecture01

This document provides an introduction to information technology (IT) and information and communication technology (ICT). It defines key terms like data, information, information systems, and computers. It discusses the main components of computers including hardware, software, and managed information or data. It also covers types of computers, parts of a computer like the central processing unit and memory, and computer memory measurements. Finally, it discusses some of the main functions of information technology like capture, processing, generation, storage and retrieval, and transmission.

Uploaded by

edwinegidius3
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
102 views

IT111 Lecture01

This document provides an introduction to information technology (IT) and information and communication technology (ICT). It defines key terms like data, information, information systems, and computers. It discusses the main components of computers including hardware, software, and managed information or data. It also covers types of computers, parts of a computer like the central processing unit and memory, and computer memory measurements. Finally, it discusses some of the main functions of information technology like capture, processing, generation, storage and retrieval, and transmission.

Uploaded by

edwinegidius3
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 59

IT 111: Introduction to

Information Technology (IT)

Lecture 1: Introduction to IT/ICT


Layout of Lecture#1
1) Definition of terms: ICT, IT, Data,
Information, Information System,
and Computer.
2) Computers & Types of Computers
3) Parts of Computer
4) Computer Memory Measurements
5) Information Security
IT and ICT
 IT
• Stands for Information Technology
 ICT
• Stands for Information Communications
Technology.

 NOTE:
• The two terminologies are sometimes used
interchangeably.
IT and ICT
 Definition:
• Is the collection of computer hardware and software
that is used to manage information and data.

 Main components:
• Computer hardware
• Computer software
• Managed information or data
IT and ICT
 Computer hardware
• Refers to the physical (can be seen physically) parts of a
computer.
• Examples:
• Monitor, Keyboard, Mouse, Printer, Scanner, Memory card, ….
IT and ICT
 Computer software
• Refers to a collection of instructions that is used to tell
the computer what to do.
• Examples:
• Operating Systems (Windows 7/8/10, Android, iOS…)
• Web browsers (Opera, Firefox, Internet Explorer, Google
Chrome)
• Media players (like VLC)
• Microsoft Office Suite (Word, Excel, PowerPoint, …)
• WhatsApp, Instagram, Twitter, …
• Accounting Packages (quickbooks, Freshbooks, Xero…)
IT and ICT
 Computer software
IT and ICT
 Managed information or data
• Receive, store, manipulate (process), transmit
(transfer), protect and retrieve information or data.
Computer System
 Also known as Information System.
 Definition:
• Is a set of connected components used for collecting,
processing, storing and distributing information.
 Examples:
• UDOM application system, UDOM SR2, ….
Computer System
 Components of a computer system:
• Hardware
• Software
• Networks
• People
• Data
Computer System
 Components of a computer system:
• Hardware
• Computer hardware…
• Software
• Computer software…
• Networks
• A set of several computer devices connected together so as
to enable communication among them.
• People
• Users (students, instructors, …), IT department individuals
• Data
• Number of students, courses, instructors, ….
Computer System
Data
 Data are raw facts and figures that on their own
have no meaning.
• These can be any alphanumeric characters i.e. text,
numbers, symbols.
• Examples:
• Yes, Yes, No, Yes, No, Yes, No, Yes
• 42, 63, 96, 74, 56, 86
• 100, 150
• NOTE:
• None of the above data sets have any meaning until they are
given a CONTEXT and PROCESSED into a useable form.
Data Into Information
 To achieve its aims the organisation will need
to process data into information.
 Data needs to be turned into meaningful
information and presented in its most useful
format.
 Data must be processed in a context in order
to give it meaning.
Data Into Information
Information
 Is data that has been processed within a
context to give it meaning.

OR

 Is data that has been processed into a


form that gives it meaning.
Examples

Yes, Yes, No, Yes, No, Yes,


Raw Data No, Yes, No, Yes, Yes

Responses to the market


Context research question – “Would
you buy brand x at price y?”
Processing

Information ???
Examples

Raw Data 42, 63, 96, 74, 56, 86

Juma’s scores in the six


Context modules

Processing

Information ???
Example

100, 150
Raw Data

The previous and current


Context readings of a customer’s
gas meter
Processing

Information ???
Summary

Information = Data + Context + Meaning

Processing
Data – raw facts and figures.

Information – data that has been processed (in a context) to give it meaning.
Computer
 An electronic device that can be instructed to
accept, process, store, and present data and
information.
 Main parts of a computer:
• Computer hardware
• Monitor, Speaker, keyboard, mouse, …
• Computer Software
• Operating system, web browsers, media players,
accounting packages, …
Computer
 A general purpose computer has the following
hardware components:
• Central Processing Unit (CPU)
• Memory (fast, expensive, short-term memory)
• Mass storage device (slower, cheaper, long-term
memory)
• Input device
• Output device
Computer
 Central Processing Unit (CPU)
• Is the heart of the computer and executes the
instructions (software) which tell the computer what to
do.
• This component is also known as the brains of the computer.
 Memory (fast, expensive, short-term memory)
• Is the component that (temporarily) stores data,
software and intermediate results.
• This is sometimes referred to as RAM (Random Access
Memory)
Computer
 Mass storage device (slower, cheaper, long-
term memory)
• This is the component that allows a computer to
permanently store large amounts of data,
information and software.
• This includes hard drives or disks, USB-drive (flash
disks/drives),memory card, CD-ROM,…
Computer
 Input device
• This is a device used to enter data and instruction
to a computer.
• Examples: Keyboard, mouse,…
 Output device
• This is a devise used to send data and information
from a computer to another device.
OR
• This is device that allows someone to see what the
computer has accomplished.
• Examples: Monitor, printer, speaker, …
Computer
Types of Computers
 Types of computers (based on size and
capacity) – four types:
• Super computer
• Mainframe computers
• Minicomputers
• Microcomputers
Types of Computers
 Super computer
• Is the type of computer that has the highest
processing power of its time.
OR
• It is an extremely fast computer that can perform
hundreds of millions of instructions per second.
• NOTE:
• You will not need this for just accessing Facebook or
Instagram.
• It is usually used for a lot of complex tasks like weather
forecasting, quantum mechanics, modeling molecular
structures, ….
Types of Computers
 Mainframe computer
• Is a type of computer that is huge, with very high
processing power, but less than the supercomputer.

• They are used by organizations that need to store


and process large amounts of data and information.
• Used by big companies, government agencies and
banks.
 Minicomputers
• Is the type of computer that can support up to 200
users at the same time.
• It’s like a less powerful mainframe computer, and is
about the size of a refrigerator.
Types of Computers
 Microcomputers
• Is a type of computer that is widely used and the
fastest growing type of computer.
• It is the cheapest compared to the other three types
of computers.
• It is especially designed for general usage like
entertainment, education and work purposes.
• Well known manufacturers of Micro-computer are
Dell, HP, Acer, Apple, Samsung, Sony & Toshiba.
• Examples:
• Desktop computers, Gaming consoles, Sound &
Navigation system of a car, Netbooks, Notebooks, PDA’s,
Tablet PC’s, Smartphones, Calculators.
Functions of Information Technology
Functions of Information Technology
(Continued)
 Capture
• The process of compiling detailed records of activities.
• Entering the records into the computer or system.

 Processing
• Is the process of converting, analyzing, computing, and synthesizing all
forms of data or information.
• Examples of processing:
• Data Processing
• Information Processing
• Word Processing
• Image Processing
• Voice Processing
The Functions of Information Technology
(Continued)
 Generation
• Is the process of organizing information into a useful
form, whether as numbers, text, sound, or visual
image.
 Storage and Retrieval:
• Storage is the computer process of retaining
(keeping) information for future use.
• Retrieval is the process by which a computer locates
and copies stored data or information for further
processing or for transmission to another user.
The Functions of Information Technology
(Continued)

 Transmission
• Is the computer process of distributing information
over a communications network.
• Electronic Mail, or E-Mail
• Voice Messaging, or Voice Mail
Computer Memory Measurements
 Computers understands bits – 0’s and 1’s.
 A bit:
• Is the smallest unit of data in a computer.
• A bit has a single binary value, either 0 or 1.
Information (or computer) Security
 The terms below usually refer to more or less
the same concept:
• Information security
• IT security
• Computer Security
• Cyber security
 Meaning:
• Is the protection of data, information and computer
systems from harm, theft and unauthorized use.
Information (or computer) Security
 The main concepts:
• Confidentiality
• Integrity
• Availability
Information (or computer) Security
Information (or computer) Security
 Confidentiality
• Is the protection of data and information from
unauthorized disclosure.
OR
• Means only authorized users can access the data
resources and information.

• NOTE:
• A loss of confidentiality is the unauthorized disclosure of
data and information.
Information (or computer) Security
 Integrity
• Is the protection against improper or unauthorized
modification or destruction of data or information.
OR
• Means only authorized users should be able to
modify the data or information when needed.

• NOTE:
•A loss of integrity is the unauthorized modification or
destruction of data or information.
Information (or computer) Security
 Availability:
• Means ensuring timely and reliable access (and
use) to data or information and computer systems.
OR
• Means data or information and computer system
should be timely available to users when needed.

• NOTE:
• A loss of availability is the disruption of timely access to
(or use of) data or information or computer system.
Information (or computer) Security
Computer Security Terminologies
 Adversary (threat agent)
• An entity (person or organization) that attacks or
compromises the security of data or information or
computer system of an individual or organization.

 Attack
• Is an action that compromises the security of data
or information or computer system of an individual
or organization.
Computer Security Terminologies
 Threat
• Is a possible danger that might exploit a
vulnerability.
 Vulnerability
• Is a flaw or weakness in a computer system that
could be exploited (used) to violate the computer
system’s security policy.
 Authenticity
• The property of being genuine and being able to be
verified and trusted.
• Verifying that users are who they say they are and that
each input arriving at the computer system came from a
trusted source
Computer Security Terminologies
• Threat is what an organization is defending itself
against, e.g. a DoS attack.
• Vulnerabilities are the gaps or weaknesses that
undermine an organization’s IT security efforts, e.g.
a firewall flaw that lets hackers into a network.
• Risk refers to the calculated assessment of
potential threats to an organization’s security and
vulnerabilities within its network and information
systems.
Computer Security Terminologies
 Security Policy
• A set of rules and practices that specify or
regulate how a computer system or
organization provides security services to
protect sensitive and critical computer system
resources.
Computer Security Terminologies
 Countermeasure
• Is an action, device, procedure or technique that reduces,
eliminates or reports the possibility of data, information or
computer system being compromised.

 Risk
• An expectation of loss expressed as the probability that a
particular threat will exploit a particular vulnerability with a
particular harmful result.
Computer Security Terminologies
 System Resource (Asset)
• Is data or information contained in computer system.
OR
• Is a service provided by a computer system.
OR
• Is a component of a computer system, can be hardware or
software.
OR
• Is a facility that houses a computer system or systems and
its components.
Computer Security Terminologies
Security Attacks
Security Attacks
 Interruption
• This is an attack on availability.
 Interception
• This is an attack on confidentiality.
 Modification
• This is an attack on integrity.
 Fabrication
• This is an attack on authenticity.
Malware
 The term malware came from two words:
• Malicious
• Software
 Simply put: Malware = Malicious software

 Definition:
• Malware is a program or software (a set of instructions)
that has harmful or malicious intentions to data,
information or computer system of an individual or
organization.

 Malware can damage or destroy data, information


or computer system.
Malware
 Below are some types of malware:
• Virus
• Worm
• Trojan
• Spyware
• Adware
Malware
 Virus
• Is a type of malware that attaches itself to another
program or file and performs malicious actions when
that program is opened.
• It depends on one to open a file or program containing the
virus for it (virus) to work.
 Worm
• Is a type of malware that maliciously reproduces
itself and spreads from computer to computer.
• It does not need a host file, host program or external action
for it (worm) to work.
Malware
 Trojan
• Is a type of malware that presents itself as a very
useful software or file, but once downloaded, it
performs its malicious actions.
• It can be used to gain access to sensitive data and then
modify, block or delete the data.

 Spyware
• Is a type of malware that performs its malicious
actions secretly and reports back to a remote user.
• It is often used to steal financial or personal information.
Malware
 Adware
• Is a type of malware that is used to collect data on
your computer usage and provide appropriate
advertisements to you.
Malware
Any Question(s)
END

You might also like