Lect 5
Lect 5
1. Hardware
– Input devices,
– Processors,
– Output devices,
– Secondary Storage devices
INFORMATION TECHNOLOGY…
• Input devices
– Functions
– Some examples
• Keyboards
• Point-of-Sale terminals
• mouse
• Image Scanners
• Bar code scanners
• Microphones
INFORMATION TECHNOLOGY…
• The processor
– Function
• Components
– the control unit and
– the arithmetic/logic unit
• Memory
– Function
– Types
• RAM
• ROM
INFORMATION TECHNOLOGY…
• Output Devices
– Function
– Some examples
• monitors,
• printers,
• plotters
INFORMATION TECHNOLOGY…
2. Software
– Systems Software
– Application Software
– Application Development Software
INFORMATION TECHNOLOGY…
• Systems Software
– Operating Systems
• Supervisory
– Resident
– Transient
• Job management program
• I/O management program
– Communications Software
– Utilities
INFORMATION TECHNOLOGY…
• Application Software
– Word Processing Software
– File Management Software
– Database Management Software
– Project Management Software
– Accounting Software
– Photocomposition and Desktop Publishing
– Statistical Software
– Training and Tutorial Software
– Thought Processing Software
– Industry Specific Software
INFORMATION TECHNOLOGY…
3. People
– Users
– Information Technology Professionals
INFORMATION TECHNOLOGY…
• Users
– Hands-on users
– Indirect end users
– User managers
– Senior managers
INFORMATION TECHNOLOGY…
• Programmers
• Systems Analysts
• Project managers
• Network specialists
• Trainers
• Computer operators
INFORMATION TECHNOLOGY…
4. Procedures
– Operating Procedures
– Backup and Recovery Procedures
– Security Procedures
– Development Procedures
INFORMATION TECHNOLOGY…
• Operating Procedures
– Are concerned with the execution of an
application.
– Typically, operations procedures include:
• How a system or application is used.
• Who is authorized to use the system and what
each individual is authorized to do.
• How often certain applications are to be used.
• Where results of processing should go.
INFORMATION TECHNOLOGY…
• Security Procedures
– Security procedures are designed to safeguard data
centers, communications networks, computers, and other
IT components from accidental intrusion or intentional
damage.
– Backup copies protect against loss; security procedures
prevent actions that could lead to that loss.
– Common security procedures entail
• limiting individual access to certain databases and
• creating secret passwords that users must input into
the computer to perform certain functions.
INFORMATION TECHNOLOGY…
• Development Procedures
– These explain how IT professionals should
• describe user needs and
• develop applications to meet those needs.
– They may also prescribe
• when and
• how software should be acquired and put into
use.
INFORMATION TECHNOLOGY…
5. Information/Data
– Text
– Sound
– Images
– Other type of Data