You are on page 1of 110

Module 1

Concepts of Information
Technology
Outline
Lesson 1: Hardware.
Lesson 2: Software.
Lesson 3: Networks.
Lesson 4: IT in everyday life.
Lesson 5: Security.
Lesson 6: Legal Issues.
Lesson 1: Hardware
Concepts
Input / Output Ports
Computer Performance
Memory and Storage
Input Devices
Output Devices
Input and Output Devices
Concepts
Information Technology (IT) is a general term
which relates to the use of computers as an aid
to creating and maintaining data.

Hardware is a term that refers to the physical
components of your computer such as the
mouse, keyboard, monitor etc.

Software is the collection of instructions which
makes the computer work.
For example, when you type in words via the keyboard, the software is
responsible for displaying the correct letters, in the correct place on the screen.
Personal Computer (PC)
IBM invented the PC way back in 1981.
In early days most PCs ran an operating system
called DOS (Disk Operating System).
These days most PCs are running a version of
Microsoft Windows such as Windows 7.

Capacity: Large Hard Disk & RAM
Speed: Fast
Cost: Getting Cheaper
Typical Users: Home users, large and
small office users.
Apple Computers
The Apple MAC is a Computer but NOT a PC.
It uses different operating system and special
versions of application programs.
In the early days MAC was distinguished over
PC with the GUI (Graphical User Interface).



Mainframe Computer

Mainframe Computers are big, powerful and
expensive computers that are used in the
background by most of the large organizations.



Laptop & Palmtop Computers

Laptop computers are small portable computers
which can run on batteries as well as main
power.
Notebooks are a very small laptops.
Palmtops are even smaller computers which can
fit to the palm of your hand.








Handled Portable Digital
Devices
A range of small portable digital
devices are now available including:
Personal Digital Assistants (PDAs)
Mobile (Cell) Phones.
Smart Phones.
Multimedia Players.

Personal Digital Assistant (PDA)

These devices use special pen rather than a
keyboard.
They can connect to the Internet and they are
extremely compact.
PDAs can also be used for video recording, word
processing, playing computer games and Global
Positioning System (GPS).

Mobile Phones (Cell Phones)
A mobile phone or a cell phone is used for mobile
communication as well as text messaging,
emailing, accessing the web and many of them
allow you to send and receive pictures and
videos.

Media Players
Media Players allow you to store digital Audio
and Video files.
A famous example is the Apple Ipod.
Some of these devices come with a built-in
screen.

Smartphones
A Smartphone is a mobile phone (cell Phone)
offering advanced computer like features.
They have a sort of Operating System and they
allow you to install applications.
They allow you to connect to other devices, send
and receive e-mails and access the web.

Parts of a computer
The basic elements that make up a
computer include:
Central Processing Unit (CPU)
Types of Memory
The Hard Disk
Input and Output devices
The CPU
The CPU determines how fast your computer will run
and its speed in measured in MHz or GHz.
The CPU is responsible for all the calculations within
the computer.
The CPU contains the following elements:
Control Unit: Responsible for controlling other elements of the
CPU.
Arithmetic Logic Unit (ALU): Performs the mathematical
calculations using data stored within the CPU registers.
Registers: They are memory storage areas within the CPU that
hold the data that is worked on by the ALU.
Bus: Transports data between memory and registers.

Memory (RAM)
The RAM (Random Access Memory) is where
the operating system is loaded when you switch
on your computer.
Application are copied to the RAM when you
start any application.
The more RAM you have, the better computer
performance you get.


ROM-BIOS
The ROM-BIOS (Read Only Memory Basic
Input Output System) is a special chip held on
the computers mother board.
It contains software which is required to make
your computer work with your operating system.
It copies the operating system into the RAM
when the computer starts.

The Hard (Fixed) Disk
Hard Disk is the main storage area in the
computer.
It is used to store operating system,
application programs and data.


Input/Output Ports
These ports are located at the back or
on the side of the computer.
Cables are plugged into these ports to
connect the computer with other
devices.
They include:
USB Port
Serial Port
Parallel Port
Network Port
FirWire Port
Universal Serial Bus (USB)
Port
There are one more USB sockets at
the back of the system unit.
Most of devices are now designated
for the USB such as printers, scanners
and memory sticks.

Serial Port
It is a socket located at the back of the
computer.
It allows the computer to connect to
devices like the modem.
It is commonly labeled as COM1 or
COM2

Parallel Port
It is a socket located at the back of the
computer.
It allows the computer to connect to
devices like the printer.
It is commonly labeled as LPT1 or
LPT2.

Network Port
The Network Port allows you to plug a network
cable into your computer, which will let you
communicate with computers connected to your
local network or to other computers via the
internet.

FireWire Port
FireWire allows high data transfer between your
computer and a compatible device such as a
digital camera.
FireWire has largely replaced earlier ways of
data transfer.

Factors affecting computer
Performance
CPU Clock Speed:
The computer clock speed is measured in
MHz.
It determines how quick the CPU
interacts with other parts (RAM and
Motherboard).
The higher the MHz speed, the faster the
computer.
Factors affecting computer
Performance
RAM Size:
The more memory you have the faster the
PC will operate.

Hard Disk speed and storage:
Hard disk speed affects the data transfer
rate.
The data storage capacity of a hard disk is
measured in Gigabytes.
1Gigabyte = 1024 Megabytes.



Factors affecting computer
Performance
Free Hard Disk space:
Having plenty of Free Space on the hard
disk, makes the computer perform faster.

De-fragmenting files:
When you use a PC over a period of time,
the file get broken up into separate pieces
which are spread all over the hard disk.
De-fragmentation means taking all the
broken up pieces and joining them back
together again.
Start Programs Accessories System
Tools Defragmentation Program.

Factors affecting computer
Performance
Multitasking Considerations:
The more programs running at the same
time, the slower each one will run.

CPU Speeds:
The speed of the CPU is measured in
MHz or GHz.
The higher the value the faster the CPU
will operate.
Memory and Storage
You can store data in your hard
disk, while data which is being
processed is stored in RAM.
Data which is stored in the hard
disk can be permanent, while data
in RAM is temporary.

Random Access Memory
(RAM)
The RAM (Random Access Memory) is where the
operating system is loaded when you switch on
your computer.
Application are copied to the RAM when you start
any application.
The more RAM you have, the better computer
performance you get.
Data and programs stored in the RAM are volatile.
(i.e. the information is lost when you switch off the
computer).
Read Only Memory (ROM)
Read Only Memory (ROM) holds a software
which can be read but not written to.

ROM-BIOS chip is an example, which
contains read-only software.

Network cards, and video cards also contain
ROM chips.
ROM-BIOS
The Read Only Memory-Basic Input/Output
System is a chip located on the
motherboard.

It contains software that performs a variety
of tasks.

When the computer is switched on the
ROM-BIOS software performs a self-
diagnostic to check that the computer is
working OK.

This software then loads the operating
system from the disk to the RAM.
Video (Graphics) Memory
The on-screen pictures are held in
special memory chips called video
memory chips.

These chips are usually located on the
video card.
Measurements of Storage
Capacity
Bit:
Computers work with ones and zeros.
The basic one or zero is called a bit of information.
Byte:
There are 8 bits in a byte.
KB Kilobyte:
1 Kilobyte is approximately a thousand bytes.
MB Megabyte:
1 Megabyte is approximately a thousand Kilobytes.
GB Gigabyte:
1 Gigabyte is approximately a thousand Megabytes.
TB Terabyte:
1 Terabyte is approximately a thousand Gigabytes.

Types of Storage Media
Internal Hard Disk:
All PCs are supplied with an internal hard
disk.
This disk is where the operating system is
stored.
It is also where you store your data and
install your new applications.

Types of Storage Media
External Hard Disk:
It is a secondary hard disk that you can
plug to your computer.
They are normally connected via USB
cable.
They are ideal way to back-up data.


Types of Storage Media
CDs:
Most computers are now supplied with a
CD-Rom drive.
They can hold huge amount of data if
compared to floppy disks.


Types of Storage Media
DVDs:
Stands for Digital Versatile Disk.
They are similar to CD-ROM drives but
they can store much more amount of
data.





Recordable CD and DVD drives allows you
to record data on your CDs.
Types of Storage Media
USB Flash Drive (Memory Stick):
Flash drive connect to the computer by
being plugged in the USB port.
They are supplied in a range of sizes.
They ate used in storing and transferring
small amounts of data.

Types of Storage Media
Memory Card:
It is often used in devices such as digital
cameras, telephones and Mp3 players.
There are different types of memory
cards with different storage capacities.
Many new PCs have built-in slots for
different types of memory cards.


Types of Storage Media
Network Drives:
If you are connected to a network, you
can store your data centrally on the
network server.

Floppy Disks:
Floppy disks are very small and slow if
compared to CDs and DVDs.

Input Devices
Input devices allow you to input
information to the computer.

Keyboard:
It allows you to type information into the computer,
and it is connected to the computer via cables or
wireless.

Input Devices
Mouse:
It is used in selecting menus, pointing and clicking on
items and drag and drop them.



Scanners:
They are used to Scan pictures and printed data.

Input Devices
Tracker Balls:
They are used as alternatives to the traditional
mouse specially by graphic designers.




Touch Pads:
Normally found in laptops and notebooks.


Input Devices
Joysticks:
They are used in some computer games.




Webcams:
Used for video communications.




Input Devices
Digital Cameras:
Used in transferring pictures to the computer.



Microphones:
Used in online communications.


Output Devices
Traditional Computer Monitor:




Flat Screen Computer Monitor:


Output Devices
Projection Devices:
They are used in displaying presentations.




Speakers and Headphones:



Output Devices
Speech Synthesizers:
A recent technology that reads the text for you.

Output devices
Printers:
They are used in printing data like texts and images.
There are many types of printers such as Laser,
Inkjet and Dot Matrix.


Input and Output Devices
Some devices can be used as Input
and Output devices, such as the
modem and the touch screen.
Lesson 2: Software
What is Software?
What is an Operating System?
Examples of Software Applications.
Difference between operating system
and application programs.
Accessibility options.
What is Software?
Software is the collection of
instructions that makes the computer
work.
Software is held either on your
computers Hard Disk, CD ROM, DVD
or on a Floppy Disk and is loaded
(copied) from the disk to the
computers RAM, as when required.

What is an operating
system?
It is a special type of program which
loads automatically when you start
your computer.
The operating system allows you to
use the advanced features of your
computer.
In early days PCs ran an operating
systems called Disk Operating System
(DOS).
These days most of PCs will be
running a version of Microsoft
Windows.
Unix and Linux are other examples of
operating systems.
Examples of software
applications
An application program is the type of
program which you use once the
operating system has been loaded.
Some Examples of Application
Programs:
Word Processing
Spreadsheets
Databases
Presentations
E-mailing
Web Browsing
Photo Editing
Computer Games

Word Processing
Applications
A word processing program (such as
Microsoft Word) allows you to
produce letters, memos, etc., and you
can easily perform Mail Merge.
Spreadsheets Applications
A spreadsheet program (such as
Microsoft Excel) allows you to work
out a companys income and
expenses and then calculate the
balance.
It allows you to make what IF
projections.
Database Applications
A database program (such as
Microsoft Access) allows you to
compile information and then search
this information to extract just the
information you require.
Presentations applications
A presentation program (such as
Microsoft PowerPoint) allows you to
produce professional looking
presentations , which can be printed
out directly onto slides for use with an
overhead projector.
E-mailing Applications
These applications are used in
sending and receiving e-mails.
A famous example of e-mail
applications is Microsoft Outlook.
Web browsing applications
Applications used to view and interact
with the World Wide Web (WWW).
Famous web browsing applications:
Internet Explorer
Firefox
Google Chrome
Photo editing applications
These programs allow you to edit
digital photos.
You can adjust the colors, resize the
photo, remove defects and special
effects.
Example: Adobe Photoshop.
Computer games
There are many different types of
computer games.
The level of graphical details of the
games is getting better every year.

Difference between the operating
system and the application program
The operating system works closely
with the hardware that you have
installed within your computer.

The application programs are installed
into the operating system and they are
specific to particular tasks.
Accessibility options
Voice recognition software:
It lets you talk to the computer and use
simple commands or sentences.

Screen reader Software:
It tries to interpret the contents of the
screen and then communicate that
information in different formats.
Recent versions of Microsoft Windows
is supplied with basic screen reader
options.
Accessibility options
Screen Magnifier Software:
It magnifies the screen contents to
make it easier to read.
Microsoft Windows has basic screen
magnifier software included.

On-Screen Keyboard:
It is a representation of the physical
keyboard on the screen to be used by
people who are not able to use the
physical keyboard.
Lesson 3: Networks
LAN (Local Area Network)
It is a system where 2 or more PCs are
connected together within a company or an
organization.

WLAN (Wireless Local Area Network)
It allows you to connect to other computers within
your LAN using wireless technology.

WAN (Wide Area Network)
It allows you to connect to other computers over
a wide area (i.e. computers from other countries).
Networks
Client / Server Networks
This term relates to the type of network
where resources are kept centrally on the
server and used locally by the client.


Networks
Internet
The internet is a global network of
interconnected networks.
It was started by the US military.
A huge amount of information from every
category can be accessed through the
internet.
Internet can also be used as a marketing
tool.

Networks
World Wide Web (WWW)
The world wide web (WWW) is just a
small part of the internet .
The (WWW) is basically the text and
picture which you can view using your
web browser.
The term Internet relates to all the
hardware and software involved, as well
as the (WWW), it also includes FTP and
e-mails.


Networks
Intranet Extranet
It is a smaller version
of internet that can be
accessed only by
authorized members.
It is an intranet which
is partially accessible
by outsiders.
A popular way of
sharing information
within a company or
organization.
It allows outsiders with
password to access
the companys
information.
Users need special
software and an
Internet browser to
access it.
Can be useful for
business partners.
Data Transfer
Download is copying data from the internet
or another computer on your LAN to your
computer.

Upload is copying data from your computer
to the internet or another computer on your
LAN.

The speed of data transfer is measured by
the amount of data that is transferred per
second.
Common transfer rate units are bits per
second (bps), kilo bits per second (kbps) and
mega bits per second (mbps).
Broadband vs. Dial-Up Internet
Connections
Dial-up internet access is very slow,
each time you want to connect to the
internet you have to dial up your
internet service provider (ISP) through
your modem, and you are charged by
seconds.

A broadband internet connection
means that you are permanently
connected to the internet and you are
charged by a monthly fee.


Internet Connection Options
Phone line: Your computer is connected to a modem
which connects to the phone line. You can use dialup or
broadband via the phone line.

Cable: The same cable that supplied TV channels can
also supply your Internet connections. Often cable gives
you very high speed Internet access.

Mobile phone: This is often very expensive. The
connection is established via special, Internet
compatible phones. The screen on mobile phone is tiny,
so you are limited in what information you can usefully
view via a mobile phone.


Internet Connection Options
Wireless Hot Spots: Many public
places, such as shopping malls, hotels,
airports and restaurant chains now offer
wireless access to the Internet.

Satellite: If you live in a very remote area,
your only way to connect to the Internet
may be via a satellite link. This may require
large satellite dishes and expensive
specialised equipment. The cost of the
Internet connection may also be high.


Features of a broadband Internet
connection
Always on

Fixed monthly payment

High Speed Access

High risk of attack


Lesson 4: IT in everyday life
The term IT cover a wide range of
computer related fields including:
Installing and maintaining computer systems
and applications.
Designing Computer Networks.
Data management.
Computer hardware maintenance.
Database and software design.

Internet Services for Consumers
E-commerce is a term which relates to
buying or selling via the internet.


There are many websites from where
you can purchase online, Amazon
and E-bay are famous examples.
Advantages of e-commerce
Service available 24/7
Large stock range
Detailed product information
Ability to compare prices
Equal delivery to town and country
Right to return defective goods

Disadvantages of e-
commerce
Possible credit card fraud
Is the website genuine?
What about returning faulty goods?
Purchasing goods from another
country subjects you to this country
rules.
Can you talk to a real person?
E-banking
The term e-banking relates to managing
your money online.
You can pay your bills and transfer
money from one place to another.
Most banks now offer some form of
online banking where the customers can
access the banking services 24/7.
E-government
Census: Every few years census details
are taken and entered into large
computer databases. This data can be
used to extract useful information at any
time.

Vehicle registration: Keeping all vehicle
details centrally is useful for the police,
customs and security services.

Revenue collection

Electronic Voting
E-learning
E-learning refers to learning via the
internet of disk tutorials.

Advantages Disadvantages
One trainer for many people
at many different locations.
Internet connection may
temporarily fail.
Teaching can be at any time
Download speed maybe
slow for some methods of
e-learning
Cheaper to provide than
traditional methods.
There maybe no opportunity
to ask question of a real
person.
Teleworking
Teleworking is the ability to work from
home using telephone, fax and e-mail.



Advantage Disadvantages
Reduced or no commuting
time
Lack of human contact
Greater ability to focus on
one task
Flexible schedules
Negative impact on
teamwork

Reduced company space
requirements
Communication
Electronic mail (e-mail): it allows you to
send messages instantly to another person and it
requires both computers to be connected to the
internet.


Instant Messaging (IM): it provides a
mechanism for real-time communication between
two or more people. Some types of IM software
provide audio and video communication.


Communication
Voice over Internet Protocol (VOIP):
It is a technology that allows you to talk to other
people via the internet.
Skype is a well known VOIP supplier.

Really Simple Syndication (RSS)
feeds:
It is a method used to publish information that
needs to be frequently updated. Most of news sites
have the option of RSS feed. You need a software
called RSS reader to read and update RSS
content.

Communication
Web Log (Blog): A blog is an online diary
created by a user. In your blog you can type your
thoughts, share information and upload images
and videos. There are sites that provides blogs
for free and make its setting-up very easy, such
as Blogspot and Wordpress.

Podcast: It is a way of providing media files
for automatic download to the subscribers
computer or mobile device such as an Apple
Ipod. The word Podcast is a combination
between the words ipod and broadcast.
Virtual Communities
Online community is a group of people
who communicate with each other via
the internet.
It can be a way of keeping in touch with
people you know, getting to know new
people or exchanging information and
ideas between people with the same
interests.
Examples of online communities:
Social networking (Facebook, Twitter, Myspace).
Internet Forums.
Chat rooms.
Online Games.
Virtual Communities
Some sites allow you to share photos
and videos such as Youtube and
Facebook.

Precautions when accessing online
communities:
Make your profile private.
Limit the amount of personal information
you post.
Be aware that posted information is
publically available.
Be wary of strangers.
Health
Ergonomics: It is the study of workers
and their environment, in order to
achieve comfort, efficiency,
productivity and safety.

Repetitive Strain Injury (RSI): It is
caused as a result of poor work
condition and continuous use of the
keyboard and mouse. Using a pad to
rest your arm on may help.
Health
Lightening issues when using a
computer:
It is very important to eliminate reflections
and to control glare and contrast.

Important considerations for users
health when operating a computer:
Use of artificial light.
The amount of light available.
The direction of the light.
Correct Positioning of
Furniture
Monitor
A screen filter should be used.
Brightness and contrast should be
adjusted.
The display screen should have large,
easy-to- read characters.
Image should not be flickered and should
be in large focus.

Mouse
Locate the mouse beside the keyboard
and at the same height with it.
A mouse mat should be used.

Correct Positioning of
Furniture
Desk: Specially designed and height
adjustable tables are recommended.



Chair: A well designed, adjustable
chair is recommended.


Ways to ensure a users
wellbeing
Take regular breaks.
Do some practice stretching
exercises.
Eye relaxation (i.e. blink frequently).
Try not to face bright light sources.
Other health and safety
issues
Cables: Keep all cables tucked out of
the way, preferably boxed.
Power Supply:
Do not overload power sockets.
Use a device that protect your computer from
Power Surges.
Cleaning materials:
Use special material to clean your computer
NEVER USE WATER.
Only clean the computer when it is turned-
off.
Pain: Any pain should be investigated to
prevent any long term harm.
Environment
Computer recycling options:
Recycle the computer components.
Recycle printer cartridges.
Recycle printouts by printing on their
back and using the blank side in a fax
machine.

Environment
Some computer energy saving
options:
Apply computer energy saving settings
to:
Automatically turn-off the screen when not in
use.
Automatically put the computer to sleep when
not in use.
Switch off the computer when not in use.
Use a monitor that consumes less power
in stand-by mode.
Storing the information electronically will
reduce the use of printed materials.
Lesson 5: Security
Identity / Authentication

Authentication: Is the process of
determining that the user is who he/she
claims to be.

Authorization: Allows access to
resources only to those permitted to use
them.

Identification: Is the recognition of an
individual to undertake a specific task.
Security
Methods of Authentication:
What you have - (Keys, ID, Passcards)
What you are (Finger prints)
What you know (Passwords)

Windows can be set to recognize the user who is
logging on and limit that users access to certain
areas, and this is done by using a unique ID
(username) and password.

Smart Cards are plastic cards that are used to access
many applications and it usually requires PIN or
password to ensure authentication.

Data Security
Importance of an off-site backup copy:
Keep a second copy of important
information that is stored on a mobile or
laptop.
Use CDs and DVDs to keep a second
separate copy of data that is stored on
your main computer.
Keep the backup data in a separate and
secure location.

A firewall is a special piece of hardware or
software designed to protect a private
computer system from unauthorized
access.
Ways to prevent data theft
Raise awareness of an individuals
responsibility to use username and
password and to keep them private
and secure.
Lock your computer and hardware
using security cable.
Keep all portable devices secure from
theft to prevent:
Loss of confidential files
Misuse of confidential information
Loss of important contact details
Misuse of important telephone numbers


Working with folders
When you are working with folders on
a network you should consider the
following precautions:
Make personal folders private.
Adjust security settings and permission
levels.
Hide files or folders.

It is illegal to access another users
computer without permission.
Some good password
policies
The password must be easy for you
but not obvious for others to guess.
Passwords should be a minimum of 8
characters.
Passwords that are combination
between letters, numbers and symbols
are the best.
Use the case sensitive option
combining capital and small letters to
form a password.
Change your password regularly.

Malware Viruses, Worms and
Trojans
Malware (Malicious Software) is a term that
covers viruses, worms and trojans.

A virus is a program that attaches itself to
another program and starts to spread in the
computer causing the destruction of information
on your hard drive.
A worm copies itself over a network without
being attached to another program.
A trojan appears to be a useful program but
when it is run, additional malicious programs
start to be installed on the computer without the
users knowledge.
How to protect yourself against
viruses?
Install anti-virus software.
Regularly update your anti-virus
software.
Ensure that your anti-virus software
checks all removable disks before
using them and all files downloaded
from the internet.
E-mail
Do not open an e-mail if you dont
recognize the sender.
Never open an attachment in an
unrecognized e-mail.
Hacking and its threats
Hacking is an unauthorized attempt to
access an information system or
network.
Once a hacker gains access to a
computer, he can access any data stored
in this computer.
One of the best ways of protecting your
computer from hackers is using
Firewalls.
Password cracker is a program which
can decrypt passwords.
Cryptography is used in converting the
data to secret code for security
purposes.
Lesson 6: Copyright and the
law
Copyright is the legal ownership of
original material and licenses.


End User License Agreement
requires you to signify the acceptance
of the terms and conditions of using a
certain software.


Shareware, freeware and open
source
Freeware is a software that is
available for free without license.

Shareware is a software that is
available for free but under certain
conditions, such as limited trail
version.

Open Source is a way of developing
software where it is freely available for
programmers to modify it, and the
resulting software is usually available.

Ethics of Computer Use
E-mail ethics:
Respond to important messages
immediately.
Arrange messages into suitable groups.
Always spell-check your e-mails.
Give a short subject header that reflects
the content of the message.
When an e-mail is no longer required it
should be deleted.
Open attachments and if they are
important file them into your main system.
Ethics of Computer Use
Internet access:
Never allow copyrighted materials to be
shared through P2P programs.
P2P can be a way of spreading viruses.

Software piracy is the unauthorized
copying or distribution of copyrighted
software.

You might also like