0% found this document useful (0 votes)
49 views15 pages

Minn2010 Course Notes Introduction To Computers (Hardware and Software)

This chapter introduces concepts related to computers, information technology, and their applications. It discusses definitions of information technology and its role. It also discusses computer hardware and software, as well as applications of IT in personal and professional contexts, and for the mining industry specifically. Some key impacts of IT in mining mentioned are increased productivity, higher throughput, maintenance optimization, improved safety, decreased costs, and minimized environmental harm. The chapter aims to provide readers with foundational understanding of these topics as computers and networks are increasingly important tools in the mining field.

Uploaded by

Simiso Gasa
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
49 views15 pages

Minn2010 Course Notes Introduction To Computers (Hardware and Software)

This chapter introduces concepts related to computers, information technology, and their applications. It discusses definitions of information technology and its role. It also discusses computer hardware and software, as well as applications of IT in personal and professional contexts, and for the mining industry specifically. Some key impacts of IT in mining mentioned are increased productivity, higher throughput, maintenance optimization, improved safety, decreased costs, and minimized environmental harm. The chapter aims to provide readers with foundational understanding of these topics as computers and networks are increasingly important tools in the mining field.

Uploaded by

Simiso Gasa
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 15

MINN2010 COURSE NOTES

CHAPTER 1

Introduction to computers (hardware and software)

The objectives of this chapter are to introduce the readers to the following concepts in theory
and where possible to practically illustrate the concepts:

 Information Technology definitions


 The Internet and the world wide Web
 Software: Tools for productivity and Creativity
 Hardware: CPU and storage (Details are covered in Chapter 2)
 Communications, Servers and Networks, Cyber-threats,
 Personal Technology
 Challenges of the digital age
 Building systems and applications: Programming and Languages (Algorithms,
flowcharts, and pseudocode)
 Advanced computing systems (Operating systems and specialized computing hardware)
 Historical applications of computing in mining

Outcomes of the chapter

After completing this chapter, it is expected that the reader will be able to articulate the
following concepts:

 Provide basic definitions of Information Technology and its applications in their personal
life as well as in the mining industry
 The user will be able to understand the Internet and the world wide web and be able to
understand the processes in the mining industry that are interfaced with the internet and
the significance of the Internet. The reader should also be able to practically use the
internet to conduct research work that can assist in the development of new knowledge
in the mining field and the improvement of processes in the mining industry.
 Understand the difference between computer software and hardware.
 Have an understanding of Communications, Servers and Networks, Cyber-threats, and
the challenges of the digital age. In addition to that, current technologies are being
applied to the storage of data in the mining industry.
 Have an understanding of algorithms and pseudocodes and they contribute to the
building of effective and efficient software that can be used in the mining industry.
 Readers should understand the operating systems of a computer and be able to
practically log onto the windows and Linux operating system and conducting various
tasks in the different operating system.

Relevance of this chapter to an engineer in the mining profession

With the current technological and advancements and advancement in the areas of Artificial
intelligence and Machine Learning. The mining industry is transitioning towards automating
most of the process that are currently mechanized. Computers and networks of computers
are playing a huge role in implementation of various systems in the mining industry. It is
therefore important for a mining professional(s) to understand the tools or “vehicles” that
are being used to effect these changes.

1.1 Introduction to Information Technology

Information technology (IT) is a generic word composed of two words, which describe
computer technology and Telecommunications. IT is a general term that refers to the
application of any technology that is essential in the storage, communication, and
dissemination of Information. IT entails the use of computers, storage, networking, and other
physical devices, infrastructure, and processes to create, process, store, secure, and exchange
all forms of electronic data. An example of IT is computers and other handheld devices which
include appliances and other machines.

IT is used consciously or subconsciously daily by most people across the world. The use of
IT may be used for personal access for instance Smart phones or business operations to
manage and innovate information in line with their processes.
Some of the innovations that have been seen from 1969 that continue to evolve and are
currently being used are: The Internet, broadband, the world wide Web, Mobile phones,
internet, GPS devices, and internet social networking.

1.1.2 The role of Information Technology

To understand the role of IT, it is important to have a clear definition of what IT is. IT
comprises both of Computer technology and Information Technology.

1.1.3 Computer Technology

The formal definition of a computer is a programmable, multiuse machine that accepts data
which includes raw facts and figures and it processes or manipulates it to information that
we can use. The main goal of using a computer is to speed up problem solving and increase
productivity. A computer stores, retrieves and processes data. It is capable of performing
calculations and operations based on instructions provided. Computers are used for
personal tasks and they are also employed in various industries for instance education and
the mining industry to make processes more effective.

1.1.4 Telecommunication Technology

This is also known as communication technology and it refers to the use of electromagnetic
devices and systems for communication over distances. For example, the use of radio or
Television. There is also communication that happens online on the internet. Online refers
to using a computer or any other devices to connect through a network to access information
and services from a computer or information device.

A network is a communication system that connects two or more computers. The internet is
an example of such a large network.
1.1.5 Application of IT for Mining Engineering student or professional (Personal life)

As mining Engineering student or professional, you have used IT services or\and devices and
these technologies advancements will continue to impact you in the future. Some of the IT
services you have used are and are not limited to:

 Education: Online learning, simulations


 Health Services: for instance, telemedicine, robot medicine
 Finances: Use of smart phones and any other devices for online shopping and banking
 Jobs and careers: Finding employment or employees online.
 Relationships: Online dating

Becoming Techsmart as a mining Engineer or professional has various benefits for example,
it helps you to learn how to make better buying decisions, you are able to trouble shoot and
fix your own devices without having the need to involve a technical expert. You can upgrade
software on devices on your own, guard yourself against online dangers and you can use IT
to effectively advance your career.

1.1.6 Information Technology services in the mining industry

In the mining industry, computers are mostly used for:

 Process automation
 Remote operations
 Data Driven decision making

1.1.7 Impacts of application of Information Technology in the mines

 Increased Productivity
 Higher throughput
 Maintenance optimization
 Improved safety
 Decreased operating costs
 Minimized environmental harm

1.1.8 Understanding a computer

There are various types of computers. Some of the categories of computers commonly used
are: Supercomputers, mainframe computers, workstations, microcomputers,
microcontrollers and servers. To understand how a computer works, we will look at three
main concepts.

 The purpose of a computer: The main purpose of a computer is to process data into
information. Data consists of raw facts and figures that are processed into information.
Information is data that has been summarized or otherwise transformed for use in
decision making.
 Difference between hardware and software

Hardware consists of all machinery and equipment in a computer system whereas


software or programs consists of all electronic instructions that tell the computer how to
perform a task.

 The basic operations of a computer: Irrespective of type or size of the computer, all
computers have four basic operations. There is input, processing, storage, and output.
The input is put into a computer system. Processing is the manipulation a computer does
to transform data into information. Storage refers to the devices and media that stores
data or information permanently. Output is the results of the processing which is usually
information.
 Computers in the mining industry

The mining industry in some cases employs the use of rugged computers. The mining
environment is rough usually characterized by high levels of dust, vibrations from vehicles,
high humidity with very hard and rocky surfaces. Rugged computers are used in the mining
industry because they have capabilities to deal with the harsh conditions. The computers are
often used for: GPS and GIS, safety, Data collection and Data analytics and for communication
and managing of fleet.

Summary

This section has presented Information Technology (IT)’s definition in terms of computer
and telecommunication technology. We have also looked at the application of IT in a personal
context for a mining engineering student or professional. Information Technology
applications in the mining industry have also been presented. Prior to understanding of the
applications of computers in mining, it is imperative that computers concepts be understood.
The definition of computers, the difference between hardware and software as well as
applications of computers in the mining industry are therefore presented.

TEST YOUR UNDERSTANDING SECTION 1.1

Question 1
What is Information Technology?
Question 2
Describe three areas in which IT can be applied to the personal life of a mining engineering
student or mining professional
Question 3
Explain three applications of Information Technology in the mining Industry
Question 4
Provide with examples the difference between a computer software and hardware
1.2 THE INTERNET AND THE WORLD WIDE WEB

The internet plays a very significant role in the lives of millions of individuals across the
world. A mining engineering student or professional uses the internet or an application that
requires the internet daily. This section will expand and provide a formalization of the
concepts of the internet and the world wide Web. There are various activities in our daily
living that require the use of the internet. Some of these areas are: Sending and receiving of
emails & discussion groups, Research & information, News, Entertainment, File
downloading, E-shopping, Financial matters, Auctions, Telephony & conferencing, Career
advancement, Distance learning, E-business, Social networking, Health care and Law
enforcement

The mining industry uses the internet for various applications. One of the fields that the
mining industry is currently applying the use of the internet is an area known as the Internet
of Things (IoT). The internet of things is a technology that allows us to add a device to an
inert object (for example: vehicles, plant electronic systems, roofs, machines, lighting, etc.)
that can measure environmental parameters, generate associated data, and transmit them
through a communications network. Further details on the IoT will be provided in chapter
four. We will begin by defining the internet and the World Wide Web which are the focus of
this section.
The Internet is a universal network of billions of computers and other electronic devices.
World Wide Web, which is also known as a Web, is a collection of websites or web pages
stored in web servers and connected to local computers through the internet. These websites
contain text pages, digital images, audios, videos, etc. Users can access the content of these
sites from any part of the world over the internet using their devices such as computers,
laptops, cell phones, etc. The WWW, along with internet, enables the retrieval and display of
text and media to your device.
The difference between the world wide web and the internet

Some people use the terms 'internet' and 'World Wide Web' interchangeably. They think
they are the same thing, but it is not so. Internet is entirely different from WWW. It is a
worldwide network of devices like computers, laptops, tablets, etc. It enables users to send
emails to other users and chat with them online. For example, when you send an email or
chatting with someone online, you are using the internet.

But, when you have opened a website like google.com for information, you are using the
World Wide Web; a network of servers over the internet. You request a webpage from your
computer using a browser, and the server renders that page to your browser. Your computer
is called a client who runs a program (web browser) and asks the other computer (server)
for the information it needs.

1.2.2 Connecting to the Internet

To use the internet, you are required to firstly be connected to the internet. You have
probably connected to the internet before; however, it is important for a mining engineering
student and professional to understand the series of events that occur “behind the scenes”
in order for an individual to connect to the internet. Whichever way you connect to the
internet; the bandwidth will determine the speed of your connection. There are two
important definitions that should be considered, this are:

Bandwidth: This is also known as channel capacity and it an expression of how much data,
text, voice, video, can be sent through a communication channel.

Broadband: This is high speed connection include various kinds of high speed wired
connections, such as coaxial and fibre optics cable, DSL and wireless connections such as
satellite.

Baseband Transmission only allows one signal at a time.


When several signals are transmitted at once, it is termed as broad band transmission.

1.2.2 Connecting to the Internet: Narrowband and access Providers.

The physical connection of the internet could be wired or wireless. Urban and many
suburban areas offer more broad band connections that rural areas do. There various
ways of connecting to the internet. These various ways are listed below:
 Telephone (Dial – up) modem: Used mostly in rural areas
 High speed phone lines, including DSL Modem and T1 and T3 lines. It is more expensive
and available in cities and most towns.
 Wireless modem
 Narrowband (Dial-Up Modem): Low Speed but inexpensive
 Cable Modem: Close Competitor to DSL;
 Satellite Wireless Connections.
 Other Wireless Connections: Wi-Fi, 3G & 4G; and

1.2.3 Internet Access Providers.

A mining student or professional needs to know how to choose an internet access provider
that is right for them. Apart from having an internet access device, to connect to the internet
requires one to go through an internet access provider. An Internet Service provider (ISP)
may be local, regional or a national organization that provides access to the internet for a
certain amount. An example of an ISP in South Africa is: MTN, Telkom, rain, MWEB, Vox,
WebAfrica, Axxess, RSAWEB, Afri host and cool Ideas.nA wireless Internet Service provider
enables users with computers containing wireless modems for instance laptops, tablets and
smart phones to gain access to the internet.
1.2.4 How does the Internet Work?

As previously defined, the internet which is also known as the international network is a
huge network that connects hundreds of thousands of smaller networks. It consists of
hundreds of thousands of smaller networks linking educational, commercial, non-profit and
military organizations as well as individuals. One of the important aspects to understand
when considering how the internet works is a client server network.
A client computer is a computer requesting data or services. A server or host computer is a
central computer suppling data or services requested of it.

1.2.5 Internet Connections: POPs, IXPS, Backbone and Internet2

Figure 1: Internet Connections


1.2.6 Important to note:

 Point of Presence (POP):


It is a local access point to the internet. A collection of modems and other equipment in a
local area.

 Internet Exchange Point (IXP)


Is a routing computer at a point on the internet where several connections come together?

 Internet BackBone
High speed, High-capacity transmission lines, usually fiber optics lines that use the newest
communication technology to transmit data across the Internet.

 Internet2
Is a nonprofit cooperative University/business education and research project that enables
high end users to quickly reliably move huge amounts of data over high-speed networks.

Internet Communications: Protocols, Packets, and IP addresses

The data transmitted over the internet must be set up to follow certain rules so that all the
computers on the network can understand it.

Protocols: is set of rules that computers must follow to transmit data electronically

Packets: Small segments of a larger message

Internet Protocol (IP) Addresses:

An IP address uniquely identifies each computer and device connected to the internet. An IP
address consists of four sets of numbers between 0 and 255 separated by decimals which is
called a dotted quad for example 1.160.10.240

There are two types of IP addresses namely the dynamic and static addresses.

 Dynamic IP address: This is a temporary address for devices connected to a network that
continually changes over time.
 Static IP address: When a device is assigned a static IP address, the address does not
change.

Who Runs the Internet?


Although no one really “owns” the internet, several global and U.S organizations establish
standards for it.
1.2.4 The world Wide Web
As previously presented, the Internet and the World Wide Web are different.

Browsers, Websites, & Web Pages


 Browsers: is a software for surfing the Web. A web browser or browser is software that
enables you to find and access the various parts of the Web.
 Website: A website or simply site is a location on a particular computer on the web that
has a unique address.
 Web pages: A web page is a document on the World Wide Web that can include text,
pictures, sound, and video. The first page you see at a website is like the title page of a
book. This is the home page, the starting point or the main page of a website that contains
links to other pages at the site.
Note

A browser is software that gets you to websites and their individual web pages and displays
the content in such a way that the content appears mostly the same regardless of the
computer, operating system, and display monitor.

How the Browser Finds Things: URLs.


Uniform Resource Locator (URL) is a string of characters that points to a specific piece of
information anywhere on the web. A URL consists of the web protocol, the domain name or
webserver name, the directory name (folder) on that server and the file within the directory.

HTML& Hyperlinks.
Hyper Text Markup Language (HTML) is the internet’s formatting language and links allows
users to jump easily around the web page. HTML is the set of special instructions (Called
“tags” or “mark ups”) that are used to specify document structure, formatting and links to
toher multimedia documents on the Web.
Hypertext Links also called hperlinks, hotlinks or just links are HTML connections to other
documents or web pages that contain related information. A word or phrase in one document
becomes a connection to a document in a different place. Hyperlinks appear as underlined
or coloured words and phrases.

A browser is software that interprets HTML and thus allows you to move around the web
and to access, retrieve and post information including multimedia.
Search Services & Search Engines, & How They Work.
Search services are organizations that maintain databases accessible through websites to
help you find information on the internet.
Search engines are programs that enable you to ask questions or use keywords to help locate
information on the web. A search never covers the entire web and a search engine differ in
what they cover.
1.2.5 Email & Other Ways of Communicating Over the Net

There currently various ways to communicate to organizations or individuals over the


internet.
Some of the ways are by use of email, Instant messaging, chatbots, discussion groups and
FTP. The use of an email has already been covered in your first year of study. In this work,
you will have practical tasks to test what you have learnt so far and to emphasize what one
should be aware of when sending and receiving communication by email.
Instant messaging enables you to communicate by email with specified other users in real
time. Mailing list is an email discussion group on a special interest topic, in which subscribers
receive email messages sent to the group’s email address. Some mailing lists are one-way ie
you can only receive communication. There are mailing lists in which the subscriber sends a
message to all other subscribers, who my respond in a similar way. Newsgroup is a huge
electronic bulletin board on which users conduct written discussions about a specific
subject. A message board is a web based discussion group that does not require a
newsreader. File Transfer Protocol (FTP) is an internet standard for uploading and
downloading files between computers, including those with different operating systems.

1.2.6 New services offered over the Net, social networks.

Services provided by the internet and web are:

• Telephony: The Internet Telephone & Videophone.


• Multimedia on the Web.
• The Web Automatically Comes to You: Webcasting,
• Blogging, & Podcasting.
• E-Commerce: B2B; B2C & C2C; and Web 2.0, Social Networking, Media Sharing, &
Social-Network Aggregation.

1.2.7 The Intrusive Internet

When on the internet in personal capacity or as a working professional, you should adhere
to good working principles that will ensure you protect your identity, financial information
and the information of the company or organization you are working for. Be aware of the
following concepts:
• Snooping on Your Email: Even if you delete your emails and texts, your messages are open
to anyone. Pay attention to information that you send in your emails and texts. Information
send by email can be forwarded to someone else at any point or time.
• Spam: This is unsolicited email or junk mail in the form of advertising or chain letters. Most
of the time. Usually, you did not recognize the sender of the email. The subject line of the
email can also be vague.

Spoofing: This refers to the forgery of an email sender name so that the message appears to
have originated from someone or somewhere other than the actual source. Spoofing may
illegal or legal. Phishing: Refers to sending of a forged email that directs the recipients to a
replica of an existing web page, both of which pretend to belong to a legitimate company.
The main goal of the sender is to “Phish” for or entice people to share their personal financial
or password data. Usually, the email will seem to have originated from a known source for
instance, the following financial institutions: Standard bank, Capitec bank and ABSA.

• Cookies: Convenience or Hindrance?


• Spyware—Adware, Browser & Search Hijackers, &Key Loggers: Intruders to Track Your
Habits & Steal Your Data.
• Malware: The Viciousness of Viruses; and
• Passwords.

Test your understanding.

1. Provide the difference between the world wide web and the internet.
2. Define bandwidth and broadband?
3. What is an IP address and what does it do?
4. List four intrusive internet concepts

Videos for extra learning

https://www.youtube.com/watch?v=7_LPdttKXPc

You might also like