0% found this document useful (0 votes)
43 views9 pages

INTRO TO ICT Notes

The document discusses different types of computer software. It defines programming as a list of instructions for the computer to follow to process data. It discusses the types of software as system software which controls computer hardware and supports application software, and application software which allows users to perform specific tasks. Some examples of application software mentioned are word processors, spreadsheets, web applications, and assistant programs.

Uploaded by

nabihah zaidi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
43 views9 pages

INTRO TO ICT Notes

The document discusses different types of computer software. It defines programming as a list of instructions for the computer to follow to process data. It discusses the types of software as system software which controls computer hardware and supports application software, and application software which allows users to perform specific tasks. Some examples of application software mentioned are word processors, spreadsheets, web applications, and assistant programs.

Uploaded by

nabihah zaidi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

FUNDAMENTAL OF IT

Saturday, 24 September, 2022 11:59 PM

SYSTEM TECHNOLOGY COMMUNICATION


- Accept input/ produce output - Method to solve problem - Exchange information between
(transformation process) Two or more person

the concept of Data, Information, IT & ICT PARTS OF INFORMATION SYSTEM (IS)
IS - The study of all companents that people/organization use to collect, filter,
DATA - raw fact (numbers/characters/unprocess image)
process and distribute data
INFORMATION - data that is organized/meaningful
IT - the overall study of procedure, structure and the processing of various
types of data
ICT - any product that will store, retrieve, manipulate, transmit o receive
information elecronically in a digital form (email)

SYSTEM SOFTWARE APPLICATION SOFTWARE


- Control / support the operators of a - Program that processing for a particular
computer system use of computer by end users
- Enable app software to interact --> - i.e > Word, Spreadsheet
comp hardware
- i.e > o/s programme (MS Windows)

TYPE OF FILES EVALUATION OF ICT

- Document
- Database
- Worksheet
- presentation

INTRO TO ICT Page 1


THE INTERNET AND CURRENT ISSUES
Sunday, 25 September, 2022 6:53 PM

INTERNET INTRANET EXTRANET


mean A global network of computer Private, secure network used by employees for Private, secure network to share business
interconnected to communicate with each internal communication and sharing information information with partners, supplies, etc
other and share information
function Staff Collab with business partners /
- information management communication with customers
- communication/collaboration
- Self-service tools
benefits - Access information - More secure - High security of data
- Low cost marketing - Involve only specific users - Increase customers satisfaction
- Cost effective
drawbacks - High competition - Complex to maintain - Security issues
- Data thefts - Still have security threats - Require technical employee

Two key players in every transactions --> SERVER / CLIENT


- SERVER - computers with 24 hours internet connection that provide access to their >
files/programme
- CLIENTS - software program used to access files on server
INTERNET PROTOCOL (IP)
- Used for communicating data across a packet-
switched internetwork using TCP/IP DOMAIN NAME - organized by type of organization @ country
Eg. www.tana.org ------> 192.34.8
- .biz (business) - .gov (government)
- .com (commercial sites) - .info (information)
- .edu (educational) - .int (limit to organization)
DOMAIN NAME SYSTEM (DNS) - .mil (military) - .net (networking)
- It translate human-friendly computer hostnames into IP address - Name (individual) - .org (organization)

INTRO TO ICT Page 2


SOFTWARE
Thursday, 13 October, 2022 10:21 PM
TYPES OF COMPUTER SOFTWARE

Define programming A list of instructions for the computer to follow to process SOFTWARE - collection of computer programs/ related data that
data provide the instructions telling a computer what to do and how
to do
6 steps of P specification BOOTING - process of loading an OS into the computer’s main
programming P design memory
P code 1. TURN COMPUTER ON
2. DIAGNOSTIC ROUTINE TEST MAIN MEMORY, CPU
P test
3. BIOS PROGRAMS ARE COPIED TO MAIN MEMORY
P documentation 4. OBTAIN OS / LOAD IT INTO COMP'S MAIN MEMMORY
P maintenance
WARM BOOT - restart computer without turning off
COLD BOOT - start computar that has been turned off
5 generations of OS FUNCTIONS
programming Relation between end
languages users and computer

General purpose USER INTERFACE


applications - COMMAND-DRIVEN (DOS/UNIX prompt)
- MENU-DRIVEN (choose on the menu)
- GRAPHICAL UI (icons/bars/button)
Interact with menus/visual images

MALWARE
- Software that is intended to damage or disable
computers and computer systems

WEB APPLICATION
- A website that allows users to access and interact with
software from any computer or device that is
connected to the internet
(gmail/google docs)

Word processors An electronic device or computer software application RESOURCE MANAGEMENT


that performs the task of composition, editing, - manages the hardware and networking
formatting, and sometimes printing of documents resources of a computer system (CPU,memory)
- Eg. Memory management programs
spreadsheets Allows users to organize data in rows and columns and FILE MANAGEMENT
perform calculations -The file system arranges files in a hierarchical manner
○ Top level is directories (folders)
○ Subdirectories come below folders
• Find files using their pathname.
• Example: C:/MyDocuments/Termpaper/section1.doc
Database a. Database is a collection of data organized in a manner TASK MANAGEMENT
management that allows access, retrieval, and use of that data. - Part of the operating system that helps accomplish
systems b. It allows users to create access, and manage a database the computing tasks of end users
- TASK = printing
- MULTITASKING = word processing/ playing music
Presentation It allows users to create visual aids for OPERATING SYSTEM
programs presentations to communicate ideas, messages, - Stand alone/dekstop (computer's hard disk)
and other information to a group = windows /mac
- Embedded (handheld devices)
= Iphone / Android
- Network (network server)
= UNIX / Linux
Shareware a. Software that is available free of charge and often DOS - disk operating system (IBM)
UTILITY SOFTWARE
distributed informally for evaluation, after which a fee - Easy to use
may be requested for continued use. - Not support multitasking
Utility software Antivirus software / Backup software / Disk tools UNIX - machine independent
- Support multitasking
Specialized OS/2 - support multitasking
applicaton Require memory intensive apps
Graphic programs MACINTOSH -for Apple
Web authoring MICROSOFT WINDOWS - to control/ manage computer
program activities
COMPILER Computer software that transforms computer code
writen in a high level to lower level

Specialized TYPES OF WINDOWS


professional 3.1 Require high memory/storage
applications
95 Twice better than (3.1) , plug n play
98 Support add hardware (MMX, DVD)
2000 32 bit os, support internet service
Mil Edi Featuring tools (video, photo,music)
NewTech Same like UNIX (multi-user). Suitable for high
tech app, graphic/animation
XP (home/corporate users)
7 Advance in touch/handwriting
8 Touchscreen input

Mobile apps LindowOS ----> Linspire (first broadband OS)


App stores BIOS - basic input/output system
Software suites FIRMWARE - control the hardware connected@built into
computer

DEVICE DRIVERS - allow to interact with a hardware device


POWER CYCLING The act of turning a computer off and then on again in SYSTEM SUPPORT PROGRAMS
order to recover from an unresponsive state, such as in a - Utility software
crash or hang situation - Network management
- Application server
- Database manager
- Collaboration tools
- Development tools

PM

INTRO TO ICT Page 3


PM

INTRO TO ICT Page 4


finale
Wednesday, 23 November, 2022 9:56 AM

Chapter 9

SYSTEM - a collection activities and elements organized to accomplish a goal


INFORMATION SYSTEM - collection of hardware, software, people, procedures and data that
work tgt to produce information
SYSTEM ANALYST - responsible for designing / developing an information system

Explain the 6 phases of Systems Development Life Cycle phases? * PADDIM


Phase 1 The organization's problems or needs are identified and summarized in a
Preliminary short report.
investigation - Briefly defining the problem (observation/interview)
- Suggesting alternative solutions
- Preparing a short report
- Survey of user
Phase 2 This individual studies an organization's systems to determine what actions
System analysis to take and how to use computer technology to assist them
- Prepares a preliminary investigation report
- Gathering and analyzing data
The report - Describes the current information system, the
requirements for a new system, and a possible development
schedule
Phase 3 New or alternative information systems are designed and design report is
System design created
- Design alternative systems
- Select best system
- Write a systems design report
Evaluate systems according to;
• Economic (cost vs benefit)
• Technical (hardware/software available)
• Operational (will it work)
Phase 4 New hardware and software are acquired, developed, and
System tested
development - Hardware and software are normally acquired
- Test the new system to see wether the results are correct

Phase 5 This can be happen in four different strategies; direct, parallel,


System phased and pilot.
implementation New system is installed, and people are trained to use it
(conversion) - Selecting the conversion type
- Train users
Phase 6 In this ongoing phase, the system is periodically evaluated and updated as
System needed
maintenance - considered to be an ongoing activity
- Spend more time and money
- Improve SYSTEM AUDIT (compared original design specifications
whether the new procedures are actually furthering productivity)
and PERIODIC EVALUATIONS (the new system is periodically evaluated
to ensure that it is operating efficiently)
- Making changes based on new conditions

What are the roles of Managers in SDLC?


Managers within an organization should manage the overall project to ensure it stays with
budget and on time.

During Systems Design, how do you evaluate system alternatives?


Systems designers evaluate each alternative in the systems design phase for feasibility by
looking at economic (time for the system to pay for itself), technical (available training)
and operational factors (Will the system work within the organization?)

Explain the strategies of system implementation


There have four different strategies in system implementation which is;
- DIRECT (abandoning the old system and starting up a new one)
= risky (problem arising) / not recommended
- Parallel (operate old and new systems side by side until new one is reliable)
= costly
- Pilot (try out the new system only for one part of organization first)
= preferred
- Phased (new system is implemented gradually over a period of time)
= less risk / many people perform similar operations

INTRO TO ICT Page 5


= less risk / many people perform similar operations

How do you do system maintenances?


Maintenance adjusts and improves the system audits by comparing the new system
to its original design specifications and periodic evaluation to ensure that it is
operating efficiently

What are prototyping and RAD?


Prototyping - building a model that can be modified before the actual system is installed
Rapid Applications Development (RAD) - a method to speed up the process of building a system
(software/team/personnel)

What are the analysis methods in phase 2?


System analysis which is gathering data by receiving documents and conducting
interviews etc. After the data has been gathered, it must be analysed by the systems
analyst. The analyst will write a report submitting the required document to the next
phase.

Top-Down Analysis Method - breaks components into smaller components to make each
component easier to analyze and deal with.

Data Flow Diagram - the data is traced from its origin through processing, storage, and output.
Grid chart - shows the relationship between input and output documents
Automated Design Tools (CASE) - to evaluate alternative hardware and software solutions
System flow chart - show the flow of input data to processing to achieve output

Chapter 10

Explain about Information Quality attributes


Information products made more valuable by their attributes, characteristic or qualities.
Information has three dimensions which is time, content and form

DECISION STRUCTURE
- Structured (operational) = can be specified
- Semi-structured (tactical) = pre-specified DSS HELP
- Unstructured (strategic) = not possible to specify in

What is Business Intelligence


A broad category of applications and technologies that describes the concept and methods to
improve business decision making by using fact-based support system

What are MIS, DSS, KMS, OLAP & Data Mining?


Decision Support Systems (DSS)
= computer-based IS that provide interactive information support
= quick-response systems that are initiated and controlled by decision makers

Management Information Systems (MIS) SUPPORT/NEEDS


= information that is collected, processed and presented to support managerial decision making
= Periodic scheduled(regular basis) /Exception(exceed limit) /Demand(immediate) /Push

Knowledge Management Systems (KMS) - It captures, organizes, and disseminates knowledge

Online Analytical Processing (OLAP) ONLINE


= multi-dimensional database to support quick reporting that involve trend -analysis
= analyzing complex data items in databases
= reporting tool in BI
= CONSOLIDATION kumpul data yg berkaitan / DRILL-DOWN automatic figures terpapar/
SLICING AND DICING look from different point
= MOLAP stores data / ROLAP relational data / HOLAP data stored

Data Mining
= to discover paterns,trends from large data --> understanble structure --> decision support
(to improve business performance)

• Problem definition
• Creating database
• Exploring database
• Preparation for creating data mining model
• Building data mining model

INTRO TO ICT Page 6


• Building data mining model
• Evaluation phase
• Deploying data mining model

• Executive Information System (EIS)


= combines many features of MIS and DSS / support the decision making needs for top
executives.
• Enterprise Information Portals (EIP)
= web-based interface that give all intranet/extranet users access

What is Knowledge Management Systems?


Organized collection of people, procedures, software, database, and devices. KMS used for
creating, storing, sharing, and using the organization's knowledge and experience

What is AI, ES, Fuzzy Logic, Neural Networks, VR & Intelligent Agents?
- Artificial Intelligence (AI) = develop computers with the ability to mimic or duplicate the
functions of the human brain
• Expert Systems (ES) = Hardware and software that stores knowledge and makes inferences
similar to a human expert
• Learning system
• Fuzzy Logic = used to respond to questions in a humanlike way - using qualitative ( very high,
increasing)/ system analyse imprecise and subjective information
• Genetic algorithms = continue analyze until best solution
• Neural Networks = capable of machine learning and pattern recognition / can be trained to
learn/ processing sample
• Virtual Reality (VR) = A computer-simulated environment that can simulate physical presence in
places in the real world or imagined worlds.
• Intelligent Agents = accomplish specific tasks by users
• Robotics applications
• Natural interface applications

What is Information Resources Management (IRM)?


An emerging discipline that helps managers access and exploit their information assets for
business development

How to manage information as strategic asset:


• Understand the role of Information.
• Develop clear policies on Information Resources
• Conduct an Information Audit
• Exploit technology convergence
• Encourage sharing culture

Who are CEO, CTO & CIO?


Chief Executive Officer - manage business and IT strategy CEO/CIO
Chief Information Officer - responsible for computer/network/IS technology support services /
data administrator staff report to
Chief Technology Officer - manage IT platform for integrating internally or externally business
applications

Chapter 11

Explain the 4 principles of technology ethics?


PROPORTIONALITY - less harm or risks
INFORMED CONSENT - understand and accept the risks
JUSTICE - fair share of the benefits and the risks
MINIMIZED RISK - avoid all unnecessary risk

What is computer crime?


A criminal act that is committed through the use of a computer, like getting into someone else's
system and changing information or creating a computer virus and causing it to damage
information on others' computers. It can also involve the theft of a computer and any
equipment associated with the computer.

What are these hacking technics of;


• Denial of Service
○ Hammering / flooding a website’s equipment with too many requests for
service or information.
• Scans
○ Widespread probes of the Internet to determine weaknesses of computers,
services, and connections.
• Sniffer
○ exposes the security problem of an unsecured physical connection to the
network.
• Spoofing
○ Faking an e-mail address or Web page to trick/fool users into passing along
critical or private information like passwords or credit card numbers.

INTRO TO ICT Page 7



critical or private information like passwords or credit card numbers.
• Trojan House
○ A program that, unknown to the user, contains instructions that exploit a
known vulnerability in some software.
• Back Doors
○ A hidden point of entry to be used in case the original entry point is detected
or blocked.
• Malicious Applets
○ Tiny Java programs that misuse your computer’s resources, modify files on
the hard disk, send fake email, or steal passwords.
War Dialing
○ Programs that automatically dial thousands of telephone numbers in search of
a way in through a modem connection.
Logic Bombs
○ An instruction in a computer program that triggers a malicious act.
• Buffer Overflow
○ Crashing or gaining control of a computer by sending too much data to buffer
memory.
• Password Crackers
○ Software that can guess passwords.
• Social Engineering
○ Gaining access to computer systems by talking unsuspecting company
employees out of
valuable information, such as passwords.
• Dumpster Diving
○ Sifting through a company’s garbage to find information to help break into
their computers
• Public Domain Software - software that is not copyrighted

TYPES OF INTELLECTUAL PROPERTY


• Copyright
○ A form of protection granted for original works of authorship fixed in a tangible
medium of expression.
• Trademarks
○ A recognizable sign, design or expression which distinguishes products or
services of a particular trader from the similar products or services of other
traders such as industrial design.
• Patents
○ The rights for inventor to exclude others from making, using, selling, and
importing an invention or implementation of an idea for a limited period of time
such as the new gadgets.

How do malware, Biometrics, Firewalls & Public Key encryption works?


Definition + concept If explain go deeper
- Malware is any software used to disrupt computer operation, gather sensitive
information, or gain access to private computer systems. It can appear in the form
of executable code, scripts, active content, and other software.

= VIRUS a program code that cannot work without being inserted into another
program.
= WORMS a distinct program that can run unaided or a virus that spreads itself,
not just from file to file, but from computer to computer via e‐mail and other
Internet traffic
= TROJAN HORSE
= RANSOMWARE
= SPYWARE collects information without user's knowledge
= ADWARE any software package which automatically renders advertisements
in order to generate revenue for its author
= SCAREWARE gathering information about a person or organization without
their knowledge
= FRAUD intentional deception (trick) made for personal gain or to damage another
individual

TO PREVENT COMPUTER CRIMES


Firewalls is a software or hardware-based network security system that controls the incoming
and outgoing network traffic by analyzing the data packets and determining whether they
should be allowed through or not, based on applied rule set.

- Biometrics uses human physical characteristics as a form to provide identification


and access control. It is also used to identify individuals in groups that are under
surveillance.

- Public Key Encryption is the process of encoding messages (or information) in such
a way that third parties cannot read it, but only authorized parties can (doesn't
prevent hacking but it prevents the hacker from reading the data that is encrypted)

Pornography – accessing sexually explicit sites


Hacking – hacking into websites

INTRO TO ICT Page 8


Non-work-related download/upload – download movies, music and graphic materials.
Leisure use of the Internet – shopping, chatting, playing game
Use of external ISPs – using external ISP to avoid detection
Moonlighting – using office resources such as computers and networks to conduct
personal business.

INTRO TO ICT Page 9

You might also like