INTRO TO ICT Notes
INTRO TO ICT Notes
the concept of Data, Information, IT & ICT PARTS OF INFORMATION SYSTEM (IS)
IS - The study of all companents that people/organization use to collect, filter,
DATA - raw fact (numbers/characters/unprocess image)
process and distribute data
INFORMATION - data that is organized/meaningful
IT - the overall study of procedure, structure and the processing of various
types of data
ICT - any product that will store, retrieve, manipulate, transmit o receive
information elecronically in a digital form (email)
- Document
- Database
- Worksheet
- presentation
Define programming A list of instructions for the computer to follow to process SOFTWARE - collection of computer programs/ related data that
data provide the instructions telling a computer what to do and how
to do
6 steps of P specification BOOTING - process of loading an OS into the computer’s main
programming P design memory
P code 1. TURN COMPUTER ON
2. DIAGNOSTIC ROUTINE TEST MAIN MEMORY, CPU
P test
3. BIOS PROGRAMS ARE COPIED TO MAIN MEMORY
P documentation 4. OBTAIN OS / LOAD IT INTO COMP'S MAIN MEMMORY
P maintenance
WARM BOOT - restart computer without turning off
COLD BOOT - start computar that has been turned off
5 generations of OS FUNCTIONS
programming Relation between end
languages users and computer
MALWARE
- Software that is intended to damage or disable
computers and computer systems
WEB APPLICATION
- A website that allows users to access and interact with
software from any computer or device that is
connected to the internet
(gmail/google docs)
PM
Chapter 9
Top-Down Analysis Method - breaks components into smaller components to make each
component easier to analyze and deal with.
Data Flow Diagram - the data is traced from its origin through processing, storage, and output.
Grid chart - shows the relationship between input and output documents
Automated Design Tools (CASE) - to evaluate alternative hardware and software solutions
System flow chart - show the flow of input data to processing to achieve output
Chapter 10
DECISION STRUCTURE
- Structured (operational) = can be specified
- Semi-structured (tactical) = pre-specified DSS HELP
- Unstructured (strategic) = not possible to specify in
Data Mining
= to discover paterns,trends from large data --> understanble structure --> decision support
(to improve business performance)
• Problem definition
• Creating database
• Exploring database
• Preparation for creating data mining model
• Building data mining model
What is AI, ES, Fuzzy Logic, Neural Networks, VR & Intelligent Agents?
- Artificial Intelligence (AI) = develop computers with the ability to mimic or duplicate the
functions of the human brain
• Expert Systems (ES) = Hardware and software that stores knowledge and makes inferences
similar to a human expert
• Learning system
• Fuzzy Logic = used to respond to questions in a humanlike way - using qualitative ( very high,
increasing)/ system analyse imprecise and subjective information
• Genetic algorithms = continue analyze until best solution
• Neural Networks = capable of machine learning and pattern recognition / can be trained to
learn/ processing sample
• Virtual Reality (VR) = A computer-simulated environment that can simulate physical presence in
places in the real world or imagined worlds.
• Intelligent Agents = accomplish specific tasks by users
• Robotics applications
• Natural interface applications
Chapter 11
= VIRUS a program code that cannot work without being inserted into another
program.
= WORMS a distinct program that can run unaided or a virus that spreads itself,
not just from file to file, but from computer to computer via e‐mail and other
Internet traffic
= TROJAN HORSE
= RANSOMWARE
= SPYWARE collects information without user's knowledge
= ADWARE any software package which automatically renders advertisements
in order to generate revenue for its author
= SCAREWARE gathering information about a person or organization without
their knowledge
= FRAUD intentional deception (trick) made for personal gain or to damage another
individual
- Public Key Encryption is the process of encoding messages (or information) in such
a way that third parties cannot read it, but only authorized parties can (doesn't
prevent hacking but it prevents the hacker from reading the data that is encrypted)