Introduction To Information Technology1-2
Introduction To Information Technology1-2
ITE1101/DIT1102
Data
Data refers to raw facts, figures, or symbols that represent something in a
specific context. It can be any form of information that can be processed,
analyzed, and interpreted to derive meaning. Data can take various forms,
including text, numbers, images, audio, video, or a combination of these.
There are two main types of data:
Structured Data: Structured data is organized and formatted in a specific
way, making it easy to search, process, and analyze. Examples include data
stored in databases, spreadsheets, and tables, where information is
arranged into rows and columns with predefined data types.
Unstructured Data: Unstructured data does not have a predefined format
and is not organized in a specific manner. It can include text documents,
emails, social media posts, images, videos, and audio recordings.
Unstructured data poses challenges for analysis and interpretation because it
requires advanced techniques such as natural language processing (NLP) or
image recognition to extract meaningful insights.
Data can also be classified based on its source, such as:
Primary Data: Primary data is collected firsthand from original sources
through experiments, surveys, observations, or direct interactions. It is
specific to the research or investigation being conducted and has not been
previously published or analyzed.
Secondary Data: Secondary data is obtained from existing sources, such as
books, articles, reports, databases, or other research studies. It has already
been collected, processed, and analyzed by others and is available for reuse
or further analysis.
Data is the foundation of information, knowledge, and decision-making in
various domains, including business, science, healthcare, finance, education,
and government. By analyzing and interpreting data, organizations can gain
valuable insights, identify patterns and trends, make informed decisions, and
drive innovation and improvement. However, to derive meaningful insights
from data, it is essential to ensure its quality, accuracy, relevance, and
integrity throughout the data lifecycle.
Information
Information refers to processed, organized, and meaningful data that
provides context, insight, or knowledge. It is the result of analyzing and
interpreting raw facts, figures, or symbols to derive understanding or make
decisions. Unlike data, which is raw and unprocessed, information has been
refined and structured to be useful and actionable.
IT Systems Model
The Information Technology Systems (ITS) model provides a framework for
understanding the components and interactions within an IT environment. It
typically consists of several interconnected layers or components that work
together to support the organization's information needs. Here's a simplified
model of Information Technology Systems:
Data Layer: The data layer involves the storage, management, and
manipulation of data within the IT system. This includes databases
(relational or non-relational), file systems, data warehouses, and data lakes.
Data management technologies and practices ensure data integrity, security,
and accessibility for users and applications.
User Interface Layer: The user interface layer enables interaction between
users and IT systems. This includes interfaces such as graphical user
interfaces (GUIs), command-line interfaces (CLIs), web interfaces, mobile
apps, and voice-activated interfaces. User-friendly interfaces enhance
usability and accessibility, allowing users to interact with IT systems
efficiently and intuitively.
Computer Science
This is the study of computers and computational systems, including their
design, development, implementation, and application in various domains. It
encompasses both theoretical and practical aspects of computing, focusing
on understanding algorithms, data structures, programming languages,
software engineering principles, and the underlying theory of computation.
Key areas of study within computer science include:
Digital Systems Design: Computer engineers study digital logic, circuits, and
systems to design and implement digital hardware components such as
processors, memory units, and input/output interfaces. They use hardware
description languages (e.g., Verilog, VHDL) and design tools to create digital
systems with desired functionality, performance, and power efficiency.
Software Engineering
Computer Components
System components refer to the essential parts or elements that make up a
system, whether it's a computer system, an organizational system, or any
other type of system. These components work together to achieve the
system's objectives and functionality. In the context of computer systems,
system components typically include hardware, software, data, people, and
procedures. Let's explore each of these components:
Big Data and Analytics: With the increasing volume and complexity of
data generated by ICT systems, big data technologies and analytics tools are
used to analyze and derive insights from large datasets.
ICT plays a crucial role in modern society, influencing various sectors such as
education, healthcare, finance, transportation, and entertainment. It enables
the digitization of information, improves communication and collaboration,
and drives innovation and economic growth.
Emails
Emails, short for electronic mail, are a widely used form of digital
communication for sending messages and files over the internet. Here are
some key points about emails:
Composition: Emails typically consist of a sender, recipient(s), subject line,
body, and attachments. Users can compose emails using email clients, web-
based email services, or mobile apps.
SMTP and IMAP/POP3: The Simple Mail Transfer Protocol (SMTP) is used
to send emails, while the Internet Message Access Protocol (IMAP) and Post
Office Protocol (POP3) are used to retrieve emails from a server.
Email Clients: Email clients, such as Microsoft Outlook, Apple Mail, and
Mozilla Thunderbird, are desktop or mobile applications used to manage and
access email accounts.
COMPUTERS
Computers are electronic devices that can perform a wide range of tasks by
executing programs and processing data. Here are some key points about
computers:
Memory: Memory, such as RAM (Random Access Memory), stores data and
instructions temporarily while the computer is running. It allows for fast
access to frequently used data and programs.
Storage: Storage devices, such as hard disk drives (HDDs) and solid-state
drives (SSDs), store data persistently even when the computer is powered
off. They provide long-term storage for operating systems, applications,
documents, multimedia files, and other data.
Telephones
Telephones are communication devices that transmit audio signals over long
distances, allowing individuals to converse in real-time. Here are some key
points about telephones:
Radio
Internet Radio: Internet radio services stream audio content over the
internet, providing listeners with access to a vast array of stations and
genres from around the world. Internet radio can be accessed through
websites, mobile apps, and streaming media players.
Social networks
Social networks, also known as social media platforms, are online platforms
that enable users to create profiles, share content, connect with others, and
interact with shared content. Here are some key points about social
networks:
User Profiles: Social networks allow users to create personal profiles that
typically include information such as name, photo, bio, interests, and contact
details. Profiles serve as a digital identity for users within the platform.
Privacy Settings: Social networks offer privacy settings that allow users to
control the visibility of their profile, posts, and personal information. Users
can choose who can see their content and interact with them, ensuring
privacy and security.
Analytics and Insights: Social networks provide analytics tools for users
and businesses to track the performance of their content, audience
engagement, and growth metrics. These insights help users optimize their
strategy, content, and campaigns for better results.
Telecommunications:
Telecommunications refers to the transmission of information over long
distances by electronic means. It encompasses various technologies and
systems for sending, receiving, and processing data, voice, and multimedia
content. Here are some key points about telecommunications:
Switching Equipment: Devices that route and manage the flow of data
within a network, such as switches, routers, and gateways.
Emerging Technologies:
Circuit switching
Circuit switching is a telecommunications method that involves the establishment of a dedicated
communication path (or circuit) between two devices before the actual data transfer occurs.
Packet switching
packet switching, this is where data is broken into smaller packets that can take different routes
to reach the destination.
Bandwidth
Bandwidth refers to the maximum amount of data that can be transmitted
over a network connection in a given amount of time. It is typically
measured in bits per second (bps), kilobits per second (kbps), megabits per
second (Mbps), or gigabits per second (Gbps). Bandwidth is a crucial factor
in determining the speed and capacity of a network connection. Higher
bandwidth allows for faster data transfer rates, enabling quicker downloads,
smoother streaming, and more responsive online experiences.
A modem
A modem (short for modulator-demodulator) is a device that enables digital
data to be transmitted over analog communication channels. Modems are
commonly used to connect computers or other digital devices to the internet
via telephone lines, cable television lines, or wireless networks.
Types of Modems
DSL Modems: Digital Subscriber Line (DSL) modems utilize telephone lines
to provide high-speed internet access. DSL modems can achieve faster
speeds than dial-up modems and are commonly used in areas where cable
internet is not available.
Fiber Optic Modems: Fiber optic modems connect to fiber optic cables,
which transmit data using light signals. Fiber optic internet connections are
known for their high speeds and reliability.
NETWORKS
Networks refer to interconnected systems or entities that can communicate
and share resources with each other. In the context of computing and
telecommunications, a network typically refers to a collection of devices
(such as computers, servers, routers, switches, etc.) that are connected
together to facilitate communication and resource sharing.
Network Topologies
Topology refers to the physical or logical layout of interconnected devices,
nodes, and links within a computer network. Different network topologies
determine how devices are connected to each other and how data is
transmitted between them.
Bus Topology:
• In a bus topology, all devices are connected to a single backbone
cable, resembling a linear bus.
• Each device has a unique address, and data is transmitted along the
cable.
• Advantages: Simple to implement and cost-effective for small
networks.
• Disadvantages: Susceptible to cable failures, limited scalability, and
performance degradation as more devices are added.
Star Topology:
• In a star topology, each device is connected to a central hub or switch,
forming a star-like structure.
• All communication between devices passes through the central hub.
• Advantages: Centralized management, easy to add or remove devices,
and failure of one link does not affect other devices.
• Disadvantages: Dependency on the central hub, potential single point
of failure.
Mesh Topology:
• In a full mesh topology, every device is connected to every other
device, forming a fully interconnected network.
• In a partial mesh topology, only some devices are connected to
multiple others.
• Advantages: Redundancy, fault tolerance, and multiple communication
paths.
• Disadvantages: High cost and complexity, increased cabling and
configuration requirements.
Ring Topology:
• In a ring topology, each device is connected to exactly two other
devices, forming a closed loop.
• Data travels in one direction around the ring.
• Advantages: Simple and easy to install, no need for a central device.
• Disadvantages: Failure of one device or link can disrupt the entire
network, difficult to troubleshoot.
Hybrid Network
A hybrid network typically refers to a network infrastructure that combines
two or more different networking technologies or architectures. These hybrid
networks are often designed to leverage the strengths of each technology to
create a more robust, flexible, and efficient network environment.
These are just a few examples of the many protocols that exist within
computer networks. Different protocols serve different purposes, and they
often work together in layered architectures to enable various network
services and applications.
Networking software
Protocol Analyzers/Sniffers:
Protocol analyzers (or network sniffers) capture and analyze network traffic
to diagnose and troubleshoot network issues, detect anomalies, and monitor
network performance.
They can decode and interpret various network protocols to analyze packet
data.
Firewall Software:
Firewall software is designed to protect networks and devices from
unauthorized access, malicious attacks, and undesirable network traffic.
Examples include pfSense, iptables (Linux), Windows Firewall, and Cisco ASA
Firewall.
Examples include Veeam Backup & Replication, Acronis Backup, and Bacula.
Physical Media
Coaxial Cable: Coaxial cables are commonly used for cable television
(CATV) and broadband internet connections, as well as in older Ethernet
networks.
Fiber Optic Cable: Fiber optic cables use light signals to transmit data and
offer high bandwidth and immunity to electromagnetic interference. They are
often used in long-distance communications and high-speed network
backbones.
Privacy
Privacy in information technology (IT) encompasses the protection of
personal data and the rights of individuals to control how their information is
collected, used, stored, and shared in digital environments. It involves
safeguarding sensitive information from unauthorized access, misuse, or
disclosure, and ensuring compliance with privacy laws, regulations, and
ethical standards.
Cookies
Cookies are small pieces of data stored on a user's device by a website while
the user is browsing. They are commonly used to remember user
preferences, enhance user experience, and track user behavior.
Session Cookies: These cookies are temporary and are deleted once the
user closes the web browser. They are used to maintain session state and
remember user actions within a session.
Persistent Cookies: Persistent cookies are stored on the user's device for a
specified period, even after the browser is closed. They are used for long-
term tracking, such as remembering user preferences or login information
across sessions.
First-party Cookies: First-party cookies are set by the website the user is
visiting and are primarily used for website functionality and customization.
Spyware
Banner ad
A banner ad is a type of display ad (visual online advertisement) that’s
placed in a prominent webpage location with the aim of drawing users’
attention.
Private Key: The private key is kept secret and known only to the owner. It
is used to decrypt ciphertext messages or data that have been encrypted
with the corresponding public key. The private key should never be shared
with anyone else, as it is used to protect the confidentiality of encrypted
communications.
Database applications:
Supply Chain Management (SCM): SCM systems track the flow of goods
and services from suppliers to customers. They manage inventory levels,
logistics, shipping, and procurement processes to optimize supply chain
efficiency and minimize costs.
Computer crime:
Viruses:
Infection Mechanism:
Payload: Viruses often carry a malicious payload, which can range from
simply displaying a message or slowing down system performance to
deleting files, stealing data, or even providing remote access to attackers.
Changes in File Sizes or Icons: If you notice changes in file sizes, file
extensions, or icons for programs or files, it may be due to a virus modifying
or disguising files on your system.
High CPU or Disk Usage: Monitor your system's task manager for
unusually high CPU or disk usage, which may indicate that a virus is running
malicious processes in the background.
Implement Least Privilege Access: Limit user privileges and access rights
to only those necessary for performing job functions. This reduces the
likelihood of viruses spreading across the network and accessing sensitive
data.
Deploy Email Filtering: Use email filtering solutions to scan incoming and
outgoing emails for malicious attachments, phishing attempts, and spam
messages.
Human-computer interaction
Human-computer interaction (HCI) is a multidisciplinary field concerned with
the design, evaluation, and implementation of interactive computing systems
for human use and with the study of major phenomena surrounding them. It
focuses on the interfaces between people (users) and computers and
encompasses various aspects of technology, psychology, design, and
usability.
User Interface Design: HCI involves designing user interfaces (UIs) that
are intuitive, efficient, and enjoyable for users to interact with. This includes
designing graphical user interfaces (GUIs), command-line interfaces, voice
interfaces, and other forms of interaction.
Social and Ethical Implications: HCI addresses the social and ethical
implications of technology by considering issues such as privacy, security,
trust, autonomy, transparency, and digital divide. Design decisions should
prioritize user well-being and societal values while minimizing potential risks
and harm.
Information management
Information management (IM) is the process of collecting, storing,
organizing, and disseminating information within an organization to support
decision-making, operations, and strategic objectives. It involves managing
both structured data (e.g., databases, spreadsheets) and unstructured data
(e.g., documents, emails, multimedia) throughout their lifecycle.
Types of Networks:
Wide Area Network (WAN): A WAN spans a larger geographical area and
connects multiple LANs or individual devices over long distances. Examples
include the internet, private leased lines, and satellite links.
Network Topologies:
Routers: Direct traffic between different networks and provide access to the
internet.
Modems: Convert digital data from computers into analog signals for
transmission over telephone lines (for dial-up connections) or digital signals
for broadband connections.
Network Protocols:
Network Security:
Network Management:
Platform technologies
Platform technologies refer to software or hardware frameworks,
architectures, or infrastructures that provide a foundation for developing and
deploying applications, services, or solutions. These platforms offer a set of
tools, libraries, APIs (Application Programming Interfaces), and services that
streamline the development process and enable interoperability, scalability,
and flexibility. Platform technologies often serve as a common foundation
upon which developers can build and integrate applications, customize
functionalities, and leverage existing resources.
Types of Platform Technologies:
Operating systems such as Windows, macOS, Linux, and Unix provide the
fundamental software environment for running applications and managing
hardware resources on computers and devices.
IoT Platforms:
Internet of Things (IoT) platforms, such as AWS IoT, Microsoft Azure IoT,
Google Cloud IoT, and IBM Watson IoT, provide tools and services for
connecting, managing, and analyzing IoT devices and data. These platforms
offer features such as device provisioning, data ingestion, analytics, and
security.
Blockchain Platforms:
API Platforms:
API platforms, such as Apigee, Amazon API Gateway, and Microsoft Azure
API Management, provide tools and services for designing, publishing, and
managing APIs. These platforms enable organizations to expose their
services and data to developers, partners, and customers in a controlled and
scalable manner.
Analytics and AI Platforms:
Programming
Programming refers to the process of writing instructions (code) for
computers to execute tasks or solve problems. Programmers use
programming languages to communicate with computers and create
software applications, scripts, or algorithms. Here are some key
Aspects of Programming:
Web Systems
Web systems, also known as web-based systems or web applications, are
software systems that are accessed and operated through a web browser
over the internet. These systems utilize web technologies such as HTML,
CSS, JavaScript, and server-side programming languages to provide
functionality, interactivity, and data access to users. Here are some key
aspects of web systems:
User Interface: Web systems have user interfaces (UIs) that are rendered
within web browsers. The UI may include web pages, forms, buttons,
menus, and other interactive elements that allow users to input data,
interact with the system, and view information.
Frontend Technologies: Frontend technologies are used to create the user
interface and client-side functionality of web systems. These technologies
include:
CSS (Cascading Style Sheets): Styles the appearance and layout of web
pages.
Web Servers: Software such as Apache, Nginx, and Microsoft IIS serve web
pages and handle HTTP requests from clients.
Security: Web systems must address security concerns to protect data and
prevent unauthorized access, manipulation, or attacks. Common security
measures include:
Types of Databases:
Key-Value Stores: Key-value stores store data as key-value pairs and are
optimized for high-speed retrieval of data based on keys. Examples include
Redis, Amazon DynamoDB, and Apache Cassandra.
Database Operations:
Database Administration:
Computer security,