Introduction to Information Technology Notes-1
Introduction to Information Technology Notes-1
ITE/DIT1102
Data
Data refers to raw facts, figures, or symbols that represent something in a
specific context. It can be any form of information that can be processed,
analyzed, and interpreted to derive meaning. Data can take various forms,
including text, numbers, images, audio, video, or a combination of these.
Information
Information refers to processed, organized, and meaningful data that
provides context, insight, or knowledge. It is the result of analyzing and
interpreting raw facts, figures, or symbols to derive understanding or make
decisions. Unlike data, which is raw and unprocessed, information has been
refined and structured to be useful and actionable.
Example:
What is a computer?
The word computer is derived from the Latin word "computare" which means
to calculate. Thus, a computer is defined as a programmable electronic
device capable of retrieving, storing, and processing data.
The computer has become a necessity in our lives. It is the best way to
communicate with people all around the world. We can easily access
information from anywhere at any time. The computer also helps us to learn
new things. Below listed are the major advantage of computers.
1. High Speed
One of the reasons for the improvement in the quality of life is the personal
computer's speed. The modern computer offers great speed, helping us to
do our tasks within a matter of seconds. Let's say, you want to watch a
video. You'll just go to YouTube and find the required video within seconds.
2. Accuracy
Humans make errors. Hence, while complex calculations, we check once with
the calculator. The fact that computers are extremely accurate makes them
quite reliable. You'll trust the information or answer that a calculator gives,
just due to its accuracy.
3. Automation
A lot of tasks can be automated saving a lot of time. For example, instead of
manually calculating some values like mean, median of a large dataset, we
just use excel. This saves a lot of time ensuring 100% accuracy.
4. Storage
5. Ease of Access
Let's say we have to search for a book in a library and we don't know
anything except the name of the book. It would be an arduous task. But, on a
computer, just type the name of the file, and voila! This ease of access
provided by our personal computer contributes towards saving our time and
efforts.
6. Multitasking
Affordable Computers and Laptops with internet connectivity are a boon for
start-ups that function online. It lowers the cost by reducing infrastructure,
inventory, and rent expenses. Just they need a team with laptops and
internet connectivity with a software license relevant to their industry.
Computers are great tools, but they have their disadvantages too. They can
be slow, unreliable, and expensive. They also require constant maintenance
and upgrades.
1. Online Cyber-Crimes
2. Health-Issues
3. Fake News
As multitasking makes our lives easier, but it comes with its disadvantages.
We try to focus on multiple tasks and notifications. This leads to a decrease
in attention span and a lack of concentration on one particular task. Also,
addictive games played on the computer contribute to irritability when not
allowed to play.
Application of Computer
A computer has a processor, memory, storage devices, input/output devices, and other
components that allow it to perform these functions. The machine has its presence in
every domain. Be it Finance, IT, Healthcare, or Gaming, a computer is universal.
Domain Application
Data Processing refers to converting raw data into meaningful information, and these
data are machine-readable as well. Thus, data processing involves collecting,
Recording, Organizing, Storing, and adapting or altering to convert the raw data into
useful information.
The data processing cycle consists of steps to convert your raw data into actionable and
meaningful information. Generally, Data Processing Cycle consists of the following SIX
stages.
1. Data collection
2. Data preparation
3. Data input
4. Data Processing
5. Data output
6. Data storage
Step 1: Collection
The collection of raw data is the first step of the data processing cycle. The type of raw
data collected has a huge impact on the output produced. Hence, raw data should be
gathered from defined and accurate sources so that the subsequent findings are valid
and usable. Raw data can include monetary figures, website cookies, profit/loss
statements of a company, user behavior, etc.
Step 2: Preparation
Data preparation or data cleaning is the process of sorting and filtering the raw data to
remove unnecessary and inaccurate data. Raw data is checked for errors, duplication,
miscalculations or missing data, and transformed into a suitable form for further analysis
and processing. This is done to ensure that only the highest quality data is fed into the
processing unit.
The purpose of this step to remove bad data (redundant, incomplete, or incorrect data)
so as to begin assembling high-quality information so that it can be used in the best
possible way for business intelligence.
Step 3: Input
In this step, the raw data is converted into machine readable form and fed into the
processing unit. This can be in the form of data entry through a keyboard, scanner or
any other input source.
In this step, the raw data is subjected to various data processing methods using
machine learning and artificial intelligence algorithms to generate a desirable output.
This step may vary slightly from process to process depending on the source of data
being processed (data lakes, online databases, connected devices, etc.) and the
intended use of the output.
Step 5: Output
The data is finally transmitted and displayed to the user in a readable form like graphs,
tables, vector files, audio, video, documents, etc. This output can be stored and further
processed in the next data processing cycle.
Step 6: Storage
The last step of the data processing cycle is storage, where data and metadata are
stored for further use. This allows for quick access and retrieval of information whenever
needed, and also allows it to be used as input in the next data processing cycle directly.
Type Uses
Information Processing?
Information processing cycle is a sequence of events consisting of input, processing,
storage & output. For a computer to perform useful work, the computer has to receive
instructions and data from the outside world. The computer receives data and
instructions during the INPUT stage of the information processing cycle. Useful
information results when appropriate instructions are applied to data. Applying
instructions to data takes place during the PROCESSING stage of the information
processing cycle. To avoid having to re-enter data and instructions or reprocess
information, computers can save information. Saving information on a computer occurs
during the STORAGE phase of the information processing cycle. Saving information on
a computer occurs during the Storage phase of the information processing cycle. This is
followed by the result in the OUTPUT stage and latter Feedback.
Relevant
Reliable
Secure
Simple
Information should be simple, not too complex. Sophisticated and detailed
information might not be needed. In fact, too much information can cause
information overload, whereby a decision maker has too much information
and is unable to determine what is really important.
Timely
Verifiable
Information should be verifiable. This means that you can check it to make
sure it is correct, perhaps by checking many sources for the same
information.
IT Systems Model
The Information Technology Systems (ITS) model provides a framework for
understanding the components and interactions within an IT environment. It
typically consists of several interconnected layers or components that work
together to support the organization's information needs. Here's a simplified
model of Information Technology Systems:
Data Layer: The data layer involves the storage, management, and
manipulation of data within the IT system. This includes databases (relational
or non-relational), file systems, data warehouses, and data lakes. Data
management technologies and practices ensure data integrity, security, and
accessibility for users and applications.
User Interface Layer: The user interface layer enables interaction between
users and IT systems. This includes interfaces such as graphical user
interfaces (GUIs), command-line interfaces (CLIs), web interfaces, mobile
apps, and voice-activated interfaces. User-friendly interfaces enhance
usability and accessibility, allowing users to interact with IT systems
efficiently and intuitively.
Computer Science
This is the study of computers and computational systems, including their
design, development, implementation, and application in various domains. It
encompasses both theoretical and practical aspects of computing, focusing
on understanding algorithms, data structures, programming languages,
software engineering principles, and the underlying theory of computation.
Computer Engineering
Digital Systems Design: Computer engineers study digital logic, circuits, and
systems to design and implement digital hardware components such as
processors, memory units, and input/output interfaces. They use hardware
description languages (e.g., Verilog, VHDL) and design tools to create digital
systems with desired functionality, performance, and power efficiency.
Software Engineering
Computer Components
System components refer to the essential parts or elements that make up a
system, whether it's a computer system, an organizational system, or any
other type of system. These components work together to achieve the
system's objectives and functionality. In the context of computer systems,
system components typically include hardware, software, data, people, and
procedures. Let's explore each of these components:
Hardware: Hardware components are the physical devices that make up the
computer system. This includes the central processing unit (CPU), memory
modules (RAM), storage devices (hard disk drives, solid-state drives), input
devices (keyboard, mouse, touchscreen), output devices (monitor, printer,
speakers), and networking equipment (routers, switches, network interface
cards). Hardware components form the foundation of the system and provide
the computing power, storage, and connectivity needed to execute tasks and
run software.
Big Data and Analytics: With the increasing volume and complexity of
data generated by ICT systems, big data technologies and analytics tools are
used to analyze and derive insights from large datasets.
ICT plays a crucial role in modern society, influencing various sectors such as
education, healthcare, finance, transportation, and entertainment. It enables
the digitization of information, improves communication and collaboration,
and drives innovation and economic growth.
Emails
Emails, short for electronic mail, are a widely used form of digital
communication for sending messages and files over the internet. Here are
some key points about emails:
SMTP and IMAP/POP3: The Simple Mail Transfer Protocol (SMTP) is used to
send emails, while the Internet Message Access Protocol (IMAP) and Post
Office Protocol (POP3) are used to retrieve emails from a server.
Email Clients: Email clients, such as Microsoft Outlook, Apple Mail, and
Mozilla Thunderbird, are desktop or mobile applications used to manage and
access email accounts.
Attachments: Users can attach files, such as documents, images, and
videos, to their emails to share with recipients. Most email services have
limits on attachment size to prevent excessive data transfer.
Archiving and Organization: Users can organize their emails into folders,
label them, or use filters to manage their inbox efficiently. Many email
services also offer search functionality to quickly find specific emails.
COMPUTERS
Computers are electronic devices that can perform a wide range of tasks by
executing programs and processing data. Here are some key points about
computers:
Memory: Memory, such as RAM (Random Access Memory), stores data and
instructions temporarily while the computer is running. It allows for fast
access to frequently used data and programs.
Storage: Storage devices, such as hard disk drives (HDDs) and solid-state
drives (SSDs), store data persistently even when the computer is powered
off. They provide long-term storage for operating systems, applications,
documents, multimedia files, and other data.
Telephones
Telephones are communication devices that transmit audio signals over long
distances, allowing individuals to converse in real-time. Here are some key
points about telephones:
Radio
Internet Radio: Internet radio services stream audio content over the
internet, providing listeners with access to a vast array of stations and
genres from around the world. Internet radio can be accessed through
websites, mobile apps, and streaming media players.
Television
Social networks
Social networks, also known as social media platforms, are online platforms
that enable users to create profiles, share content, connect with others, and
interact with shared content. Here are some key points about social
networks:
User Profiles: Social networks allow users to create personal profiles that
typically include information such as name, photo, bio, interests, and contact
details. Profiles serve as a digital identity for users within the platform.
Privacy Settings: Social networks offer privacy settings that allow users to
control the visibility of their profile, posts, and personal information. Users
can choose who can see their content and interact with them, ensuring
privacy and security.
Analytics and Insights: Social networks provide analytics tools for users
and businesses to track the performance of their content, audience
engagement, and growth metrics. These insights help users optimize their
strategy, content, and campaigns for better results.
Telecommunications:
Switching Equipment: Devices that route and manage the flow of data
within a network, such as switches, routers, and gateways.
Emerging Technologies:
5G Networks: Next-generation cellular networks with higher data rates,
lower latency, and greater capacity, enabling new applications such as
augmented reality (AR), virtual reality (VR), and autonomous vehicles.
Bandwidth
Bandwidth refers to the maximum amount of data that can be transmitted
over a network connection in a given amount of time. It is typically measured
in bits per second (bps), kilobits per second (kbps), megabits per second
(Mbps), or gigabits per second (Gbps). Bandwidth is a crucial factor in
determining the speed and capacity of a network connection. Higher
bandwidth allows for faster data transfer rates, enabling quicker downloads,
smoother streaming, and more responsive online experiences.
A modem
Types of Modems
DSL Modems: Digital Subscriber Line (DSL) modems utilize telephone lines
to provide high-speed internet access. DSL modems can achieve faster
speeds than dial-up modems and are commonly used in areas where cable
internet is not available.
Fiber Optic Modems: Fiber optic modems connect to fiber optic cables,
which transmit data using light signals. Fiber optic internet connections are
known for their high speeds and reliability.
Wireless Modems: Wireless modems, also known as cellular modems or
mobile hotspots, use cellular networks to provide internet access. They are
commonly used for mobile internet connections and in areas where wired
internet infrastructure is limited.
NETWORKS
Networks refer to interconnected systems or entities that can communicate
and share resources with each other. In the context of computing and
telecommunications, a network typically refers to a collection of devices
(such as computers, servers, routers, switches, etc.) that are connected
together to facilitate communication and resource sharing.
Network Topologies
Topology refers to the physical or logical layout of interconnected devices,
nodes, and links within a computer network. Different network topologies
determine how devices are connected to each other and how data is
transmitted between them.
Bus Topology:
• In a bus topology, all devices are connected to a single backbone
cable, resembling a linear bus.
• Each device has a unique address, and data is transmitted along the
cable.
• Advantages: Simple to implement and cost-effective for small
networks.
• Disadvantages: Susceptible to cable failures, limited scalability, and
performance degradation as more devices are added.
Star Topology:
• In a star topology, each device is connected to a central hub or switch,
forming a star-like structure.
• All communication between devices passes through the central hub.
• Advantages: Centralized management, easy to add or remove devices,
and failure of one link does not affect other devices.
• Disadvantages: Dependency on the central hub, potential single point
of failure.
Mesh Topology:
• In a full mesh topology, every device is connected to every other
device, forming a fully interconnected network.
• In a partial mesh topology, only some devices are connected to
multiple others.
• Advantages: Redundancy, fault tolerance, and multiple communication
paths.
• Disadvantages: High cost and complexity, increased cabling and
configuration requirements.
Ring Topology:
• In a ring topology, each device is connected to exactly two other
devices, forming a closed loop.
• Data travels in one direction around the ring.
• Advantages: Simple and easy to install, no need for a central device.
• Disadvantages: Failure of one device or link can disrupt the entire
network, difficult to troubleshoot.
Hybrid Network
A hybrid network typically refers to a network infrastructure that combines
two or more different networking technologies or architectures. These hybrid
networks are often designed to leverage the strengths of each technology to
create a more robust, flexible, and efficient network environment.
Protocols are a set of rules and conventions that govern how data is
transmitted and received over a network.
These are just a few examples of the many protocols that exist within
computer networks. Different protocols serve different purposes, and they
often work together in layered architectures to enable various network
services and applications.
Networking software
Networking software refers to programs, protocols, and applications designed
to facilitate communication, management, and operation of computer
networks. These software solutions play a crucial role in enabling devices to
connect, share resources, and communicate efficiently within a network.
Examples include Windows Server, Linux distributions like Ubuntu Server and
CentOS, and proprietary systems like Novell NetWare.
Protocol Analyzers/Sniffers:
Protocol analyzers (or network sniffers) capture and analyze network traffic
to diagnose and troubleshoot network issues, detect anomalies, and monitor
network performance.
They can decode and interpret various network protocols to analyze packet
data.
Firewall Software:
Firewall software is designed to protect networks and devices from
unauthorized access, malicious attacks, and undesirable network traffic.
Examples include pfSense, iptables (Linux), Windows Firewall, and Cisco ASA
Firewall.
Examples include Veeam Backup & Replication, Acronis Backup, and Bacula.
Privacy
Privacy in information technology (IT) encompasses the protection of
personal data and the rights of individuals to control how their information is
collected, used, stored, and shared in digital environments. It involves
safeguarding sensitive information from unauthorized access, misuse, or
disclosure, and ensuring compliance with privacy laws, regulations, and
ethical standards.
Cookies
Cookies are small pieces of data stored on a user's device by a website while
the user is browsing. They are commonly used to remember user
preferences, enhance user experience, and track user behavior.
Types of cookies
Session Cookies: These cookies are temporary and are deleted once the
user closes the web browser. They are used to maintain session state and
remember user actions within a session.
Persistent Cookies: Persistent cookies are stored on the user's device for a
specified period, even after the browser is closed. They are used for long-
term tracking, such as remembering user preferences or login information
across sessions.
First-party Cookies: First-party cookies are set by the website the user is
visiting and are primarily used for website functionality and customization.
Third-party Cookies: Third-party cookies are set by domains other than the
one the user is currently visiting. They are often used for advertising,
tracking user behavior across multiple websites, and delivering targeted
advertisements.
Spyware
Banner ad
A banner ad is a type of display ad (visual online advertisement) that’s
placed in a prominent webpage location with the aim of drawing users’
attention.
Private Key: The private key is kept secret and known only to the owner. It
is used to decrypt ciphertext messages or data that have been encrypted
with the corresponding public key. The private key should never be shared
with anyone else, as it is used to protect the confidentiality of encrypted
communications.
Decryption Process: Upon receiving the ciphertext, the recipient uses their
private key to decrypt the message and recover the original plaintext.
Because the private key is known only to the recipient, only they can decrypt
the message, ensuring its confidentiality.
Supply Chain Management (SCM): SCM systems track the flow of goods
and services from suppliers to customers. They manage inventory levels,
logistics, shipping, and procurement processes to optimize supply chain
efficiency and minimize costs.
Computer crime:
Viruses:
Infection Mechanism:
Types of Viruses:
File Infector Viruses: These viruses attach themselves to executable
files, such as .exe or .dll files, and activate when the infected file is
executed.
Macro Viruses: Macro viruses are embedded within documents, such
as Word or Excel files, and exploit the macro scripting capabilities of
these programs to infect systems.
Boot Sector Viruses: These viruses infect the boot sector of storage
devices like hard drives or USB drives, enabling them to execute
malicious code during the boot process.
Polymorphic Viruses: Polymorphic viruses can change their code or
appearance to evade detection by antivirus software.
Worms: While not strictly viruses, worms are similar in that they self-
replicate and spread across networks. However, worms typically do not
require user interaction to spread.
Payload: Viruses often carry a malicious payload, which can range from
simply displaying a message or slowing down system performance to
deleting files, stealing data, or even providing remote access to attackers.
Changes in File Sizes or Icons: If you notice changes in file sizes, file
extensions, or icons for programs or files, it may be due to a virus modifying
or disguising files on your system.
High CPU or Disk Usage: Monitor your system's task manager for
unusually high CPU or disk usage, which may indicate that a virus is running
malicious processes in the background.
Use Strong Passwords: Create strong, unique passwords for your accounts
and change them periodically. Avoid using easily guessable passwords, and
consider using a password manager to securely store and manage your
passwords.
Enable Automatic Updates: Configure your software and operating system
to automatically install updates and security patches as soon as they
become available.
Implement Least Privilege Access: Limit user privileges and access rights
to only those necessary for performing job functions. This reduces the
likelihood of viruses spreading across the network and accessing sensitive
data.
Deploy Email Filtering: Use email filtering solutions to scan incoming and
outgoing emails for malicious attachments, phishing attempts, and spam
messages.
Human-computer interaction
Human-computer interaction (HCI) is a multidisciplinary field concerned with
the design, evaluation, and implementation of interactive computing
systems for human use and with the study of major phenomena surrounding
them. It focuses on the interfaces between people (users) and computers
and encompasses various aspects of technology, psychology, design, and
usability.
User Interface Design: HCI involves designing user interfaces (UIs) that
are intuitive, efficient, and enjoyable for users to interact with. This includes
designing graphical user interfaces (GUIs), command-line interfaces, voice
interfaces, and other forms of interaction.
Social and Ethical Implications: HCI addresses the social and ethical
implications of technology by considering issues such as privacy, security,
trust, autonomy, transparency, and digital divide. Design decisions should
prioritize user well-being and societal values while minimizing potential risks
and harm.
Information management
Networking
Types of Networks:
Local Area Network (LAN): A LAN connects devices within a limited
geographical area, such as a home, office building, or campus. It typically
uses Ethernet or Wi-Fi technology.
Wide Area Network (WAN): A WAN spans a larger geographical area and
connects multiple LANs or individual devices over long distances. Examples
include the internet, private leased lines, and satellite links.
Network Topologies:
Network Devices:
Routers: Direct traffic between different networks and provide access to the
internet.
Switches: Connect devices within a LAN and forward data to the appropriate
destination.
Modems: Convert digital data from computers into analog signals for
transmission over telephone lines (for dial-up connections) or digital signals
for broadband connections.
Network Protocols:
Network Security:
Network Management:
Platform technologies
Platform technologies refer to software or hardware frameworks,
architectures, or infrastructures that provide a foundation for developing and
deploying applications, services, or solutions. These platforms offer a set of
tools, libraries, APIs (Application Programming Interfaces), and services that
streamline the development process and enable interoperability, scalability,
and flexibility. Platform technologies often serve as a common foundation
upon which developers can build and integrate applications, customize
functionalities, and leverage existing resources.
Operating systems such as Windows, macOS, Linux, and Unix provide the
fundamental software environment for running applications and managing
hardware resources on computers and devices.
IoT Platforms:
Internet of Things (IoT) platforms, such as AWS IoT, Microsoft Azure IoT,
Google Cloud IoT, and IBM Watson IoT, provide tools and services for
connecting, managing, and analyzing IoT devices and data. These platforms
offer features such as device provisioning, data ingestion, analytics, and
security.
Blockchain Platforms:
API Platforms:
API platforms, such as Apigee, Amazon API Gateway, and Microsoft Azure API
Management, provide tools and services for designing, publishing, and
managing APIs. These platforms enable organizations to expose their
services and data to developers, partners, and customers in a controlled and
scalable manner.
Programming
Programming refers to the process of writing instructions (code) for
computers to execute tasks or solve problems. Programmers use
programming languages to communicate with computers and create
software applications, scripts, or algorithms. Here are some key
Aspects of Programming:
Web Systems
Web systems, also known as web-based systems or web applications, are
software systems that are accessed and operated through a web browser
over the internet. These systems utilize web technologies such as HTML,
CSS, JavaScript, and server-side programming languages to provide
functionality, interactivity, and data access to users. Here are some key
aspects of web systems:
User Interface: Web systems have user interfaces (UIs) that are rendered
within web browsers. The UI may include web pages, forms, buttons, menus,
and other interactive elements that allow users to input data, interact with
the system, and view information.
CSS (Cascading Style Sheets): Styles the appearance and layout of web
pages.
Security: Web systems must address security concerns to protect data and
prevent unauthorized access, manipulation, or attacks. Common security
measures include:
Databases
Types of Databases:
Key-Value Stores: Key-value stores store data as key-value pairs and are
optimized for high-speed retrieval of data based on keys. Examples include
Redis, Amazon DynamoDB, and Apache Cassandra.
Database Operations:
Computer security,