0% found this document useful (0 votes)
83 views

Mr. Jayesh Gangadhar Shinde: Information and Communication Technology

Information and communication technology (ICT) refers to technologies that provide access to information through telecommunications. ICT includes the Internet, wireless networks, cell phones, and other communication mediums. The document discusses the definition and history of ICT, including its origins in the 1980s and popularization through UK government reports in the late 1990s. It also covers topics like global ICT spending forecasts, how ICT budgets are allocated, ICT development indices, advantages and disadvantages of ICT in education, and the history and generations of computer technology from the 1940s to present day.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
83 views

Mr. Jayesh Gangadhar Shinde: Information and Communication Technology

Information and communication technology (ICT) refers to technologies that provide access to information through telecommunications. ICT includes the Internet, wireless networks, cell phones, and other communication mediums. The document discusses the definition and history of ICT, including its origins in the 1980s and popularization through UK government reports in the late 1990s. It also covers topics like global ICT spending forecasts, how ICT budgets are allocated, ICT development indices, advantages and disadvantages of ICT in education, and the history and generations of computer technology from the 1940s to present day.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 141

Information and communication

technology

Mr. Jayesh Gangadhar Shinde


What is an ICT
 Information and communications technology (ICT) is an
extensional term for information technology (IT) that stresses
the role of unified communications and the integration of
telecommunications (telephone lines and wireless signals)
and computers, as well as necessary enterprise software,
middleware, storage, and audiovisual systems, that enable
users to access, store, transmit, and manipulate information.
 https://en.wikipedia.org/wiki/Information_and_communicati
ons_technology
Etymology
 The phrase "information and communication technologies" has been
used by academic researchers since the 1980s.
 The abbreviation "ICT" became popular after it was used in a report to
the UK government by Dennis Stevenson in 1997, and then in the
revised National Curriculum for England, Wales and Northern Ireland in
2000.
 In 2012, the Royal Society recommended that the use of the term "ICT"
should be discontinued in British schools "as it has attracted too many
negative connotations".
 From 2014 the National Curriculum has used the word computing,
which reflects the addition of computer programming into the
curriculum
IDC - Global ICT Spending
Forecast 2020 – 2023

 Following years of growth, ICT spending will remain


relatively flat in 2020 due to the COVID-19 pandemic.
 While traditional ICT spending is forecast to broadly track
GDP growth over the next decade, the overall industry will be
catapulted back to growth of more than 2x GDP as new
technologies begin to account for a larger share of the market.
 The emergence of IoT is already contributing to significant
market growth, and within 5-10 years new technologies such
as robotics, artificial intelligence, and AR/VR will also
expand to represent over 25% of ICT spending.
Monetization
 The average IT budget has the following breakdown:
 31% personnel costs (internal)
 29% software costs (external/purchasing category)
 26% hardware costs (external/purchasing category)
 14% costs of external service providers (external/services).
 The estimate of money to be spent in 2022 is just over
US$6 trillion
ICT Development Index
 The ICT Development Index ranks and compares the level of ICT
use and access across the various countries around the world.
 In 2014 ITU (International Telecommunications Union) released the
latest rankings of the IDI, with Denmark attaining the top spot,
followed by South Korea.
 The top 30 countries in the rankings include most high-income
countries where quality of life is higher than average, which
includes countries from Europe and other regions such as "Australia,
Bahrain, Canada, Japan, Macao (China), New Zealand, Singapore
and the United States; almost all countries surveyed improved their
IDI ranking this year.
 https://en.wikipedia.org/wiki/ICT_Development_Index
Advantages of ICT in education
 Communication - Speed / time – money can be saved because it’s
much quicker to move information around. With the help of ICT it has
become quicker and more efficient.
 Globalization - Video conferencing saves money on flights and
accommodation. ICT has not only brought the countries and people
closer together, but it has allowed the world's economy to become a
single interdependent system to contact either a business or family
member.
 Cost effectiveness - It feels free to send an email (although it isn’t); it’s
without doubt cheaper than phone calls. ICT has also helped to
automate business practices, thus restructuring businesses to make
them exceptionally cost effective.
Advantages of ICT in education
 Greater Availability - ICT has made it possible for businesses
to be automated giving clients access to a website or voicemail
24 hours a day, 7 days a week
 Bridging the cultural gap – Greater access to technology has
helped to bridge the cultural gap by helping people from
different cultures to communicate with one another, and allow
for the exchange of views and ideas, thus increasing awareness
and reducing prejudice.
 Creation of new jobs - Probably, the best advantage of ICT has
been the creation of new and interesting jobs.
Advantages of ICT in education
 Education – Computer’s along with their programs and the
Internet have created educational opportunities not available to
previous generations.
 Through ICT , images can easily be used in teaching and
improving the retentive memory of student.
 Complex structure - through ICT, teachers can easily explain
complex structure ,instruction and ensure students
comprehension.
 Through ICT , teachers are able to create  interactive
classrooms and make the lesson more enjoyable..
Disadvantages of ICT in
education
 Misleading and misguiding information
 Risk of cyber attacks and hacks
 A risk to the traditional book and handwriting methods
 Implementing computers and the internet for ICT replace the
convention education curriculums
 Managing courses online is difficult
 Misuse of technology
 Not accessible everywhere
 Teachers require experience to handle ICT 
 implementing computers and the internet is expensive 
 Few believe that computers can limit imagination 
History and Generation of Computers
History of Computers

• The first computers did not have monitors or memory. The abacus, the adding
machine was invented in Babylon in 500 B.C.
• It was used to count and keep track of money and other numerical things.

Famous mathematicians invented calculators using gears and wheels.
History of Computers
Charles Babbage Machine
History of Computers
Charles Babbage Machine
 Charles Babbage (1791-1871), computer pioneer,
designed the first automatic computing engines.
 He invented computers but failed to build them.
The first complete Babbage Engine was completed
in London in 2002, 153 years after it was designed.
Difference Engine No. 2, built faithfully to the
original drawings, consists of 8,000 parts, weighs
five tons, and measures 11 feet long.
Generation of Computers

 Computers have evolved and advanced significantly over the


decades since they were invented. The history of computer
development is grouped into different generations of computer.
A generation refers to the change in technology. The computers
are classified into five generations based upon the change in
architecture, languages, modes of operation, etc. They are:
 First Generation Computer (1940-1956)
 Second Generation Computer (1957-1963)
 Third Generation Computer (1964-1971)
 Fourth Generation Computer (1972 onward)
 Fifth Generation Computer (Present and future)
First Generation Computer (1940-1956)

 The first generation computers were used during 1940-1956. They


were based on vacuum tubes.
 Characteristics of First Generation computers are:
 Computers of first generation used vacuum tubes as the basic
components for memory and circuitry for Central Processing Unit.
 These computers are very large in size.
 Programming for this generation was done using machine language.
 They were very expensive and require a large amount of electricity.
 They produce more heat.
 These computers could calculate data in a millisecond.
 Examples of First Generation computers are: ENIVAC and UNIVAC-
1.
First Generation Computer (1940-1956)

• Advantages of First Generation of


Computer:
• These computers fast and could
calculate data in millisecond.
• Vacuum tubes were the only
electronic component available
during those days.
• Vacuum tube technology made
possible to make electronic digital
computers.
• Easily available and inexpensive.
• Tactile sensitivity is preserved.
• Color-coded for easier and faster
identification of readings.
Disadvantages of First Generation of
Computer
 The computers were very large in  Costly commercial
size. production.
 They consumed a large amount  Limited commercial use.
of energy.  Very slow speed.
 They heated very soon due to  Limited programming
thousands of vacuum tubes.
capabilities.
 They were not very reliable.
 Used machine language only.
 Air conditioning was required.
 Used magnetic drums which
 Constant maintenance was
provide very less data storage.
required.
 Non-portable.
Second Generation of computer (1955 - 1964)

 Instead of Vacuum tubes Transistors were used. 


 Magnetic cores were used as primary memory and magnetic
tape and magnetic disks as secondary storage devices. 
 Main memory was 100KB. 
 Assembly language and high-level programming language
like FORTRAN, COBOL were used. 
 Used for extensive business applications, engineering design
optimization scientific research. 
 Some computers of this generation were: IBM 1620; IBM
7094 ; CDC 1604 ; CDC 3600 ; UNIVAC 1108 
Advantages of Second Generation of Computer:

 Smaller in size compared to the first generation


of computer.
 The second generations computers were more
reliable.
 Used less energy and were not heated as much
as the first one.
 Better speed and could calculate data in
microseconds.
 Used faster peripherals.
 Better portability as compared to the first
generation.
 Accuracy improved.
 Used assembly language as well.
Disadvantages of Second Generation of Computer:

 Cooling system was required.


 Only used for specific purposes
 Constant maintenance was required
 Commercial production was
difficult
 Costly and not versatile
 Puch cards were used for input.
Third Generation of Computer (1965-1971) 

 Integrated circuits were used in place of transistors. A single IC


has many transistors, resistors and capacitors along with the
associated circuitry. 
 Remote processing, Time-sharing, Real time,
 Multiprogramming  Operating System were used. 
 High-level languages FORTRAN-II TO IV, COBOL, PASCAL
PL/1, BASIC, ALGOL-68, etc. were used. Used for Database
management system and online systems. 
 Some computers of this generation were: IBM-
360 series; Honeywell-6000 series; PDP (Personal Data
Processor); IBM-370/168; TDC-316. 
Advantages of Third Generation of
Computer:
 Smaller in size , reliable and
Used less energy  as compared
to previous generations.
 Produced less heat as compared
to the previous two generations
of computers.
 Maintenance cost was low
• Could be used for high-level because hardware failure is rear.
languages.  Better speed and could calculate
• Less expensive and Better accuracy data in nanoseconds.
• Commercial production increased.  Totally general purpose
• Used mouse and keyboard for  Good storage
input.
Disadvantages of Third Generation of
Computer:
 Air conditioning was
required.
 Highly sophisticated
technology required for the
manufacturing of IC chips.
 Tactile sensitivity is
decreased
Fourth Generation  of Computer (1971-1980)

 Very Large Scale Integrated (VLSI) circuits were


used .These are more powerful, compact, reliable and
affordable which gave rise to personal computers. 
 C, C++, DBASE etc., all these higher level
languages were used in this generation. 
 Concept of internet was introduced, computers became
easily available. 
 Some computers of this generation were: DEC 10; STAR
1000; PDP 11; CRAY-1 (Super Computer); CRAY-X-
MP (Super Computer) 
Advantages of Fourth Generation of
Computer:
 More powerful and reliable
than previous generations
 Small in size
 Fan for heat discharging and
thus to keep cold.
 Fast processing power with
less power consumption
• Totally general purpose
• Less need of repair.
 No air conditioning required. • Commercial production
Disadvantages of Fourth Generation
• All types of High level languages
of Computer: can be used in this type of
The latest technology is required for computers
manufacturing of Microprocessors. • Cheapest among all generations
Fifth Generation  of Computer (1980-till date) 

 VLSI technology became SLSI / ULSI (Super / Ultra


Large Scale Integration) technology. 
 In this generation AI(Artificial Intelligence) concept is
introduced which is an emerging branch of Computer
Science that interprets means and methods of making
computers think like human beings. 
 Higher level languages like C, C++, Java, .Net are
used. 
 Some computers types of this generation are: Desktop
; Laptop ; NoteBook ; UltraBook ; ChromeBook
Advantages of Fifth Generation
of Computer:
 These computers are much faster
than other generation computers.
 It is easier to repair these computers.
 These computers are much smaller in
size than other generation computers
 They are portable and easy to handle.
 Development of true artificial
intelligence.
 Advancement in Parallel Processing.
 Advancement in Superconductor
technology.
Disadvantages of Fifth
Generation of Computer:
 They tend to be
sophisticated and complex
tools.
 They can give more power
to companies to watch what
you are doing and even
allow them to infect your
computer.
What Is A Computer?
 An electronic device that receives data,
processes data, stores data, and
produces a result (output).
 Classified by size, speed and application
 Uses hardware and software
 Comes in different types
INFORMATION PROCESSING
 Information processing is the manipulation of digitized
information by computers and other digital electronic
equipment, known collectively as information technology.
INFORMATION PROCESSING SYSTEM (IPS)

 DATA is a collection of independent and unorganized


facts.
 INFORMATION is the processed and organized data
presented in a meaningful form.
 DATA PROCESSING is the course of doing things in a
sequence of steps.
 SYSTEM is a set of components that work together to
achieve a common function.
FUNCTIONS OF AN IPS
1. It accepts and gather data. (INPUT)
2. It processes data to become information. (PROCESSING)
3. It stores data and information. (STORAGE)
4. It presents information. (OUTPUT)
SIX COMPONENTS OF AN IPS

1. Hardware –machinery
2. Software –computer programs and the manuals that support
them
3. Data – facts that are used by programs to produce useful
information
4. Procedures – policies that govern the operation of a
computer system
5. People – every system needs people if it is to be useful
6. Feedback –IS may be provided with a feedback
Basic structure of CPU
CPU (Central processing unit)
 It is a principal part of any digital computer system,
generally composed of the main memory, control unit,
and arithmetic-logic unit.
 CPU – Heart of the Computer
 CPU Process:
1. Fetch the Instruction
2. Interpret the Instruction
3. Fetch the Data
4. Process the Data
5. Write the Data
Processing of data
Basic Units of Measurement
 Memory unit is the amount of data that can be stored
in the storage unit. This storage capacity is
expressed in terms of Bytes.
S.No. Unit & Description

Bit (Binary Digit)


1 A binary digit is logical 0 and 1 representing a passive or an active
state of a component in an electric circuit.
Nibble
2
A group of 4 bits is called nibble.
Byte
3 A group of 8 bits is called byte. A byte is the smallest unit, which can
represent a data item or a character.
Word
A computer word, like a byte, is a group of fixed number of bits
processed as a unit, which varies from computer to computer but is
fixed for each computer.
4
The length of a computer word is called word-size or word length. It
may be as small as 8 bits or may be as long as 96 bits. A computer
stores the information in the form of computer words.
Storage Units
Hierarchy – Bit < Nibble< Byte < KB < MB < GB < TB < PB < XB <
ZB < YB
Storage Unit or Memory Unit
Primary Memory or Main
Memory
 Primary storage also known as main storage or memory, is the area in a
computer in which data is stored for quick access by the computer’s
processor
Register
 Register is one of a small set of data holding place that are
part of the computer processor.
 A register may hold an instruction, a storages address, or
any kind of data (such as a bit sequence or individual
characters). Some instructions specify registers as part of
the instruction.
Memory Hierarchy
Random Access Memory
 RAM (Random Access Memory) –It’s a type of data storage
used in computers that is generally located on the
motherboard.
 This type of memory is volatile and all information that was
stored in RAM is lost when the computer is turned off.
 There are two types of Random access memory
 Dynamic RAM – dynamic indicates that the memory must be
constantly refreshed (reenergized) or it will lose its contents.
 Static Memory – A computer memory that contains fixed
information and retains and retains its programmed state as
long as the power is on.
Read Only Memory
 ROM (Read Only Memory) – Once data has been
written onto a ROM chip, it cannot be removed and can
only be read.
 Unlike main memory (RAM), ROM retains its contents
even when the computer is turned off. ROM is referred to
as being nonvolatile.
Three types of Read only Memory (ROM)

 PROM – PROM stands for Programmable Read Only


Memory. This from of ROM is initially blank. The user or
manufacturer can write data/program on it by using special
devices. However, once the program or data is written in
PROM chip, it cannot be changed. PROM chip becomes
unusable.
EPROM
 EPROM – EPROM stands for Erasable Programmable
Read Only Memory. This from of ROM is also initially
blank. The user or manufacturer can write program or data
on it by using special devices. Unlike PROM, the data
written in EPROM chip
EEPROM
 EEPROM – EEPROM stands for Electrically Erasable
Programmable Read Only Memory. This kind of ROM
can be written or changed with the help of electrical
devices. So data stored in this type of ROM chip can be
easily modified
Cache Memory
 Cache memory is a high-speed memory, which is small in size but faster
than the main memory (RAM). The CPU can access it more quickly
than the primary memory. So, it is used to synchronize with high-speed
CPU and to improve its performance.
Cache memory can only be accessed by CPU. It can be a
reserved part of the main memory or a storage device outside
the CPU.
It holds the data and programs which are frequently used by
the CPU. So, it makes sure that the data is instantly available
for CPU whenever the CPU needs this data.
In other words, if the CPU finds the required data or
instructions in the cache memory, it doesn't need to access the
primary memory (RAM). Thus, by acting as a buffer between
RAM and CPU, it speeds up the system performance.
Decimal Number System
 It consist of ten digit i.e. 0, 1, 2, 3, 4, 5, 6, 7, 8, 9
with the base 10.
 Each number can be used individually or they can
be grouped to form a numeric value as
85,48,35,456 etc.
BINARY NUMBER SYSTEM
 The Binary Number System consist of only
two digits– 0 and 1.
 Since this system use two digits, it has the
base 2.
 All digital computer use this number system
and convert the data input from the decimal
format into its binary equivalent.
Why Binary?
 Since the computer is made up of electronic
components; it can have only two states, either
 On(1)
 Off(0)
 The data which is given to the computer is converted
into binary form because a computer understand only
binary language.
 It further converts the binary results into their decimal
equivalents for output
Octal Number System
 In the Octal Number System it consist of 8
digits i.e. 0, 1, 2, 3, 4, 5, 6, 7 with a base 8.
 The sequence of octal number goes as 0, 1,
2, 3, 4, 5, 6, 7, 10, 11, 12, 13, 14, 15, 16, 17,
20, 21, 22, …..as go on.
 See each successive number after 7 is a
combination of two or more unique symbols of
octal system
Hexadecimal Number System

 The Hexadecimal system use base 16.


 It has 16 possible digit symbol.
 It use the digit 0 through 9 plus the letters A,
B,
 C, D, E, and F as the 16 digit symbols
Relationship between Hexadecimal, Octal, Decimal, and Binary

Notice that each


hexadecimal digit
represent a group of four
binary digit. It Is
important to remember
that Hex(Abbreviation for
Hexadecimal) digit A
through F are equivalent
to the decimal value 10
through 15.
NUMBER CONVERSIONS
 Decimal-to-Binary Conversion
 The method of converting Decimal to binary is
repeated-division method. For conversion
follow the rules:
1. Divide the given decimal number with the base
2.
2. Write down the remainder and divide the
quotient by 2.
3. Repeat step 2 till the quotient is zero
Binary-to-Decimal Conversion
 To convert a binary number follow the steps:
1. Multiply each binary number with 2 having
the power 0 for last position, starting from the
right digit.
2. Increase the power one by one, with base as
2.
3. Sum up all the products to get decimal
number
Convert 1100010012 to Decimal

 1100010012= 1 X 28 + 1 X 27 + 0 X 26 +
0 X 25 + 0 X 24 + 1 X 23 + 0 X 22 + 0 X
21 + 1 X 20
= 256 + 128 + 0 + 0 + 0 + 8 + 0 + 0 +1
= 393
Thus, 1100010012 = 39310
Decimal-to-Octal
 The method of converting Decimal to Octal is
repeated-division method. For conversion follow the
rules:
1. Divide the given decimal number with the base 8,
2. Write down the remainder and divide the quotient by
8,
3. Repeat step 2 till the quotient is zero.
Convert 50010 to Octal
Octal-to-Decimal Conversion
 To convert a octal number follow the steps:
 1. Multiply each Octal number with 8 having
the power 0 for last position, starting from the
right digit.
 2. Increase the power one by one, with base
as 8.
 3. Sum up all the products to get decimal
number.
Convert (372)8 to Decimal
Number
3728 = 3 X 82 + 7 X 81+ 2 X 80
=3 X 64+ 7 X8+ 2 X1
= 192 + 56 + 2
=25010
Thus, 3728 = 25010
So, an octal number can be easily converted
to its decimal equivalent by multiplying each
octal digit by its position weight
Octal-to-Binary Conversion
 The conversion from octal to binary is performed by converting each
octal digit to its 3-bit binary equivalent.
 The eight possible digits are converted as indicated below:

Using these conversions, any octal number is converted


to binary by individually converting each digit
Convert 54318 to Binary Number

 We convert 54318 to binary using 3 bits


for each octal digit as follows:

Thus, 54318 = 1011000110012


Binary-to-Octal Conversion
 Converting from binary integers to octal integers is a simply the reverse of
the foregoing process. Firstly you have to do is:
1. Group the binary integer into 3-bits starting at the Least Significant
Bit(LSB).
2. If unable to form group then, add one or two 0s.
3. Each group Is converted to its octal equivalent.
 It illustrated below for binary number 11010110

 Thus, 110101102= 3268


Decimal-to-Hexadecimal
Conversion
 The method of converting Decimal to
 Hexadecimal is repeated-division method.
For conversion follow the rules:
1. Divide the given decimal number with the
base 16.
2. Write down the remainder and divide the
quotient by 16.
3. Repeat step 2 till the quotient is zero.
Convert 42310 to Hexadecimal
 Reading the :remainders
from the bottom to top,
the result is
 42310 = 1A716
 Note: Any remainder
greater than 9 are
represented by letters A
through F.
Hexadecimal-to-Decimal Conversion

• To convert a Hexadecimal number follow the


steps:
• 1. Multiply each hexadecimal number with 16
having the power 0 for last position, starting
from the right digit.
• 2. Increase the power one by one, with base
as 16.
• 3. Sum up all the products to get decimal
number
Convert 2AF16 to Decimal
Number
 2AF16 = 2 X 162 + 10 X 161 + 15 X 160=
=512 + 160 + 15
 =68710
 Thus, 2AF16 = 68710
Binary-to-Hexadecimal
Conversion
 Converting from binary integers to hexadecimal integers
is simple. Firstly you have to do is:
 1Group the binary integer into 4-bits starting at the Least Significant
Bit(LSB).
 2. If unable to form group then, add one or two 0s.

 3 Each group Is converted to its Hexadecimal equivalent

 It illustrated below for binary number 1010111010

Thus, 10101110102 = 2BA16


Hexadecimal-to-Binary
Conversion
 The conversion from Hexadecimal to binary is
performed by converting each Hexadecimal digit to
its4-bit binary equivalent.
 This is illustrated below:

Thus, 9F216 = 1001111100102


Types of Personal Computers
 Desktop computer: designed to be used on a desktop.

 Notebook/Tablet computer: designed to be used on a desktop


but still small enough to be portable.

 Laptop computer: designed to be small enough and light enough


to be used on your lap.
Hardware
 The tangible, physical equipment that can be
seen and touched such as:
• Computer Case
• Monitor
• Keyboard and Mouse
• Disk Drive
• Speakers
Computer Components:
Hardware

 Hardware –

the physical equipment of the computer that


you can see and touch
PARTS OF A COMPUTER SYSTEM

Monitor

Speaker
Keyboard

Computer Case
(Processor inside)

CD-ROM/DVD Mouse
Drive
Printer
Floppy Disk
Drive
The Parts of A Computer
 CPU (Central
 Keyboard
Processing Unit)  Mouse
• The “brains” of the  Speakers
computer housed on a  Printer
tiny silicon chip inside
the computer case.
 Scanner
 Floppy Disk Drive
 CD-ROM/DVD Drive
 Monitor
Input Devices
 Keyboard  Touch Screen
 Mouse/Trackball  Bar Code Reader
 Joystick  Scanner
 Light Pen  Microphone
 Pointing Stick  Graphics Tablet
 Touchpad  Digital Cameras
Output Devices

 Monitor: screen that displays information


such as text, numbers, and
 Printer: gives you information pictures.
• Softcopy
• from the computer in printed form.
• Hardcopy
 Speakers: allow you to hear voice, music,
and other sounds from your computer.
Processing Device

 Central Processing Unit (CPU)


– known as the heart or “brain”
of the computer and is
responsible for processing the
information that has been
entered into the computer
Storage Devices

 Hard Disk Drive: used to • Floppy Disk: flat circles


store data inside of the of iron oxide-coated
plastic enclosed in a hard
computer. plastic case.
• Magnetic platter that • Most are 3 ½ inches and
holds a large amount have a capacity to hold
of information in a 1.44 MB or more of data.
form the computer can  CD ROM Drive: a compact
understand. disk that reads only
memory.
 CD-RW: a device that
allows you to read and
write to a compact disk
Storage Devices (Con.)
 Internal Storage:  External Storage:
Allows you to store Allows you to use devices to
information inside of the store information outside
computer of the computer
Floppy Disks
Hard Drive: CD-ROMs (Compact Disc
Allows the fastest access Read Only Memory)
to information CD-RW (Compact Disc
RAM (Random Access (Read and Write)
Memory) – temporary DVDs (Digital Video Disc)
ROM (Read Only Memory) - USB/Jump Drives
long-term memory
Which Storage Device Holds
The Most Information?
FLOPPY DISKS CD-ROM DISC
1.44 MB 640 MB

HARD DRIVES
DVD DISC 80 and above GB
17 GB
Software
 The intangible set of instructions that tells the
computer what to do; known as programs or
software programs.
Types of Software
 Operating System Software
• Sets the rules for how computer hardware
and application software work together,
controls the operation of the computer.
• Example: Windows
 Application Software
• Lets you accomplish specific tasks based on
your needs.
• Examples: MS Word, Excel, Access, MS Works
Operating System
Software Tasks
 Boots (starts up) the computer
 Formats disks
 Creates folders
 Saves and retrieves files
 Moves and copies files

 Every Computer Has Operating System


Software!
Application Software

 Software that works with the operating system to meet a


specific need or perform a specific task

 Examples:
MS Word
MS Excel
MS PowerPoint
MicroType Pro
Internet Explorer
Types of Application
Software
 Word Processing
• Program that allows you to create, edit, and print text
documents
• Report, flyer, memo
 Spreadsheet
• Numbered Rows and Lettered Columns
• Intersection of a row and column is a cell
• Grade book, financial info
 Database
• Lets you set up an electronic filing system
• Enter text and numbers
• Find, search, and print info in different ways
• Address book, Card Catalog
Computer language
 Computer language or programming
language is a coded syntax used by
computer programmers to communicate with
a computer.
 Computer language establishes a flow of
communication between software programs.
Two Basic Types of Computer
Language

Low-Level
Languages: A
language that
corresponds directly
to a specific
machine.

High-Level
Languages: Any
language that is
independent of the
machine
 There are also other types of languages, which include
 System languages: These are designed for low-level tasks,
like memory and process management.
 Scripting languages: These tend to be high-level and very
powerful. E.g. JavaScript, AJAX, jQuery etc.
 Domain-specific languages: These are only used in very
specific contexts. E.g. SQL (used for database queries and
data manipulation) HTML (web application development)
Low-Level Languages
 Low-level computer languages either are machine
codes or are very close them.
 A computer cannot understand instructions given
to it in high-level languages or in English.
 It can only understand and execute instructions
given in the form of machine language I.e. binary.
There are two types of low-level
languages:

Machine Language: a
language that is directly
interpreted into the
hardware.

Assembly Language: a
slightly more user-friendly
language that directly
corresponds to machine
language.
Machine Language
 Machine language is the lowest and most elementary level
of programming language and was the first type of
programming language to be developed.
 In fact, a manufacturer designs a computer to obey just one
language, its machine code, which is represented inside the
computer by a string of binary digits (bits) 0 and 1
 The symbol 0 stands for the absence of an electric pulse
and the 1 stands for the presence of an electric pulse.
Machine Language Advantages
& Dis-advantages
Advantages Disadvantages
Machine language makes
All operation codes have to
fast and efficient use of the
be remembered
computer.
It requires no translator to All memory addresses
translate the code. have to be remembered.
It is hard to amend or find
It is directly understood by errors in a program
the computer. written in the machine
language.
Assembly Language

 Assembly language was developed to overcome some of the


many inconveniences of machine language.
 This is another low-level but very important language in
which operation codes and operands are given in the form of
alphanumeric symbols instead of 0’s and l’s.
 These alphanumeric symbols are known as mnemonic
codes and can combine in a maximum of five-letter
combinations e.g. ADD for addition, SUB for subtraction,
START, LABEL etc. Because of this feature, assembly
language is also known as ‘Symbolic Programming
Language.’
Assembly Language Advantages
& Dis-advantages
Advantages Disadvantages
Assembly language is easier
Like machine language, it is
to understand and use as
also machine
compared to machine
dependent/specific.
language.
Since it is machine dependent,
It is easy to locate and correct
the programmer also need to
errors.
understand the hardware.
It is easily modified
High-Level Languages
 A high-level language is a programming language with strong
abstraction from the details of the computer.
 The purpose of developing high-level languages was to enable
people to write programs easily, in their own native language
environment (English).
 High-level languages are symbolic languages that use English
words and/or mathematical symbols rather than mnemonic
codes.
 Each instruction in the high-level language is translated into
many machine language instructions that the computer can
understand
High-Level Languages
Advantages & Dis-advantages
Advantages Dis-advantages
A high-level language has to
High-level languages are user be translated into the machine
friendly. language by a translator,
which takes up time.
The object code generated by
They are similar to English a translator might be
and use English vocabulary inefficient compared to an
and well-known symbols. equivalent assembly language
program.
High-Level Languages
 They are easier to learn and maintain.
 A program written in a high-level language can be
translated into many machine languages and can run on
any computer for which there exists an appropriate
translator.
 The language is independent of the machine on which it is
used i.e. programs developed in a high-level language can
be run on any computer text.
Types of High-Level Languages
 Many languages have been developed for
achieving a variety of different tasks. Some are
fairly specialized, and others are quite general.
 These languages, categorized according to their
use, are:
Algebraic Formula-Type Processing

 These languages are oriented towards the computational


procedures for solving mathematical and statistical
problems.
 Examples include:
 BASIC (Beginners All Purpose Symbolic Instruction Code)
 FORTRAN (Formula Translation)
 PL/I (Programming Language, Version 1)
 ALGOL (Algorithmic Language)
 APL (A Programming Language
Business Data Processing
 These languages are best able to maintain data
processing procedures and problems involved in
handling files. Some examples include:
 COBOL (Common Business Oriented Language)
 RPG (Report Program Generator)
String and List Processing

 These are used for string manipulation, including


search patterns and inserting and deleting
characters. Examples are:
 LISP (List Processing)
 Prolog (Program in Logic)
Object-Oriented Programming
Language
 In COP, the computer program is divided
into objects. Examples are:
 C++
 Java
 C#
Visual Programming Language
 These programming languages are
designed for building Windows-based
applications.
 Examples are:
 Visual Basic
 Visual Java
 Visual C
What is Network???
 A group of two or more computer systems linked
together.
 A computer network is
 a group of computer systems + other computing
devices
 linked together through communication channels
 to facilitate communication and resource-sharing
Networks are used to
 Facilitate communication via email video conferencing,
instant messaging, etc.
 Enable multiple users to share a single hardware device
like a printer or scanner
 Enable file sharing across the network
 Allow for the sharing of software or operating programs
on remote systems
 Make information easier to access and maintain among
network users
Types of Network

 Local Area Networks(LAN)


 Wide Area Network (WAN)
 Short Range Network (Bluetooth)
 Metropolitan Area Networks (MAN)
 Virtual Private Network (VPN)
 Storage Area Network (SAN)
Local Area Networks(LAN)
Local Area Networks(LAN)

 Spans are at very small area


 Most LANs are confined to a single building or group of
buildings
 Each node (Individual computer) in a LAN has its own CPU with
which it executes programs, but it also is able to access data and
devices anywhere on the LAN
 Many users can share expensive devices (E g Laser printer), data
and can a so use the LAN to communicate with each other (E g e-
mail; or Chatting)
 Transmits data at very fast rates, much faster than a telephone
line.
 Limited by Distance
 WLAN: A type of LAN that uses high-frequency radio
waves rather than wires to communicate between nodes
 HAM - A Home Network is contained within a users
home that connects a person s digital devices that are
wired into the network
 CAN - A Campus Area network or Corporate area
network is made up of an interconnection of LANs within
a limited
geographical area
Metropolitan Area Network
(MAN)
 Larger than LAN, but smaller than WAN
 large computer network that usually spans an area
of a few city blocks to the area of an entire city,
possibly also including the surrounding areas or a
large campus
 Very high-speed connections using fiber optical
cable or other digital media
 Wireless MANs
Metropolitan Area Network
(MAN)
Wide Area Networks(WAN)
 Spans a relatively large geographical area
 One LAN can be connected to other LANs over any distance
via telephone lines and radio waves A system of LANs
connected in this way is called a wide-area network (WAN)
WAN = LAN + LAN + LAN ,
 Computers connected to a wide-area network are often
connected through public networks, such as the telephone
system They can also be connected through leased lines or
satellites The largest WAN in existence is the Internet
Wide Area Networks(WAN)
Short Range Networks
(Bluetooth)
 Computer network used for communication among computer
and different information technological devices close to one
person
 E g Devices that are used are personal computers - printers -
fax
 Machines telephones, PDAs, scanners, and even video game
consoles
 wired and wireless devices
 Limited to 10 meters
 wireless - Bluetooth
Virtual private network (VPN)
 VPN is a network that is constructed by using public wires
— usually the Internet — to connect to a private network -
such as a company s internal network
 A virtual private network (VPN) is an overlay network in
which some of the links between nodes are carried by
open connections or virtual circuits in some larger network
(e g. the Internet) instead of by physical wires
 These systems use encryption and other security
mechanisms to ensure that only authorized users can
access the network and that the data cannot be
intercepted
Internetworks

 Network of Networks
 Connecting a computer network with other networks
through the use of gateways that provide a common
method of routing information packets between the
networks
 Can be extremely complex
 Involves connecting networks that use different protocols
 Accomplished with routers, bridges, and gateways
Storage Area Network (SAN)
 A Storage Area Network (SAN) is a specialized, high-
speed network that provides block-level network access
to storage. SANs are typically composed of hosts,
switches, storage elements, and storage devices that
are interconnected using a variety of technologies,
topologies, and protocols. SANs may also span multiple
sites.
 A SAN presents storage devices to a host such that the
storage appears to be locally attached
Storage Area Network (SAN)
Network devices
 Network adapter is a
device that enables a
computer to connect with
other computer/network
using MAC Address

• Hub is a device that splits


a network connection into
multiple computers
Network devices
 Switch is a
telecommunication device
grouped as one of
computer network
components
 Cable is one way of
transmission media which
can transmit
communication signals.
Network devices
 Repeaters is used to
regenerate or replicate
signals that are
weakened or distorted
by transmission over
long distances
 Bridge is used two
connect two LANs with
the same standard but
using different types of
cables
Network devices
 Routers is used to join
multiple computer
networks together via
either wired or wireless
connections.
 Gateways is a key
stopping point for data
on its way to or from
other networks.
Network devices
 MODEM – Modulator-
demodulator. Electronic
device that allows
computers to
communicate over
telephone wires or cable-
TV cable.
Protocol
 It is set of rules and standards which is
used by computers to exchange data or
information with each other across a
network.
TCP/IP
 TCP/IP (Transmission Control Protocol/Internet Protocol) –
basic communication language or protocol of the Internet.
Internet Protocol
 IP, short for Internet Protocol, is how devices connected
to the internet locate and communicate with each other.
Every device connected to the internet–computers,
smartphones, servers, cars, smart refrigerators, etc–is
assigned at least one IP address. An IP address identifies a
device and its location anywhere in the world.
 IPV4 - 32 bits numeric address
 IPV6 - 128 bits hexadecimal address
IPV6 vs IPV4
Firewall
 In computing, a firewall is a network security system that
monitors and controls incoming and outgoing network
traffic based on predetermined security rules. A firewall
typically establishes a barrier between a trusted internal
network and untrusted external network, such as the
Internet
Computer Virus
 A virus is a computer code or program, which is
capable of affecting your computer data badly by
corrupting or destroying them.
 Computer virus has the tendency to make its duplicate
copies at a swift pace, and also spread it across every
folder and damage the data of your computer system.
 A computer virus is actually a malicious software
program or "malware" that, when infecting your system,
replicates itself by modifying other computer programs
and inserting its own code.
Types of Virus

 Following are the major types of computer virus −


Worms
 This is a computer program that replicates itself at a swift pace. Unlike a
computer virus, it is self-contained and hence does not need to be part of another
program to propagate itself.
Trojan Horse
 A Trojan Horse is also a sort of destructive program that remains disguised in a
normal software program. It is not exactly a virus, as it cannot replicate itself.
However, there is possibility that virus program may remain concealed in the
Trojan Horse.
Bombs
 It is similar to Trojan Horse, but Logic bombs have some specialty; these include
a timing device and hence it will go off only at a particular date and time.
How Does Virus Affect?

 Let us discuss in what ways a virus can affect your


computer system. The ways are mentioned below −
 By downloading files from the Internet.
 During the removable of media or drives.
 Through pen drive.
 Through e-mail attachments.
 Through unpatched software & services.
 Through unprotected or poor administrator passwords.
Impact of Virus

 Let us now see the impact of virus on your computer


system −
 Disrupts the normal functionality of respective
computer system.
 Disrupts system network use.
 Modifies configuration setting of the system.
 Destructs data.
 Disrupts computer network resources.
 Destructs of confidential data.
Virus Detection

 The most fundamental method of detection of


virus is to check the functionality of your
computer system; a virus affected computer does
not take command properly.
 However, if there is antivirus software in your
computer system, then it can easily check
programs and files on a system for virus
signatures.
Virus Preventive Measures
 Let us now see the different virus preventive measures. A
computer system can be protected from virus through the
following −
 Installation of an effective antivirus software.
 Patching up the operating system.
 Patching up the client software.
 Putting highly secured Passwords.
 Use of Firewalls.
What is email?
 Short for electronic mail - Email
 Send & receive messages over the internet
 Must have an email account on-line

You might also like