BIT41US Lecture Notes
BIT41US Lecture Notes
OF
Lesson 1
1
Lecturer: Mr. T. A Sheepo
Lesson 1 Outline:
• Generation of computers
• Types of computers
• Main components of a computer
• Software
• Types of software
• Information processing
• Online, offline processing, real-time, batch processing, single tasking
and multitasking
• Current IT issues
• Data communications
• Introduction to Networks
• Central and distributed computing
• Wide area and global networks.
• Wi-Fi 2
Introduction
Microcomputers, also known as personal computers,
have revolutionized the way we process information
and interact with technology. In this lecture, we'll delve
into the fundamental aspects of microcomputers, their
components, software, information processing, and
their integration into broader IT frameworks.
4
Computer Generations
• Computers can be categorized into 5 generations based on the
technology used to build the machine. The evolution of the
computer basically rests on the development of its electronic
components.
6
First generation computers
(1940-1956)
• The first computers used vacuum tubes for circuitry
and magnetic drums for memory.
• They were often enormous and taking up entire room.
• First generation computers relied on machine language.
• They were very expensive to operate and in addition to
using a great deal of electricity, generated a lot of heat,
which was often the cause of malfunctions.
• The UNIVAC and ENIAC computers are examples of
first-generation computing devices.
7
First generation computers
• 1st
8
Second generation computers
(1956-1963)
• Transistors replaced vacuum tubes and ushered in the
second generation of computers.
• Second-generation computers moved from
cryptic binary machine language to symbolic.
• High-level programming languages were also being
developed at this time, such as early versions of COBOL
and FORTRAN.
• These were also the first computers that stored their 9
instructions in their memory.
Second generation computers
2nd
10
Third generation computers
(1964-1971)
• The development of the integrated circuit was the hallmark
of the third generation of computers.
• Transistors were miniaturized and placed on silicon chips
called semiconductors.
• Instead of punched cards and printouts, users interacted with
third generation computers through keyboards
and monitors and interfaced with an operating system.
• Allowed the device to run many different applications at one 11
time.
Third generation computers
12
Fourth generation computers
(1971-present)
• The microprocessor brought the fourth generation of
computers, as thousands of integrated circuits were built onto a
single silicon chip.
• The Intel 4004 chip, developed in 1971, located all the
components of the computer.
• From the central processing unit and memory to input/output
controls—on a single chip.
• Fourth generation computers also saw the development
13
of GUIs, the mouse and handheld devices.
Fourth generation computers
• 4th
14
Fifth generation computers
(present and beyond)
• Fifth generation computing devices, based
on artificial intelligence.
• Are still in development, though there are some
applications, such as voice recognition.
• The use of parallel processing and superconductors
is helping to make artificial intelligence a reality.
• The goal of fifth-generation computing is to
develop devices that respond to natural
language input and are capable of learning and
self-organization. 15
Fifth generation computers
5th
16
Types of
computers
17
Four types of Computers
1. Microcomputers 2. Minicomputers
18
Types of Computers
• Microcomputer =Personal Computer
(PC)
20
Minicomputer, Mainframe, and
Supercomputer
• Minicomputer: A multi-user computer capable
of supporting up to hundreds of users
simultaneously.
simultaneously
22
Mainframe Computers
24
Supercomputers
25
Characteristics of Computers
1. Store a large amount of data and
information for a long
period of time.
2. Process data and information in high
accuracy level .
3. Speed in processing data information.
26
4. Sharing of information / network.
Why a Computer is a powerful
tool
• A computer is a powerful tool because
it is able to perform the information
processing cycle operations ( input,
process, output and storage) with
amazing speed, reliability and
accuracy, store huge amounts of data
and information and communicate
usually via telephone lines or cable. 27
Understanding the difference between Data,
Information and Knowledge:
•Processing data in order to produces information, and
processing information produces knowledge.
Data Information
Computer
Knowledge
Figure 0.0 Processing data into information cycle
28
Data:
Data is the name given to basic facts such
as names and numbers.
Information:
Information is data that has been converted
into a more useful or intelligible form.
Knowledge:
Knowledge arrangement of information and
classifying information of the
same type or the same topic. 29
Main components
of a computer
30
SOFTWARE
31
Hardwar
e
Is the electric, electronic and mechanical equipment that
makes up a computer.
The parts of computer itself (tangible objects) including:
33
Hardware
Memory output
Arithmeti
c RAM units
Input
logic
units ROM
Unit
(ALU)
35
Primary Information
Memory /Knowledge
Hardware Organization
Input Devices ...
CPU
memory
motherboard
36
hard drive
Central Processing Unit (CPU)
• CPU stands for Central Processing Unit. It is often
referred to as the brain of the computer because
it performs most of the processing inside the
computer. The CPU interprets and executes
instructions, performs calculations, and manages
the flow of data through the computer system.
37
Key aspect of the CPU
• Function: The CPU is responsible for executing instructions
stored in the computer's memory. It performs arithmetic and
logic operations, controls input and output operations, and
coordinates the activities of other hardware components.
40
Output Devices
• An output device is any piece of hardware that receives
data from the computer. Usually, this data is used to
display information to the user in some form.
41
Hardware Organization
CPU
memory
motherboard
42
hard drive
Primary Memory
43
RAM (Main Memory)
44
Key characteristics and uses of RAM
• Volatile Nature: RAM is volatile memory, meaning that its contents are lost when
the power to the computer or device is turned off. This is in contrast to non-volatile
memory like ROM (Read-Only Memory), which retains its data even when the power
is off.
• Fast Access: RAM provides fast access to stored data and instructions. It is much
faster for the CPU to read from and write to RAM compared to accessing data from
storage devices like hard drives or solid-state drives (SSDs).
• Temporary Storage: RAM serves as temporary storage for data and program
instructions that are actively being used by the CPU. This includes the operating
system, application software, and data being processed by programs.
• Capacity and Speed: The capacity and speed of RAM can significantly impact the
performance of a computer system. Higher-capacity and faster RAM modules allow 45
for more data to be stored and accessed quickly, resulting in smoother multitasking
and faster program execution.
ROM: Read Only Memory
46
Key characteristics and uses of
ROM
• Non-Volatile: ROM retains its data even when the power is turned
off, making it suitable for storing essential system instructions that
must remain intact at all times.
• Solid State Drive (SSD): SSDs are storage devices that use flash
memory to store data. Unlike HDDs, SSDs have no moving parts,
which makes them faster, more durable, and less prone to
mechanical failure. SSDs are commonly used in modern computers
and laptops due to their superior performance and reliability.
• Memory Cards: Memory cards, such as Secure Digital (SD) cards and
CompactFlash (CF) cards, are commonly used in digital cameras,
smartphones, and other portable devices to store photos, videos,
and other data. They are also used as secondary storage devices in
some computing systems.
50
Secondary Storage cont…
• Optical Discs: Optical discs, such as CDs, DVDs, and Blu-
ray discs, are secondary storage devices that use optical
technology to store data. They are commonly used for
distributing software, music, movies, and other digital
content.
53
Type of Software
Software is a set of instructions, programs, or data used to
operate computers and execute specific tasks. There are
several types of software, each serving different purposes
and functions.
54
System Software:
58
Information
processing
59
Information processing
Processing:
• The processing stage involves transforming and manipulating raw
data to generate meaningful information.
• This stage typically involves performing logical and arithmetic
operations, executing algorithms, and applying predefined rules
and instructions.
• The central processing unit (CPU) plays a central role in executing
processing tasks. 61
Stages of Information Processing:
Storage:
• The storage stage involves retaining processed data for future
reference or retrieval.
• Data storage can occur in various forms, including primary storage
(e.g., RAM) and secondary storage (e.g., hard drives, SSDs).
• Storage technologies and architectures vary in terms of capacity,
speed, durability, and volatility.
Output:
• The output stage involves presenting processed information to
users in a human-readable format.
• Output devices such as monitors, printers, speakers, and displays
are used to convey information to users.
• Output can be in various forms, including text, graphics, audio, and
video.
62
Challenges and Considerations
• Scalability: Information processing systems must scale to
handle increasing volumes of data and user requests efficiently.
• Reliability: Reliability measures ensure that information
processing systems operate consistently and accurately under
various conditions.
• Speed: Processing speed is critical for real-time applications
and time-sensitive tasks.
• Interoperability: Information processing systems should
seamlessly integrate with other systems and platforms to 63
enable data exchange and interoperability.
Online, offline processing,
real-time, batch processing,
single tasking and
multitasking
64
Online Processing vs. Offline
Processing:
Online Processing:
• Online processing refers to handling data and tasks in real-time
over a network or communication channel.
• Examples include online banking transactions, real-time chat
applications, and online gaming.
• Online processing often involves immediate interaction and
response with users or external systems.
Offline Processing:
• Offline processing involves performing tasks and operations
without a direct connection to a network or external system.
• Examples include batch processing of data, offline document
editing, and offline data analysis.
• Offline processing typically allows for more flexible scheduling and 65
does not require constant network connectivity.
Real-Time Processing vs. Batch Processing:
Real-Time Processing:
• Real-time processing refers to handling tasks and data with
minimal delay or latency, often in response to immediate events or
inputs.
• Examples include real-time monitoring systems, control systems, and
financial trading platforms.
• Real-time processing requires fast response times and continuous
data processing to meet strict timing constraints.
Batch Processing:
• Batch processing involves collecting and processing data in
discrete batches or groups, typically at scheduled intervals or in
offline mode.
• Examples include nightly data backups, batch processing of payroll
systems, and bulk data uploads.
• Batch processing allows for efficient handling of large volumes of 66
data but may introduce delays and may not be suitable for real-
time applications.
Batch processing
QUESTION: When money is withdrawn from an automatic
teller machine (ATM), why is batch processing not
suitable?
• If batch processing was used, data about transactions would be
collected over a period of time and processed some time later
• Once cash has been withdrawn from an account at the ATM this
must be reflected in the state/record of the account in the bank’s
database
• Batch processing would be too slow to enable this to happen
67
Current IT issue
• Cybersecurity Threats:
• Cybersecurity threats continue to evolve, posing significant risks to
individuals, organizations, and critical infrastructure.
• Challenges: Sophisticated cyber attacks, ransomware, phishing,
and data breaches are among the top challenges facing
cybersecurity professionals.
• Implications: Data breaches can lead to financial losses,
reputational damage, and compromise sensitive information.
• Strategies: Implementing robust cybersecurity measures, including
encryption, access controls, security awareness training, and
regular vulnerability assessments, is essential to mitigate risks. 68
Current IT issue
• There are numerous issues or threats that we may
looked at under Information Technology such as:
• Hardware failures
• Software failures
• Upgrade issues
• Disasters
• Malicious intent
75
Figure 1-5 – Subject and
Object of Attack
76
Data Communications
• The term telecommunication means communication at a
distance. The word data refers to information presented in
whatever form is agreed upon by the parties creating and
using the data. Data communications are the exchange of
data between two devices via some form of transmission
medium such as a wire cable
77
Components of a data communication system
78
Data communication: transmission
modes
• Simplex
• Transmission in one way only
• Half duplex
• Transmission in both directions, but not at
the same time
• Full duplex !
• Transmission in both directions at the same
time 79
Data flow (simplex, half-duplex, and full-duplex)
80
Types of Networks
What is Network
• Collection of computers and devices connected together
• Used to transfer information or files, share resources, etc.
• What is the largest network?
• Characterized based on their geographical coverage,
speed, capacities
• Networks are categorized based on the following
characteristics:
• Network coverage: LAN, MAN, WAN
• Network topologies: how the computers are connected
together
• Network technologies
• Network architecture 81
Network coverage
• Local Area Networks:
• Used for small networks (school, home, office)
• Examples and configurations:
• Wireless LAN or Switched LAN
• Peer-2-PEER: connecting several computers together
• Client/Server: The serves shares its resources between different
clients
• Metropolitan Area Network
• Backbone network connecting all LANs
• Can cover a city or the entire country
• Wide Area Network
• Typically between cities and countries
• Technology:
• Circuit Switch, Packet Switch,
• Examples:
• Internet P2P: Networks with the same network software can be
connected together 82
LAN v.s WAN
LAN - Local Area Network a group of
computers connected within a building or a
campus (Example of LAN may consist of
computers located on a single floor or a
building or it might link all the computers in
.a small company
personal personal
compute compute
r r
Star Topology
personal computer
personal computer
personal computer
personal computer
host 85
computer
printer
file server
Network Architecture
• Refers to how the computer or devices are designed in a network
• Basic types: Centralized – using mainframes
• Peer-2-Peer:
• Each computer (peer) has equal responsibilities, capacities, sharing
hardware, data, with the other computers on the peer-to-peer network
• Good for small businesses and home networks
• Simple and inexpensive
• Client/Server:
• All clients must request service from the server
• The server is also called a host
• Different servers perform different tasks: File server, network server,
etc.
86
laser se
printe rv
P2P vs Client-Server
Peers make a portion of their resources, such as processing
power, disk storage or network bandwidth, directly available
to other network participants, without the need for central
coordination by servers or stable hosts
Peer-to-Peer
Examples
87
Network Technologies
• Personal area network (PAN)
• A low range computer network
• PANs can be used for communication among the personal devices
themselves
• Wired with computer buses such as USB and FireWire.
• Wireless personal area network (WPAN)
• Uses network technologies such as IrDA, Bluetooth, UWB, Z-Wave
and ZigBee
• Internet Mobile Protocols
• Supporting multimedia Internet traffic
• IGMP & MBONE for multicasting
• RTP, RTCP, & RSVP (used to handle multimedia on the Internet)
88
Wide area Vs Global Area networks
Wide Area Network Global Area Network
• A network that connects two or • A global area network (GAN)
more local-area networks over a refers to a network composed of
potentially large geographic
different interconnected
distance
networks that cover an unlimited
Often one particular node on a geographical area. The term is
LAN is set up to serve as a loosely synonymous with
gateway to handle all
Internet, which is considered a
communication going between
global area network.
that LAN and other networks
Communication between networks
is called internetworking
The Internet, as we know it
today, is essentially the ultimate 89
wide-area network, spanning the
entire globe
Wi-Fi
• Wi-Fi is trademarked name for popular wireless technology that
uses radio waves to provide high-speed Internet and network
connections.
• The governing body that owns the term Wi-Fi, the Wi-Fi Alliance,
defines it as any WLAN (wireless area network) products that are
based on the Institute of Electrical and Electronics Engineers’
(IEEE) 802.11 standards.
• The way Wi-Fi works is through the use of radio signals like in
phones. The wireless adapter card that is found inside of computers
then uses the data that is being sent to change it into a radio signal
to then be transmitted by the antenna. A router then receives these
signals and decodes them in order to send the information
contained within to the Internet via a Local Area Network or a 90
wired Ethernet connection like a cable network connection.
What is Wi-Fi?
• Short for wireless fidelity.
• It is a wireless technology that uses radio frequency to
transmit data through the air.
• Wi-Fi is based on the 802.11 standard:
• 802.11a
• 802.11b
• 802.11g
91
Application of Wi-Fi
• Many electronic devices use
Wi-Fi due to its simple
functions.
93