Vous êtes sur la page 1sur 11

1.

Basic Concepts of Information Technology


1.1. Introduction Computers as multiuse equipment are being used not just in higher institutions like universities and research centres but in Government and private sectors, in banks, in schools, and also in homes. A Computer is actually a programmable, multiuse machine that accepts dataraw facts and figures, and processes, or manipulates them into useful information. Its purpose is to speed up problem solving and increase productivity. The skill or technique of using a computer and of making a computer can be termed Computer technology. Technology that makes communicating over long distances possible can be termed Communications, or Telecommunication technology, which consists of electromagnetic devices and systems for communications. The fusion or the merger of these two technologies is termed Information Technology (IT). Now lets see how various people have defined information technology (IT): IT is the science of systematic knowledge of the industrial arts, especially of the more important manufactures, as spinning, weaving, metallurgy, etc IT is acquisition, processing, storage and dissemination of all types of information using computer technology and telecommunication systems IT is the hardware and software that processes information, regardless of the technology involved, whether computers, telecommunications, or others.
IT is computer communications, networks, and information systems that enable exchanges of digital objects.

IT includes all matters concerned with the furtherance of computer science and Telecommunications and with the design, development, installation, and implementation of information systems and applications. It is interesting note that though IT is a fusion of two Computer and Communications technologies, the term IT hides them, and thus some prefer ICT as better replacement for the term IT, which stands, naturally, for Information and Communication Technology. 1.2. ICT Usages Electronic commerce, commonly known as e-commerce, is the buying and selling of product or service over electronic systems such as the Internet and other computer networks. E-banking (or Internet banking or Online-banking) allows customers of a financial institution to conduct financial transactions on a secure website operated by the institution, which can be a retail or virtualbank, credit union or building society.It may include of any transactions related to online usage.To access a financial institution's online banking facility, a customer 1

having personal Internet access must register with the institution for the service, and set up some password (under various names) for customer verification. E-Medicine is an online clinical medical knowledge base that was founded in 1996. 1.3. Health, Ergonomics & the Environment The use of computers and communications technology can have effects on our health: Repetitive Strain Injury (RSI) such as carpal tunnel syndrome (CTS), eyestrain, headaches, and back strain. Negative health effects have increased interest in the field of ergonomics - the study of relationship of people to equipment. Technology has some adverse effects on the environment. RSIs are several wrist, hand, arm, and neck injuries resulting when muscle groups are forced through fast, repetitive motion. CTS consist of a debilitating condition caused by pressure on the median nerve in the wrist, producing damage and pain to nerves and tendons in the hands. Computer Vision Syndrome (CVS) consists of eyestrain, headaches, double vision, and other problems caused by improper use of computer display. Use of improper chairs or position keyboards and display in improper ways leads back and neck pains. All kinds of adjustable, special purpose furniture and equipment are available to avoid or diminish such pains. Information Like kitchen appliances, hairdryers and television sets, many devices related to computers and communications generate low-level electromagnetic field emissions. As way of overcoming the health problems ergonomics devices are introduced. Ergonomics is the study of the physical relationship between people and their work environment. It is concerned with designing technology that is less stressful and more comfortable to use, that blends more smoothly with a persons body or movements. Examples of ergonomics devices includes Tilting display screens, Detachable keyboards, Keyboards hinged in the middle so that the users wrists are presumably in a more natural position, comfortable chairs and tables etc. 1.4. Ethics & Cyber ethics Users of Information Technology must weigh standards of behaviour and conducts in four areas: Issues of netiquette (etiquette in net), free speech, sexually explicit material, and censorship. Free speech is possible, one can speak evil, vulgar and impolite things with no hesitation as he can be far away from the listeners and no can control him unless he can be disconnected. Thus a sort of etiquette should be observed in communications. Other issue is that sexually explicit pictures and video clips may be freely available. In some countries it is illegal to download such things. Generally in many societies and families it is considered immoral or bad to get exposure to such materials. Who is going to control? It should be the ethics that under which one undergoes can only control him to observe such socially acceptable conducts over the net too this is termed cyber ethics. No one can censor, whether one can censor something or not is, perhaps a legal matter. 2

Issues of privacy in finances, health, employment, commerce, and communications. Question of privacy arises if information is open to everyone. People, in general, consider matters relating finance, health, and employment are highly private matters. Also, commercial and business secrets might get trapped in insecure hands. Copyrighted related issues software and network privacy, plagiarisms, and ownership of images and sounds. Intellectual Property Rights consists of the products of the human mind, tangible or intangible. There are three methods of protecting intellectual property, namely, Patents (as for an invention), Trade secrets (as for a formula or method of doing business), Copyrights (A Copyright is a body of law that prohibits copying of intellectual property without the permission of the copyright holder). There are three copyrighted matters: Software and Network Piracy, Plagiarism, and Ownership of Images and sounds: Piracy is a theft or unauthorised distribution or use of copyrighted or patented material. Software piracy is the unauthorised copying of copyrighted software. (e.g. copying from a floppy disk, downloading from a network) Network piracy is using electronic networks to unauthorised copyrighted materials in digitised form. distribute

Plagiarism is the exploration of another writers text, findings or interpretation. Processing Copyrighted Image: Scanners, Digital cameras, digital samplers, and computers make it possible to alter images and sounds to be almost anything you want. A copyrighted picture can be scanned but got the colour and order of objects in the picture changed or otherwise altered Digital Manipulation and Truthfulness in Journalism: the digital manipulation of sound, photos, and video, and the problem of truth in journalism. The possibility of altering a single picture, or processing several pictures to make a new picture, truthfulness or evidence of journalism in jeopardy.

1.5. Threats to Computers and Communications Systems Information Technology can be disabled by a number of occurrences. It may be harmed by people, procedural, and software errors; by electromechanical problems; and by dirty data. It may be threatened by natural hazards and by civil strife and terrorism. Criminal acts perpetrated against computers include theft of hardware, software, time & services, and information; and crimes of malice and destruction. Computers can also be used as instruments of crime. Criminals may be employees, outside users, hackers, crackers, or professional criminals.

There are two types of crimes against computers and communications: i. An illegal act perpetrated against computers or telecommunications, which includes theft of hardware, theft of software, theft of time and services (playing games, doing other business, use of personal communications etc at the working place), theft of information, crimes of malice and destruction The use of Computers or telecommunications to commit an illegal act, spreading virus is an example of crime under this category. Viruses come in several forms: boot-sector virus, file virus, worm, logic bomb, Trojan horse, polymorphic virus, virus mutation engines.

ii.

1.5.1. Virus Perhaps the most well known computer security threat, a computer virus is a program written to alter the way a computer operates, without the permission or knowledge of the user. A virus replicates and executes itself, usually doing damage to your computer in the process. 1.5.1.1. Occurrence of Virus spreading Even if youre careful you can pick up computer viruses through normal Web activities like: Sharing music, files or photos with other users through network and storage devices. Visiting an infected Web site Opening spam email or an email attachment Downloading free games, toolbars, media players and other system utilities Installing mainstream software applications without fully reading license agreements 1.5.1.2. Symptoms of a computer virus Your computer may be infected if you recognize any of these malware symptoms: Slow computer performance Erratic computer behaviour Unexplained data loss Frequent computer crashes 1.5.1.3. The ways to protect the computer from Virus Use antivirus protection and a firewall Get antispyware software Always keep your antivirus protection and antispyware software up-to-date Update your operating system regularly 4

Increase your browser security settings Avoid questionable Web sites Only download software from sites you trust. Carefully evaluate free software and file-sharing applications before downloading them. Don't open messages in emails from unknown senders Immediately delete messages in your email, you suspect to be spam 1.6. Security: Safeguarding Computers and Communications Information Technology requires vigilance in security: Identification and Access: This includes protections by password, PIN, cards, keys, signature, digital signature (public key/private key system) and / or by using physical traits (finger print ID, voice ID, retina ID, Lip print). Encryption: Encryption or enciphering is the altering data so that it is not usable unless the changes are undone. (A program called PGP Pretty Good Privacy is good at it). Protection of Software and Data: This can be achieved giving access to authorised users, keeping log files and having audit controls. Disaster Recovery Planning: A disaster-recovery plan is a method of restoring information processing operations that have been halted by destruction or accident. A policy of keeping backup files, and installing and updating anti-virus programs would be essential.

2. Hardware Computer hardware equals the collection of physical elements that comprise a computer system. Computer hardware refers to the physical parts or components of a computer such as monitor, keyboard, hard drive disk, mouse, printers, graphic cards, sound cards, memory, motherboard and chips, etc all of which are physical objects that you can actually touch. 2.1. The system Unit The main part, processing unit and devices, of a microcomputer is a system unit. The system unit includes the chassis, microprocessor, main memory, bus, and ports, but does not include the keyboard or monitor, or any peripheral devices. Inside a Computer There are basic components that any computer should have: Power Supply Hard Drive - changes normal household electricity into one electricity that a computer can use - is the primary device that a computer uses to store information.

Expansion Card - lets you add new features to a computer. For example, an expansion card can give a computer the ability to record and play sound. Expansion Slot - is a socket on the motherboard. Expansion card plugs into an expansion slot. - is the main circuit board of a computer. All electrical components plug into the motherboard.

Motherboard

Central Processing Unit (CPU)- is the main chip in a computer. The CPU processes instructions, performs calculations and manages the flow of information through a computer. Random Access Memory (RAM)-temporarily stores information inside a computer. This information is lost when you turn off the computer. CD-ROM Drive - reads information stored in compact discs (CDs). Drive Bay - is the space inside the computer case where a hard drive, floppy drive or CD-ROM drive sits.

2.2. Block Diagram of a Computer System CPU


ALU Internal Communic ation Registers Control Unit Input Interface Input Devices Keyboard Mouse/Joystick Light pen Scanner Infra-red ray Video Camera Microphone etc. Output Interface Output Devices VDU(Monitor) Printer Speaker etc.

Storage/Input Internal Memory


RAM (Read/Write) ROM (Read Only)

BUS SYSTEM

External Storage: Hard Disk, Pen Drive, CD,DVD, Magnetic Tape

Input: An input device lets you communicate with a computer. You can use input devices to enter information and issue commands. A keyboard, mouse and joystick etc. are input devices. Input data will be stored in Read and Write memory (RAM) for processing. Process: The Central Processing Unit (CPU) is the main chip in a computer. The CPU processes instructions, performs calculations and manages the flow of information through a computer system. The CPU communicates with input, output and storage devices to perform tasks. The speed (operating frequency) of the CPU is measured in megahertz (MHz) or gigahertz (GHz). The CPU consists of three parts, Control Unit:- The control unit direct the movement of electronic signals between the components. ALU :- Arithmetic and Logical Unit, performs the arithmetic and logical operations. Arithmetic operations are addition, subtraction, mulitiplication, division. Logical operations are comparisions (equal, greater than, less than, greater than or equal, less than or equal, not equal). Registers :- A special type of storsge in the CPU. Registers are temporarily store data during processing. Registers hold data that is to be processed immediately. The computer loads the program instruction and data from main memory into the registers before processing. Storage: Storage is a device that holds information. The main memory also known as primary storage/ internal memory. It perform three tasks. It holds data for processing
It holds instructions for processing the data

It holds data after it is processed, waiting to be sent to an output or storage device.

It holds data until the power on. So called volatile memory. Output: An output device lets a computer communicate with you. These devices display information on a screen, create printed copies or generate sound. Monitor, printers and speakers are output devices. 2.3. Memory It is also called internal memory or primary memory. Random Access Memory (RAM), temporarily stores data into a computer. It is, in fact, read and writes memory. It works like a blackboard that is constantly overwritten with new data. The data stored in memory disappears when you turn off the computer. Read Only Memory (ROM) has permanent data, we cannot write on it, and it will not get affected by the presence or absence of power. 2.4. Types of Computer Systems There are several types of computer systems. Supercomputers: are widely used in scientific applications such as aerodynamic design simulation, processing of geological data. Mainframe computers: are usually slower, less powerful and less expensive than supercomputers. Mainframes are used by banks and much business to update inventory etc. Minicomputers: are smaller than mainframe, general purpose computers, and give computing power without adding the prohibitive expenses associated with larger systems. Microcomputers: is the smallest, least expensive of all the computers. Micro computers have smallest memory and less power, are physically smaller and permit fewer peripherals to be attached. Note: This classification is according to the order of Size and power. There are no sharp dividing lines in that. For example a model of the top of the manufacturers range of mini computers might well be more powerful than model at the bottom of range of main frames of another manufacturers There are two types of microcomputers: Workstations and Personal Computers. Workstations Expensive, powerful desktop machine used mainly by engineers and scientist, animators and others whose work involves intensive computations. Provide many capabilities formally available only in mainframes or minicomputers.

Personal Computers (PCs) These are desktop or portable computers that can run easy-to-use programs such as word processing, spreadsheets and other common applications. 3. Software Physical Devices and components of computer cannot operate without software and is needed to make the hardware process data in the ways required. Software is the general term used to describe programs, which are used on a computer and consists of the step by step instructions that tell the computer how to perform a task. It has to be written by a programmer. Main classes of software are shown below:

Software System Software Application Software Application Packages User Programs Firmware

Operating system Utility programs Language Translator

3.1. System software System software is a program which makes the computer hardware usable. These are used to control its operations. These ensure proper, orderly and an efficient use of hardware by application programs. 3.2. Operating System An operating system (OS) is a set of programs that manages computer hardware resources, and provides common services for application software. The operating system is the most important type of system software in a computer system. Without an operating system, a user cannot run an application program on their computer, unless the application program is self booting Eg: Windows vista & Windows 7, Windows XP, DOS, CP/M, UNIX, Mac OS, LINUX, Solaris, Windows 95, 98, ME, Windows 2000, Windows CE, and 9

Server versions (Windows NT, Windows server 2008 R2) are some examples of operating system software. 3.3. Application Software Application software consists of Programs that direct computers to perform specific information processing activities for end users. These programs are called application packages because they direct the processing required for a particular use, or application, which users want to accomplish. Thousands of application packages are available because there are thousands of different jobs end users want computers to do. 3.3.1. Kinds of Application Software Application software includes a variety of programs that can be subdivided into general-purpose and application-specific categories. 3.3.1.1. General-Purpose Application Programs General-purpose applications packages are programs that perform common information processing jobs for end users. For example, word processing programs, electronic spreadsheet programs, database management programs, graphics programs,

communications programs, and integrated packages are popular with microcomputer users for home, education, business, scientific, and many other general purposes. 3.3.1.2. Application-Specific Software Many application programs are available to support specific applications of end users. Business Application Programs: Programs that accomplish the information processing tasks of important business functions or industry requirements. Scientific Application Programs: Programs that perform information processing tasks for the natural, physical, social, and behavioral sciences, engineering and all other areas involved in scientific 10

research, experimentation, and development. There are so many other application areas such as education, music, art, medicine, etc. 4. Network A network is simply a group of two or more Personal Computers and other communication devices that can communicate with one another and share resources such as data, applicationsant etc. 4.1. Advantages of networks: Sharing peripheral devices Sharing programs and data Work distribution: Better communication Security of information Access to databases 4.2. Network Categories Networks are categorised principally in three sizes. There are: Local-Area Networks (LANs): In a LAN, computers are connected together within a confined geographical area. i.e. within a single building of up to a few kilometres in size (for example, an office or home or campus) Metropoliton Area Network (MAN): In a MAN, computers are connected together within a geographical areas the size of city. This normally avoids the long distance telephone. Cellular phones systems are often MAN. Wide-Area Networks (WANs): In a WAN, spans a large geographical area, often a country. Computers are further apart and are connected via telephone/communication lines, radio waves or other means of connection.

4.3. Intranets & Extranets Networks entirely within your organisation are referred to as Intranets; they are private and need not be connected to the outside world. In these situations you can use the power and flexibility of the browser to distribute information around your organisation, with the advantages of a central distribution point, namely maintenance and administration. Extranets are extensions to your Intranet, making use of the Internet by encrypting your data. This means that you can allow people outside your own network to log in to access important information. A good example of this might be your sales force, when they are off site. You might wish to expose certain data to specific suppliers.

11

Vous aimerez peut-être aussi