SlideShare a Scribd company logo
1 of 124
University Of Buddhist and pali
About the lecturer
Dinesh Kumara Hakmana Abeynayaka Gunathilaka
• MBCS -CITP– UK
• MUKAP – University Of Greenwich
Subject Contents in General
• Computer Hardware
• Computer software
• Application programs
Word processing
Presentation
Spreadsheets
• Data & information management
• Computer networking
• Applications of networking: Internet, Intranet
Subject Content in Details
1.0 The Information Technology
Basic Information Technology Concepts
Computer History
Basic Components of Computer System
How a Computer System Works
2.0 Function of Major Computer Hardware
Computer Configuration and Classification
Central Processing Unit
Input-Output Devices and Peripherals
Secondary Storage
3.0 Basic Uses of Application S/ware & OS
Operating System and Its Functions
Disk Operating System (DOS) Primer
High and Low Level Languages
Assembler, Compiler and Interpreter
WINDOWS and MS Office Primer
4.0 Data Security
Importance of Backup
The Computer Virus Crisis
5.0 Computer and Network
Local Area Network (LAN)
Metropolitan Area Network (MAN)
Wide Area Network (WAN)
LAN Components, Topologies and Types
Transmission Media
 
Objectives
• Describe the three fundamental characteristics of computers
• Describe at least four areas of society in which computers are
used
• Identify the basic components of a computer system: input,
processing, output, and storage
• List some common input, output, and storage media
• Distinguish data from information
• Describe the significance of networking
• Explain the significance of the Internet
• Explain the various classifications of computers
Course Assessment
Quiz 20%
Test 20%
Assignment 20%
Final Exam 40%
Total = 100%
Introduction to Computers
Computer hardware
Input, Output & peripheral devices
History of computers
Basic Components of a Computer System
What is computer?
An electronic device that can accept data (input), 
process the input to useful information (process) 
according to a set of instructions, store the 
instructions and the results of processing (storage), 
and produce the information (output). 
Other definition:- 
• A machine that can be programmed to accept data 
(input), process it into useful information (output), 
and store it away (in secondary storage device) for 
safekeeping or later reuse
• Process is directed by software but performed by the 
hardware
Basic Components of a Computer System
• Evolving more rapidly than Industrial Age
• Will continue into the current century
Information Age
Cornerstones of our Economy
• Land
• Labor
• Capital
• Information
Forging a Computer-Based Society:
Jobs
• From physical to 
mental
• From muscle-power to 
brain-power
Forging a Computer-Based Society:
A Computer in Your Future
• Where used?
– Bank withdrawal
– Supermarket
– Drive the car
• Do I need a Personal Computer?
– Campaign: One Home, One PC
– Many more use at work
• Will I use a computer in my future career?
– Almost every job will involve use of a computer
Computer Literacy
• Awareness
– Importance
– Versatility
– Pervasiveness in our society
• Knowledge
– What are computers
– How do computers work
– Terminology
• Interaction
– Use some simple computer applications
Is computer literacy enough?
• Need to be computer literate to manipulate
a computer
• Need to be computer fluent on computer
concepts as a basis to build deeper
knowledge
• Computer fluency make one able to
continue follow developments as computers
continue to evolve
Basic Information Technology 
Concept
• Information technology - the use of modern
technology to aid the capture, storage, retrieval,
analysis, and communication of information.
• The various methods of delivering information are
by the use of data, text, image, and voice for
personal or organization needs.
History of Computers
• Man from centuries ago used a physical unit or sets
of units to represent numbers or quantities.
• A number or a quantity can be represented by a
physical thing, whether it is:
a pebble
a transistor
a bead of wirea mark on a bit of paper
a mechanical gear wheel
an electrical relay
a vacuum
tube
The Nature of Computers
Characteristics
• Speed
• Reliability
• Storage capability
Results
• Productivity
• Decision making
• Cost reduction
Where Computers Are Used: 
Graphics
Graphs and charts
Animated graphics
Visual walk-through
Where Computers Are Used:
Education
• Teaching and 
testing aid
• Learning by doing
• Computer-based 
instruction
Where Computers Are Used:
Retailing
• Bar codes for pricing 
and inventory
• Shipping
Where Computers Are Used:
Energy
• Locate oil, coal, natural gas, and uranium
• Monitor the power network
• Meter reading
Where Computers Are Used
:Law Enforcement
• National 
fingerprint files
• National files on 
criminal
• Computer 
modeling of DNA
Where Computers Are Used:
Transportation
• Cars
• Run rapid transit systems
• Load containerships
• Track railroad cars
• Monitor air traffic
Where Computers Are Used:
Money
• Record keeping
• Banking by phone
• Credit cards
Where Computers Are Used:
Agriculture
• Billing
• Crop information
• Feed combinations
• Livestock breeding and 
performance
Where Computers Are Used:
Government
• Forecast weather
• E-government
• Process immigrants
• Taxes
• Registration: birth, identity, car etc.
Where Computers Are Used:
The Home
• Educational tool
• Record keeping
• Letter writing
• Budgeting
• Drawing and editing 
pictures
• Newsletters
• Connecting with others
Where Computers Are Used:
Health and Medicine
• Monitor patients
• Electronic imaging
• Diagnose illnesses
• Tele-health
Where Computers Are Used:
Robotics
• Perform jobs that are dangerous for 
humans
• Factory work
Where Computers Are Used:
The Human Connection
• Assist the disabled
• Assist athletes by 
monitoring their 
movements
Where Computers Are Used
The Sciences
• Research
• Simulation
Connectivity
• Communication
• Telecommuting
Where Computers Are Used
Training
• Airline pilots
• Railroad
engineers
Paperwork
• Junk mail
• Term paper
• Record keeping
Computers are all around!
• Grocery store
• Schools
• Libraries
• Bank
• Mail
• Malls
We interact with computers everyday!
What computers can’t do yet?
Complex human activities
What else? Can you think of
others?
Computer System
People
Software
Hardware
People
• Computer programmer – person who
writes programs
• Users or End-users – make use of the
computer’s capabilities
Software
• Programs
• Set of instructions that directs the
hardware to do a required task
and produce the desired results
Hardware:
Basic Components of a Computer
Computer Components
1. Input Devices
- examples: keyboard and the mouse
- data entered on the keyboard and temporarily stored
in the computer’s memory and displayed on the monitor
2. System Unit
- contains the electronic circuits that cause the processing
of data to occur
- consists of central processing unit, memory, (RAM and
ROM)
and other electronic components
- CPU has a control unit and arithmetic/logic unit
- RAM temporarily stores data and program instructions
when they are processed
4. Output Devices
- most commonly used output devices are monitor and
printer
- Monitor :commonly as CRT or Flat Panel Display
- Printer: Dot-Matrix, Ink-Jet etc.
5. Secondary Storage Devices
- also known as auxiliary storage devices
- stores instructions and data when they are not being
used by the system unit
- Examples : floppy disk and hard disk drive
Computer Components – cont.
Input Process Output
Data
Information
Storage
How a Computer System Works
How a Computer System Works –
cont.
Software
- The instructions needed to direct the computer to
complete specific tasks.
• The CPU follows the step-by-step instructions in a
program to complete the tasks from user.
• Operating system is the system software that controls
the basic, low-level hardware operations and file
management.
Microcomputers
- Also known as personal computers
- Physical sizes : palmtop, desktop and tower case
- Cheaper and smaller in size
Minicomputer
- Also known as departmental computers
- Physical sizes : small to large cabinets
- Support business application
Computer Configuration and
Classification
Mainframe
- Large computers with the capability to process
data at millions of instructions per second.
- Physical size : partial to full room of equipment
Supercomputer
- Most powerful and expensive computers
- Vast quantities of data manipulation
- Physical size : full room of equipment
- No. of users : hundreds of users
Computer Configuration and
Classification – cont.
Central Processing Unit (CPU)
- It is the heart of the computer, that is the microprocessor
chip.
- A highly complex, extensive set of electronic circuitry
that executes stored program instructions.
- CPU perform three main tasks :-
• Perform arithmetic operations
• Perform logic operations
• Retrieval and storage of data
- CPU consists of two main units :-
1. Arithmetic Logic Unit (ALU)
- arithmetic operations e.g. +, -, x, /
- logic operations e.g. >, >=, ==, <,
<=
CPU – cont.
2. Control unit
- fetches instructions from memory
- decode/translate instructions
- executes the processing tasks
- stores result in memory
CPU – cont.
- CU fetches instructions
from memory
- CU decodes/translates
instructions, directs
necessary data to ALU
- ALU executes
arithmetic/logic
instruction
-ALU stores results into
memory
What happens in a CPU?
Memory
- also known as primary storage, primary memory,
main storage, internal storage, and main
memory
- Consists of RAM and ROM
1. RAM (Random Access Memory)
- volatile; means the data exists only when power is ON
- two types of RAM, dynamic and static
2. ROM (Read Only Memory)
- non-volatile; means data permanently stored in and
cannot be changed
CPU – cont.
Function of Computer System
Data handling
I Input
P Process
O Output
S Storage
Processing: Batch vs. Interactive
• 2 types of information processing
– Batch processing
– Interactive processing : Real time
Input devices
• Accept data or commands and convert
them to electronic form
• Getting data into the computer
– Typing on a keyboard
– Pointing with a mouse
– Scanning with a wand reader or bar-code
reader
– Terminal
Output devices
Monitor or screen
• Text
• Numbers
• Symbols
• Art
• Photographs
• Video
Printer
• Black and white
• Color
• Convert from electronic form to some other
form
• May display the processed results
• Usable information
Input and Output Devices
1. Input devices
- Common type of devices used are the keyboard and the
mouse
- Standard type of keyboard is the QWERTY which has
86 keys (basic) and 101-102 keys (enhanced).
- Mouse is a pointing device for effective use of
computer interface. Trackball and touch pad are also
considered as pointing devices.
Input and Output Devices – cont.
Digitizer
- A pad with a pen-like stylus.
- The tablet sends electronic signals to the
computer, displaying the image drawn.
Input and Output Devices – cont.
the use of special equipment to collect data at
the source and send it directly to the computer.
Source data automation
MICR
ImagesOCR
Bar code Hand Written
Input devices– cont.
Input and Output Devices – cont.
2. Output devices
- most common devices are monitor displays and
printers
- Two types of display; flat panel display and CRT
display (Cathode Ray Tube)
- Two categories of printers; impact and non-impact
printers
Displays
1. Flat Panel
- commonly used in laptop, notebook
- examples of flat panel; LCD, Gas Plasma
2. CRT
- produce best images for computers
- two types of display; monochrome and color
- monochrome; displays one color (green or
amber)
- color; four types:
Input and Output Devices – cont.
Standard Graphic Add-on-Boards
Resolution
(by pixels)
CGA (Color Graphic Adapter) 640 x 200
EGA (Enhanced Graphic Adapter) 640 x 350
VGA (Video Graphic Array) 640 x 480
SVGA (Super Video Graphic Array) 1024 x 768
Displays – cont.
Input and Output Devices – cont.
Two types of printers (according to printing methods)
Impact printers
-use a physical contact with the paper to produce an
image
-e.g. dot matrix printer and line printer
Non-impact printers
-Place images on a paper without physically
touching it
-e.g. thermal, inkjet, laser printer
Input and Output Devices – cont.
Printers
Can you think of any other
input/output devices?
The Processor
Central Processing Unit (CPU)
• Converts data to useful information
• Interpret and execute instructions
• Communicate with input, output and
storage
Two Types of Storage
• Secondary storage
long-term storage
• Primary storage or memory
temporary storage
Memory / Primary Storage
• Temporary storage
• Holds input to be processed
• Holds results of processing
• Contains the programs to control the
computer and manipulate input into
output
• Volatile
Secondary Storage
• Long-term storage
• Non-volatile
Secondary Storage Examples
• Magnetic disks – read and written by
magnetic disk drive
– Hard disk
– Diskette
• Optical disks – read and written by optical disk
drives
– CD-ROM
– DVD-ROM
• Magnetic tape – read and written by magnetic
tape drives
– Primarily used for back-up
Magnetic Disk
• It is needed because
– Main memory stores data temporarily
– Main memory space is limited
Secondary Storage
 Benefits of secondary storage
 Space
 Reliability
 Convenience
 Economic
Computer System
• Computer
– CPU
– Memory
• Peripheral equipment
– Connected to the computer by a cable
– Input, output, storage
Computer Network
• Definition
– A system that uses communications equipment
to connect computers and their resources.
• Types
– Local area network (LAN) – connects computers
in close proximity
– Metropolitan are network (MAN) – connect
computers between buildings in the same
geographic area
– Wide are network (WAN) – connects computers
over great distances
Home Connectivity
• Connect home PC to other computers
• Use modem to convert signals
between electronic (computer) and
analog (voice) formats
Internet
• Collection of networks
• No ownership
• No central source for services available
• No comprehensive index of what information
is available
Individuals
Businesses
Organizations
Libraries
Research labs
Government
Connects Everyone!
Getting Connected
• User’s computer must connect to a server
• Server must communicate using TCP/IP
• The user can purchase access to a server
from an ISP (Internet Service Provider)
Internet – What Can You Do?
• WWW – World Wide Web
• FTP – File Transfer Protocol
• E-mail
• UseNet
• IRC – Internet Relay Chat
• Bulletin Boards
World Wide Web
• Browser – program that allows the user
to move around and explore the
Internet
• Use the mouse to point and click on
text and graphics
• Web page
• Web site
• Home page
Classifications of Computers
• Use the computer that fits your needs
• Based upon
– Size
– Speed
– Cost
– Portability
– Number of simultaneous users supported
– Available software
– Typical use
Personal Computers
• Other names
– PC
– Microcomputer
– Home computer
• Categories
– Low-end functional
– Fully powered
– Workstations
– Net computer or net box (Web TV)
• Desktop Models
Notebook Computers
• Portable
– Lightweight
– Fits in a briefcase
– Battery operated
• Laptop
– Larger
– Heavier
• More expensive that desktop models
Handheld Computers
• Personal Digital Assistant (PDA)
– Scheduling
– Addresses
– Handwritten input
– May offer wireless e-mail and fax
• PDA Phone
– More power than PDA
– Cellphone, GPS, MP3/MP4, Camera,
Video, TV, Radio etc.
– Runs various type softwares, serving various
applications
Other Types of Computers
Mainframes
– High speed
– More expensive
– Used to process large amounts of data quickly
– Support multiple users
– Does server tasks
Supercomputers
– Fastest speed
– Most expensive
What is a software?
- The instructions needed to direct the computer to
complete specific tasks.
- Software can be categorized into two types :-
Operating System and Its Function
Application Software
- program that tells a computer how to produce information
- examples of application software :
Business, scientific, educational programs and etc.
System Software
- program controlling the actual operations of the computer
equipments
- the operating system tells computer how to perform
functions such as load, store, execute application program,
transfer data between I/O devices and main memory
Operating System and Its Function
– cont.
Definition of OS :-
A set of programs that control and supervise a
computer system’s hardware
Purposes of OS :-
• To manage the hardware for efficient utilization of
computer resources
• To interface between a user/an application program
with the hardware
Operating System and Its Function
– cont.
• OS is made up of 2 programs;
Operating System and Its Function
– cont.
Control
Program
Service
Program
1. Control program - three main functions
Operating System and Its Function
– cont.
Resource allocation allocate processor time, primary storage,
input and output devices
Job management to monitor, schedule and control programs
for its efficient processing
Data management -managing access to data for input of
information to printers,
disks/displays
- all hardware components activities are
controlled by the supervisor program
2. Service programs
- provides services to the user/programmer
- services include language-translator programs and
utility programs
- language-translator program converts instructions from
English-like language to machine-language to be executed by the
computer
- utility program performs loading, saving, copying, keeping
track of files stored on a disk, preparing a formatted disk
Operating System and Its Function
– cont.
LanguageTranslator
Utility
Program
Other Services
Data M
gmt.
Job M
gm
t.
Resource Allocation
Supervisor
Operating System and Its Function
– cont.
What an Operating System does?
1. Checks the functionality of the computer’s hardware.
It generates an error message (by messages or beeps) if
any components are found faulty.
2. Then the OS control programs will load the supervisor
program into the computer’s memory – booting
3. Once the supervisor control program in memory, the
system displays the prompt sign (C:>), indicating that
it is ready to work
MS-DOS
 DOS is the supervisor program of the computer
 It does all the followings
• Interface to peripherals – How to interpret input, how to
process data, and how to produce output
• Application launcher – Most programming software, games
etc. use DOS prompt to run application
• Utility provider – Manage disks and files, prepare disks for
storage, copy files to a disk, to move or rename files, and to
delete files
MS-DOS – cont.
• Using DOS prompt to get command from user
• Examples for DOS operation
• DOS version/prompt type
• Modify date/time
• File and directory contents
• Clearing a DOS screen
• Going to subdirectory and back to root directory
• Searching for specific files
• Copy files from A drive / C drive
TYPES OF OS
 Microsoft Windows (98,
2000, XP, Vista)
 Mac OS (X)
 Linux OS (Hundreds of
even thousands of distros
ex: Red Hat, Ubuntu,
Mandrake etc. Visit
http://distrowatch.com/
for listing of Linux OS)
 Unix OS etc.
TYPES OF BROWSERS
 Mozilla Firefox
 Internet Explorer
 Opera
 Safari
 Konqueror
 Flock
Firefox is gaining
Popularity over IE
Flock
Low and High Level
Languages
Programming Language
- a set of written symbols that instruct the computer
hardware to perform certain tasks
- can be categorized as Low level Language and High Level
Language
Low Level Language
- Language that has the tendency towards specific,
delicate machine syntax
- Machine Language and Assembly Language
- consists of entirely 1’s and 0’s that only the computer
understands
- depends on different, specific hardware designs
- it executes very fast, but is time consuming and difficult to
understand
- only programmer who has the knowledge of the computer
architecture is able to understand the language
Low and High Level Languages
– cont.
Low Level Language – cont.
Machine Language
-also considered as Low Level Language because it still needs
specific knowledge of hardware
-it differs from machine language because of it uses
mnemonic in spite of 1’s and 0’s to represent the operation
codes
-mnemonic code is an alphabetic abbreviation that is easy to
remember
-it produce programs very efficient, less storage usage and the
execution is much faster
Low Level Language – cont.
Assembly Language
Low and High Level Languages –
cont.
- instructions resemble human language and mathematical
notation
- no detail knowledge of computer hardware and internal
operation of a computer
- easier to learn because of the English-like language rather
than understanding machine codes and instructions
- E.g. FORTRAN, COBOL, BASIC, Pascal, C/C++
Low and High Level Languages –
cont.
High Level Language
Assembler, Compiler and
Interpreter
Assembler
Compiler/Interpreter
(Source code) (Object code)
- the source code will remain unchanged after the conversion
but can be updated and changed, then compiled again
- after it is compiled, then the object code can be executed
-example of HLL program uses compiler is the C and C++
- the interpreter will translate a program one line at a time,
executing each line of the program after it is translated
- if an error should occur during execution, the error must be
rectified or solved before it can proceed to the next line
- example of HLL program uses interpreter is the BASIC
Assembler, Compiler and
Interpreter – cont.
Compiler
Interpreter
Importance of Backup – cont.
Data is exposed to several threats.
Uninterruptible Power Supply (UPS)
How does UPS works?
- it is connected in series with the computer system
- when power is interrupted, this result the UPS to function as a
backup supply of power to the computer system
- depends on the type of UPS, it will operate in 20 minutes or more
- it is advisable to backup important data within the time limit to
prevent any lost of data
Importance of Backup – cont.
Components of UPS
- one rectifier (charger) to convert AC to DC and to fully charge
the battery
- one battery to supply DC power to the inverter and the supported
time are based on the number and size of batteries
- one inverter to convert DC to AC
- one static bypass switch to control the load from/to the power
source to/from the battery and allows certain load to transfer
tolerances needed by the computer and its peripherals
Importance of Backup – cont.
The Computer Virus Crisis
The elements of a computer virus :
1. A set of instructions - a program being made to disrupt or
interfere other programs
2. Deliberately created - purposely created by humans or by itself
3. Actively propagates - reproducing itself
4. Infects other programs - contaminate or polluting different types
of programs
5. Able to do harm - can cause damage to others
6. Able to evolve - developing, growing and changing in
programs or systems
TheComputerVirusCrisis –
cont.
What are the damages of the virus to a computer system :
1. Creates garbage in your computer system that takes up space
in the memory and into your diskettes
2. Messing up files in their normal standard and altering some
of the files
3. Messing up the FAT (File Allocation Table) which contains
information of where are the other data's stored on your disk
4. Messing up the boot sector that can restrict your computer
from being able to execute at all
The Computer Virus Crisis–
cont.
Types of anti-virus software
The Computer Virus Industry Association (CVIA) in the USA
has developed three basic categories of anti-virus software.
To prevent initial
infection
To detect
infection
To identify and
remove viruses
COMPUTER NETWORKING
Network : Computers connected together to
communicate among
themselves.
Resource Sharing
File Sharing
Communication
PCs’ Administration and Security
- Computer network technology can be classified by the distance
the network technology is designed to span
- There are three types of networking :
Local Area Network (LAN)
Metropolitan Area Network
(MAN)
Wide Area Network (WAN)
COMPUTER NETWORKING –cont.
Local Area Network (LAN)
- Relatively small refers to the transmission media and
computer hardware
- The area is not exceeding 10 KM
- It only uses one type of transmission medium
- It share resources within building or campus
COMPUTER NETWORKING –cont.
Metropolitan Area Network (MAN)
- The network is larger compared to LAN
- The area covers a city of 10 to 100KM
- It requires efficient hardware and transmission
media
to cover these areas
COMPUTER NETWORKING –cont.
Wide Area Network (WAN)
- The network is larger than MAN and LAN
- It interconnect LAN of opposite sides of country or around
the world
- It covers huge geographical area in the world
COMPUTER NETWORKING –cont.
Local Area Network
Local Area Network
Router Multiplexer
Multiplexer
Modem
Modem
Front end
Processor
Host Computer
LAN COMPONENTS
Every LAN is made up of a standard set of components:
Topology: The physical connection among
computers within a network
- the topology is the configuration of the hardware and shows
which pairs of nodes can communicate
-there are three common types of topologies :-
LAN TOPOLOGIES
Star topology
Ring topology
Bus topology
Star
Ring
Bus
LAN PROTOCOLS
Protocol : A set of rules to access the network
to send data.
Two common LAN protocols
TRANSMISSION MEDIA
Transmission Media : The physical medium used for
transmission.
Types of TM
Coaxial
Cable
Twisted
Pair Cable
Fiber Optic
Cable
Satellite
Transmission
Microwave
Transmission
TRANSMISSION MEDIA - Twisted
Pair Cable
Colour-coded insulation
Jacket
Copper wire conductor
Inner conductor
Insulation
Outer plastic covering
TRANSMISSION MEDIA – Coaxial
Cable
TRANSMISSION MEDIA – Fiber
Optic Cable
Optical fiber
Protective outer
sheath
Glass covering
Strength wires
TRANSMISSION MEDIA –
Microwave
TRANSMISSION MEDIA – Satellite
ANY QUESTIONS OR ADDITIONS?

More Related Content

What's hot

Information processing cycle
Information processing cycleInformation processing cycle
Information processing cycleCriselda Liscano
 
Introduction to information technology lecture 1
Introduction to information technology lecture 1Introduction to information technology lecture 1
Introduction to information technology lecture 1adpafit
 
Introduction to ICT - lecture 1
Introduction to ICT - lecture 1Introduction to ICT - lecture 1
Introduction to ICT - lecture 1Mohamed Thawuship
 
Computer peripheral or Peripheral Devices
Computer peripheral or Peripheral Devices Computer peripheral or Peripheral Devices
Computer peripheral or Peripheral Devices Adarsh Kumar Yadav
 
Introduction to information technology
Introduction to information technologyIntroduction to information technology
Introduction to information technologyHaider Ali Malik
 
History of the internet
History of the internetHistory of the internet
History of the internetAmal Jith
 
Introduction to computer science
Introduction to computer scienceIntroduction to computer science
Introduction to computer sciencederekoei
 
Components of a computer system
Components of a computer systemComponents of a computer system
Components of a computer systemMark Santos
 
An introduction to Computer Technology
An introduction to Computer TechnologyAn introduction to Computer Technology
An introduction to Computer TechnologySteven Heath
 
Lab 1 Introduction to Computer
Lab 1   Introduction to ComputerLab 1   Introduction to Computer
Lab 1 Introduction to ComputerHalimaton Sa'adiah
 
Introduction to information technology lecture 1
Introduction to information technology   lecture 1Introduction to information technology   lecture 1
Introduction to information technology lecture 1CBAKhan
 
Evolution of computers
Evolution of computersEvolution of computers
Evolution of computersAryan Kabra
 
Basic Components of Computer
Basic Components of ComputerBasic Components of Computer
Basic Components of ComputerRajGopalAgrawal
 
Fundamentals Of Computer
Fundamentals Of ComputerFundamentals Of Computer
Fundamentals Of ComputerJack Frost
 

What's hot (20)

Information processing cycle
Information processing cycleInformation processing cycle
Information processing cycle
 
Introduction to information technology lecture 1
Introduction to information technology lecture 1Introduction to information technology lecture 1
Introduction to information technology lecture 1
 
Introduction to ICT - lecture 1
Introduction to ICT - lecture 1Introduction to ICT - lecture 1
Introduction to ICT - lecture 1
 
Introduction to Information Technology
Introduction to Information TechnologyIntroduction to Information Technology
Introduction to Information Technology
 
Internet
InternetInternet
Internet
 
Evolution & History of Computers
Evolution & History of ComputersEvolution & History of Computers
Evolution & History of Computers
 
Computer peripheral or Peripheral Devices
Computer peripheral or Peripheral Devices Computer peripheral or Peripheral Devices
Computer peripheral or Peripheral Devices
 
Internet Presentation
Internet PresentationInternet Presentation
Internet Presentation
 
Introduction to information technology
Introduction to information technologyIntroduction to information technology
Introduction to information technology
 
A brief history of computers
A brief history of computersA brief history of computers
A brief history of computers
 
History of the internet
History of the internetHistory of the internet
History of the internet
 
Introduction to computer science
Introduction to computer scienceIntroduction to computer science
Introduction to computer science
 
Components of a computer system
Components of a computer systemComponents of a computer system
Components of a computer system
 
Computer systems
Computer systemsComputer systems
Computer systems
 
An introduction to Computer Technology
An introduction to Computer TechnologyAn introduction to Computer Technology
An introduction to Computer Technology
 
Lab 1 Introduction to Computer
Lab 1   Introduction to ComputerLab 1   Introduction to Computer
Lab 1 Introduction to Computer
 
Introduction to information technology lecture 1
Introduction to information technology   lecture 1Introduction to information technology   lecture 1
Introduction to information technology lecture 1
 
Evolution of computers
Evolution of computersEvolution of computers
Evolution of computers
 
Basic Components of Computer
Basic Components of ComputerBasic Components of Computer
Basic Components of Computer
 
Fundamentals Of Computer
Fundamentals Of ComputerFundamentals Of Computer
Fundamentals Of Computer
 

Viewers also liked

Introduction to Information Technology ( IT )
Introduction to Information Technology ( IT )Introduction to Information Technology ( IT )
Introduction to Information Technology ( IT )Er Aadarsh Srivastava
 
Chapter 4 Computer Ethics and Security
Chapter 4 Computer Ethics and Security Chapter 4 Computer Ethics and Security
Chapter 4 Computer Ethics and Security Fizaril Amzari Omar
 
Introduction to Information Technology (IT)
Introduction to Information Technology (IT)Introduction to Information Technology (IT)
Introduction to Information Technology (IT)Amber Bhaumik
 
Basic IT knowledge
Basic IT knowledgeBasic IT knowledge
Basic IT knowledgeTechsailor
 
Information Technology
Information TechnologyInformation Technology
Information TechnologyViraj Kansara
 
Introduction to Information Technology
Introduction to Information TechnologyIntroduction to Information Technology
Introduction to Information TechnologyQsrealm
 
Information technology ppt
Information technology ppt Information technology ppt
Information technology ppt Babasab Patil
 

Viewers also liked (12)

Introduction to Information Technology ( IT )
Introduction to Information Technology ( IT )Introduction to Information Technology ( IT )
Introduction to Information Technology ( IT )
 
3.2.2 World Wide Web (WWW)
3.2.2 World Wide Web (WWW)3.2.2 World Wide Web (WWW)
3.2.2 World Wide Web (WWW)
 
Chapter 4 Computer Ethics and Security
Chapter 4 Computer Ethics and Security Chapter 4 Computer Ethics and Security
Chapter 4 Computer Ethics and Security
 
3.2.1 The Internet
3.2.1 The Internet3.2.1 The Internet
3.2.1 The Internet
 
3.3 Internet Services
3.3 Internet Services3.3 Internet Services
3.3 Internet Services
 
3.1 Network Basic
3.1 Network Basic3.1 Network Basic
3.1 Network Basic
 
Introduction to Information Technology (IT)
Introduction to Information Technology (IT)Introduction to Information Technology (IT)
Introduction to Information Technology (IT)
 
Basic IT knowledge
Basic IT knowledgeBasic IT knowledge
Basic IT knowledge
 
Information Technology
Information TechnologyInformation Technology
Information Technology
 
Basic Concepts Of Information Technology (It)
Basic Concepts Of Information Technology (It)Basic Concepts Of Information Technology (It)
Basic Concepts Of Information Technology (It)
 
Introduction to Information Technology
Introduction to Information TechnologyIntroduction to Information Technology
Introduction to Information Technology
 
Information technology ppt
Information technology ppt Information technology ppt
Information technology ppt
 

Similar to 01 introduction to information technology

01IntroductiontoInformationTechnology_special.ppt
01IntroductiontoInformationTechnology_special.ppt01IntroductiontoInformationTechnology_special.ppt
01IntroductiontoInformationTechnology_special.pptAziziMtumwaIddi
 
unit-i-computer-organization and architecture.ppt
unit-i-computer-organization and architecture.pptunit-i-computer-organization and architecture.ppt
unit-i-computer-organization and architecture.pptvardagotmare1
 
computer organisation architecture.pptx
computer organisation architecture.pptxcomputer organisation architecture.pptx
computer organisation architecture.pptxYaqubMd
 
IT-Fundamentals-Presentation BSIT 1.pptx
IT-Fundamentals-Presentation BSIT 1.pptxIT-Fundamentals-Presentation BSIT 1.pptx
IT-Fundamentals-Presentation BSIT 1.pptxMark Dave Morco
 
Tìm hiểu về Công nghệ thông tin (IT) toàn tập
Tìm hiểu về Công nghệ thông tin (IT) toàn tậpTìm hiểu về Công nghệ thông tin (IT) toàn tập
Tìm hiểu về Công nghệ thông tin (IT) toàn tậpINFOCHIEF institute
 
ITC Lecture01.pptx
ITC Lecture01.pptxITC Lecture01.pptx
ITC Lecture01.pptxssuser368f5d
 
INTRODUCTION TO COMPUTER .pptx
INTRODUCTION TO COMPUTER .pptxINTRODUCTION TO COMPUTER .pptx
INTRODUCTION TO COMPUTER .pptxRamjeyDavocRony
 
Lecture1.pdf
Lecture1.pdfLecture1.pdf
Lecture1.pdfJoyPalit
 
Computer architecture pptx
Computer architecture pptxComputer architecture pptx
Computer architecture pptxMDSHABBIR12
 
Computers for managers notes
Computers for managers notesComputers for managers notes
Computers for managers notesAditya Mehra
 
Co module1a introdctnaddressingmodes
Co module1a introdctnaddressingmodesCo module1a introdctnaddressingmodes
Co module1a introdctnaddressingmodesManu Jose
 
Chapter01 Of It .... BBa 1st
Chapter01 Of It .... BBa 1stChapter01 Of It .... BBa 1st
Chapter01 Of It .... BBa 1stGeo-Info Ltd
 
computer networking
computer networking computer networking
computer networking Dhivya Kannan
 

Similar to 01 introduction to information technology (20)

01IntroductiontoInformationTechnology_special.ppt
01IntroductiontoInformationTechnology_special.ppt01IntroductiontoInformationTechnology_special.ppt
01IntroductiontoInformationTechnology_special.ppt
 
Unit I.ppt
Unit I.pptUnit I.ppt
Unit I.ppt
 
unit-i-computer-organization and architecture.ppt
unit-i-computer-organization and architecture.pptunit-i-computer-organization and architecture.ppt
unit-i-computer-organization and architecture.ppt
 
computer organisation architecture.pptx
computer organisation architecture.pptxcomputer organisation architecture.pptx
computer organisation architecture.pptx
 
Lecture 02 hardwares
Lecture 02 hardwaresLecture 02 hardwares
Lecture 02 hardwares
 
IT-Fundamentals-Presentation BSIT 1.pptx
IT-Fundamentals-Presentation BSIT 1.pptxIT-Fundamentals-Presentation BSIT 1.pptx
IT-Fundamentals-Presentation BSIT 1.pptx
 
Tìm hiểu về Công nghệ thông tin (IT) toàn tập
Tìm hiểu về Công nghệ thông tin (IT) toàn tậpTìm hiểu về Công nghệ thông tin (IT) toàn tập
Tìm hiểu về Công nghệ thông tin (IT) toàn tập
 
ch1.pptx
ch1.pptxch1.pptx
ch1.pptx
 
ITE 101 - Week 4
ITE 101 - Week 4ITE 101 - Week 4
ITE 101 - Week 4
 
Comp 501.pptx
Comp 501.pptxComp 501.pptx
Comp 501.pptx
 
ITC Lecture01.pptx
ITC Lecture01.pptxITC Lecture01.pptx
ITC Lecture01.pptx
 
INTRODUCTION TO COMPUTER .pptx
INTRODUCTION TO COMPUTER .pptxINTRODUCTION TO COMPUTER .pptx
INTRODUCTION TO COMPUTER .pptx
 
Lecture1.pdf
Lecture1.pdfLecture1.pdf
Lecture1.pdf
 
Computer architecture pptx
Computer architecture pptxComputer architecture pptx
Computer architecture pptx
 
Computers for managers notes
Computers for managers notesComputers for managers notes
Computers for managers notes
 
Co module1a introdctnaddressingmodes
Co module1a introdctnaddressingmodesCo module1a introdctnaddressingmodes
Co module1a introdctnaddressingmodes
 
Chapter01 Of It .... BBa 1st
Chapter01 Of It .... BBa 1stChapter01 Of It .... BBa 1st
Chapter01 Of It .... BBa 1st
 
Chapter3
Chapter3Chapter3
Chapter3
 
computer networking
computer networking computer networking
computer networking
 
Cao u1
Cao u1Cao u1
Cao u1
 

More from Dinesh Gunathilaka

A Midsummer Night Dream.Introduction by Swarnananda Gamage
A Midsummer Night Dream.Introduction by Swarnananda GamageA Midsummer Night Dream.Introduction by Swarnananda Gamage
A Midsummer Night Dream.Introduction by Swarnananda GamageDinesh Gunathilaka
 
A Midsummer Night Dream by William Shakespeare's
A Midsummer Night Dream by William Shakespeare'sA Midsummer Night Dream by William Shakespeare's
A Midsummer Night Dream by William Shakespeare'sDinesh Gunathilaka
 
The indispensable literary terms by Swarnananda Gamage
The indispensable literary terms by Swarnananda GamageThe indispensable literary terms by Swarnananda Gamage
The indispensable literary terms by Swarnananda GamageDinesh Gunathilaka
 
World university rankings 2014 By Dinesh Gunathilaka
World university rankings 2014 By  Dinesh GunathilakaWorld university rankings 2014 By  Dinesh Gunathilaka
World university rankings 2014 By Dinesh GunathilakaDinesh Gunathilaka
 
Wuthering heights by Swarnananda Gamage
Wuthering heights  by Swarnananda GamageWuthering heights  by Swarnananda Gamage
Wuthering heights by Swarnananda GamageDinesh Gunathilaka
 
Selling or Being Sold? by Swarnananda Gamage
Selling or Being Sold? by Swarnananda GamageSelling or Being Sold? by Swarnananda Gamage
Selling or Being Sold? by Swarnananda GamageDinesh Gunathilaka
 
What is to be a mother - Swarnananda Gamage
What is to be a mother -  Swarnananda GamageWhat is to be a mother -  Swarnananda Gamage
What is to be a mother - Swarnananda GamageDinesh Gunathilaka
 
How to protect your facebook account from hackers
How to protect your facebook account from hackersHow to protect your facebook account from hackers
How to protect your facebook account from hackersDinesh Gunathilaka
 
Wuthering heights - characters by Swarnananda Gamage
Wuthering heights - characters by Swarnananda GamageWuthering heights - characters by Swarnananda Gamage
Wuthering heights - characters by Swarnananda GamageDinesh Gunathilaka
 

More from Dinesh Gunathilaka (14)

A Midsummer Night Dream.Introduction by Swarnananda Gamage
A Midsummer Night Dream.Introduction by Swarnananda GamageA Midsummer Night Dream.Introduction by Swarnananda Gamage
A Midsummer Night Dream.Introduction by Swarnananda Gamage
 
A Midsummer Night Dream by William Shakespeare's
A Midsummer Night Dream by William Shakespeare'sA Midsummer Night Dream by William Shakespeare's
A Midsummer Night Dream by William Shakespeare's
 
The indispensable literary terms by Swarnananda Gamage
The indispensable literary terms by Swarnananda GamageThe indispensable literary terms by Swarnananda Gamage
The indispensable literary terms by Swarnananda Gamage
 
World university rankings 2014 By Dinesh Gunathilaka
World university rankings 2014 By  Dinesh GunathilakaWorld university rankings 2014 By  Dinesh Gunathilaka
World university rankings 2014 By Dinesh Gunathilaka
 
Wuthering heights by Swarnananda Gamage
Wuthering heights  by Swarnananda GamageWuthering heights  by Swarnananda Gamage
Wuthering heights by Swarnananda Gamage
 
Selling or Being Sold? by Swarnananda Gamage
Selling or Being Sold? by Swarnananda GamageSelling or Being Sold? by Swarnananda Gamage
Selling or Being Sold? by Swarnananda Gamage
 
What is to be a mother - Swarnananda Gamage
What is to be a mother -  Swarnananda GamageWhat is to be a mother -  Swarnananda Gamage
What is to be a mother - Swarnananda Gamage
 
How to protect your facebook account from hackers
How to protect your facebook account from hackersHow to protect your facebook account from hackers
How to protect your facebook account from hackers
 
Wuthering heights - characters by Swarnananda Gamage
Wuthering heights - characters by Swarnananda GamageWuthering heights - characters by Swarnananda Gamage
Wuthering heights - characters by Swarnananda Gamage
 
Essential computer concepts
Essential computer conceptsEssential computer concepts
Essential computer concepts
 
Death of a salesman
Death of a salesmanDeath of a salesman
Death of a salesman
 
Animal farm
Animal farmAnimal farm
Animal farm
 
Feminism Cure or Curse?
Feminism Cure or Curse?Feminism Cure or Curse?
Feminism Cure or Curse?
 
Feminism Cure or Curse?
Feminism  Cure or Curse?Feminism  Cure or Curse?
Feminism Cure or Curse?
 

Recently uploaded

DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Visualising and forecasting stocks using Dash
Visualising and forecasting stocks using DashVisualising and forecasting stocks using Dash
Visualising and forecasting stocks using Dashnarutouzumaki53779
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 

Recently uploaded (20)

DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Visualising and forecasting stocks using Dash
Visualising and forecasting stocks using DashVisualising and forecasting stocks using Dash
Visualising and forecasting stocks using Dash
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 

01 introduction to information technology

  • 2. About the lecturer Dinesh Kumara Hakmana Abeynayaka Gunathilaka • MBCS -CITP– UK • MUKAP – University Of Greenwich
  • 3. Subject Contents in General • Computer Hardware • Computer software • Application programs Word processing Presentation Spreadsheets • Data & information management • Computer networking • Applications of networking: Internet, Intranet
  • 4. Subject Content in Details 1.0 The Information Technology Basic Information Technology Concepts Computer History Basic Components of Computer System How a Computer System Works 2.0 Function of Major Computer Hardware Computer Configuration and Classification Central Processing Unit Input-Output Devices and Peripherals Secondary Storage 3.0 Basic Uses of Application S/ware & OS Operating System and Its Functions Disk Operating System (DOS) Primer High and Low Level Languages Assembler, Compiler and Interpreter WINDOWS and MS Office Primer 4.0 Data Security Importance of Backup The Computer Virus Crisis 5.0 Computer and Network Local Area Network (LAN) Metropolitan Area Network (MAN) Wide Area Network (WAN) LAN Components, Topologies and Types Transmission Media  
  • 5. Objectives • Describe the three fundamental characteristics of computers • Describe at least four areas of society in which computers are used • Identify the basic components of a computer system: input, processing, output, and storage • List some common input, output, and storage media • Distinguish data from information • Describe the significance of networking • Explain the significance of the Internet • Explain the various classifications of computers
  • 6. Course Assessment Quiz 20% Test 20% Assignment 20% Final Exam 40% Total = 100%
  • 7. Introduction to Computers Computer hardware Input, Output & peripheral devices History of computers
  • 8. Basic Components of a Computer System What is computer? An electronic device that can accept data (input),  process the input to useful information (process)  according to a set of instructions, store the  instructions and the results of processing (storage),  and produce the information (output). 
  • 10. • Evolving more rapidly than Industrial Age • Will continue into the current century Information Age
  • 11. Cornerstones of our Economy • Land • Labor • Capital • Information Forging a Computer-Based Society:
  • 13. A Computer in Your Future • Where used? – Bank withdrawal – Supermarket – Drive the car • Do I need a Personal Computer? – Campaign: One Home, One PC – Many more use at work • Will I use a computer in my future career? – Almost every job will involve use of a computer
  • 14. Computer Literacy • Awareness – Importance – Versatility – Pervasiveness in our society • Knowledge – What are computers – How do computers work – Terminology • Interaction – Use some simple computer applications
  • 15. Is computer literacy enough? • Need to be computer literate to manipulate a computer • Need to be computer fluent on computer concepts as a basis to build deeper knowledge • Computer fluency make one able to continue follow developments as computers continue to evolve
  • 16. Basic Information Technology  Concept • Information technology - the use of modern technology to aid the capture, storage, retrieval, analysis, and communication of information. • The various methods of delivering information are by the use of data, text, image, and voice for personal or organization needs.
  • 17. History of Computers • Man from centuries ago used a physical unit or sets of units to represent numbers or quantities. • A number or a quantity can be represented by a physical thing, whether it is: a pebble a transistor a bead of wirea mark on a bit of paper a mechanical gear wheel an electrical relay a vacuum tube
  • 18. The Nature of Computers Characteristics • Speed • Reliability • Storage capability Results • Productivity • Decision making • Cost reduction
  • 24. Where Computers Are Used: Transportation • Cars • Run rapid transit systems • Load containerships • Track railroad cars • Monitor air traffic
  • 26. Where Computers Are Used: Agriculture • Billing • Crop information • Feed combinations • Livestock breeding and  performance
  • 27. Where Computers Are Used: Government • Forecast weather • E-government • Process immigrants • Taxes • Registration: birth, identity, car etc.
  • 28. Where Computers Are Used: The Home • Educational tool • Record keeping • Letter writing • Budgeting • Drawing and editing  pictures • Newsletters • Connecting with others
  • 32. Where Computers Are Used The Sciences • Research • Simulation Connectivity • Communication • Telecommuting
  • 33. Where Computers Are Used Training • Airline pilots • Railroad engineers Paperwork • Junk mail • Term paper • Record keeping
  • 34. Computers are all around! • Grocery store • Schools • Libraries • Bank • Mail • Malls We interact with computers everyday!
  • 35. What computers can’t do yet? Complex human activities What else? Can you think of others?
  • 37. People • Computer programmer – person who writes programs • Users or End-users – make use of the computer’s capabilities
  • 38. Software • Programs • Set of instructions that directs the hardware to do a required task and produce the desired results
  • 40. Computer Components 1. Input Devices - examples: keyboard and the mouse - data entered on the keyboard and temporarily stored in the computer’s memory and displayed on the monitor 2. System Unit - contains the electronic circuits that cause the processing of data to occur - consists of central processing unit, memory, (RAM and ROM) and other electronic components - CPU has a control unit and arithmetic/logic unit - RAM temporarily stores data and program instructions when they are processed
  • 41. 4. Output Devices - most commonly used output devices are monitor and printer - Monitor :commonly as CRT or Flat Panel Display - Printer: Dot-Matrix, Ink-Jet etc. 5. Secondary Storage Devices - also known as auxiliary storage devices - stores instructions and data when they are not being used by the system unit - Examples : floppy disk and hard disk drive Computer Components – cont.
  • 43.
  • 44. How a Computer System Works – cont. Software - The instructions needed to direct the computer to complete specific tasks. • The CPU follows the step-by-step instructions in a program to complete the tasks from user. • Operating system is the system software that controls the basic, low-level hardware operations and file management.
  • 45. Microcomputers - Also known as personal computers - Physical sizes : palmtop, desktop and tower case - Cheaper and smaller in size Minicomputer - Also known as departmental computers - Physical sizes : small to large cabinets - Support business application Computer Configuration and Classification
  • 46. Mainframe - Large computers with the capability to process data at millions of instructions per second. - Physical size : partial to full room of equipment Supercomputer - Most powerful and expensive computers - Vast quantities of data manipulation - Physical size : full room of equipment - No. of users : hundreds of users Computer Configuration and Classification – cont.
  • 47. Central Processing Unit (CPU) - It is the heart of the computer, that is the microprocessor chip. - A highly complex, extensive set of electronic circuitry that executes stored program instructions. - CPU perform three main tasks :- • Perform arithmetic operations • Perform logic operations • Retrieval and storage of data
  • 48. - CPU consists of two main units :- 1. Arithmetic Logic Unit (ALU) - arithmetic operations e.g. +, -, x, / - logic operations e.g. >, >=, ==, <, <= CPU – cont. 2. Control unit - fetches instructions from memory - decode/translate instructions - executes the processing tasks - stores result in memory
  • 49. CPU – cont. - CU fetches instructions from memory - CU decodes/translates instructions, directs necessary data to ALU - ALU executes arithmetic/logic instruction -ALU stores results into memory What happens in a CPU?
  • 50. Memory - also known as primary storage, primary memory, main storage, internal storage, and main memory - Consists of RAM and ROM 1. RAM (Random Access Memory) - volatile; means the data exists only when power is ON - two types of RAM, dynamic and static 2. ROM (Read Only Memory) - non-volatile; means data permanently stored in and cannot be changed CPU – cont.
  • 51.
  • 52.
  • 53. Function of Computer System Data handling I Input P Process O Output S Storage
  • 54. Processing: Batch vs. Interactive • 2 types of information processing – Batch processing – Interactive processing : Real time
  • 55. Input devices • Accept data or commands and convert them to electronic form • Getting data into the computer – Typing on a keyboard – Pointing with a mouse – Scanning with a wand reader or bar-code reader – Terminal
  • 56. Output devices Monitor or screen • Text • Numbers • Symbols • Art • Photographs • Video Printer • Black and white • Color • Convert from electronic form to some other form • May display the processed results • Usable information
  • 57. Input and Output Devices 1. Input devices - Common type of devices used are the keyboard and the mouse - Standard type of keyboard is the QWERTY which has 86 keys (basic) and 101-102 keys (enhanced). - Mouse is a pointing device for effective use of computer interface. Trackball and touch pad are also considered as pointing devices.
  • 58. Input and Output Devices – cont. Digitizer - A pad with a pen-like stylus. - The tablet sends electronic signals to the computer, displaying the image drawn.
  • 59. Input and Output Devices – cont. the use of special equipment to collect data at the source and send it directly to the computer. Source data automation MICR ImagesOCR Bar code Hand Written Input devices– cont.
  • 60. Input and Output Devices – cont. 2. Output devices - most common devices are monitor displays and printers - Two types of display; flat panel display and CRT display (Cathode Ray Tube) - Two categories of printers; impact and non-impact printers
  • 61. Displays 1. Flat Panel - commonly used in laptop, notebook - examples of flat panel; LCD, Gas Plasma 2. CRT - produce best images for computers - two types of display; monochrome and color - monochrome; displays one color (green or amber) - color; four types: Input and Output Devices – cont.
  • 62. Standard Graphic Add-on-Boards Resolution (by pixels) CGA (Color Graphic Adapter) 640 x 200 EGA (Enhanced Graphic Adapter) 640 x 350 VGA (Video Graphic Array) 640 x 480 SVGA (Super Video Graphic Array) 1024 x 768 Displays – cont. Input and Output Devices – cont.
  • 63. Two types of printers (according to printing methods) Impact printers -use a physical contact with the paper to produce an image -e.g. dot matrix printer and line printer Non-impact printers -Place images on a paper without physically touching it -e.g. thermal, inkjet, laser printer Input and Output Devices – cont. Printers
  • 64. Can you think of any other input/output devices?
  • 65. The Processor Central Processing Unit (CPU) • Converts data to useful information • Interpret and execute instructions • Communicate with input, output and storage
  • 66. Two Types of Storage • Secondary storage long-term storage • Primary storage or memory temporary storage
  • 67. Memory / Primary Storage • Temporary storage • Holds input to be processed • Holds results of processing • Contains the programs to control the computer and manipulate input into output • Volatile
  • 68. Secondary Storage • Long-term storage • Non-volatile
  • 69. Secondary Storage Examples • Magnetic disks – read and written by magnetic disk drive – Hard disk – Diskette • Optical disks – read and written by optical disk drives – CD-ROM – DVD-ROM • Magnetic tape – read and written by magnetic tape drives – Primarily used for back-up
  • 71. • It is needed because – Main memory stores data temporarily – Main memory space is limited Secondary Storage  Benefits of secondary storage  Space  Reliability  Convenience  Economic
  • 72. Computer System • Computer – CPU – Memory • Peripheral equipment – Connected to the computer by a cable – Input, output, storage
  • 73. Computer Network • Definition – A system that uses communications equipment to connect computers and their resources. • Types – Local area network (LAN) – connects computers in close proximity – Metropolitan are network (MAN) – connect computers between buildings in the same geographic area – Wide are network (WAN) – connects computers over great distances
  • 74. Home Connectivity • Connect home PC to other computers • Use modem to convert signals between electronic (computer) and analog (voice) formats
  • 75. Internet • Collection of networks • No ownership • No central source for services available • No comprehensive index of what information is available Individuals Businesses Organizations Libraries Research labs Government Connects Everyone!
  • 76. Getting Connected • User’s computer must connect to a server • Server must communicate using TCP/IP • The user can purchase access to a server from an ISP (Internet Service Provider)
  • 77. Internet – What Can You Do? • WWW – World Wide Web • FTP – File Transfer Protocol • E-mail • UseNet • IRC – Internet Relay Chat • Bulletin Boards
  • 78. World Wide Web • Browser – program that allows the user to move around and explore the Internet • Use the mouse to point and click on text and graphics • Web page • Web site • Home page
  • 79. Classifications of Computers • Use the computer that fits your needs • Based upon – Size – Speed – Cost – Portability – Number of simultaneous users supported – Available software – Typical use
  • 80. Personal Computers • Other names – PC – Microcomputer – Home computer • Categories – Low-end functional – Fully powered – Workstations – Net computer or net box (Web TV) • Desktop Models
  • 81. Notebook Computers • Portable – Lightweight – Fits in a briefcase – Battery operated • Laptop – Larger – Heavier • More expensive that desktop models
  • 82. Handheld Computers • Personal Digital Assistant (PDA) – Scheduling – Addresses – Handwritten input – May offer wireless e-mail and fax • PDA Phone – More power than PDA – Cellphone, GPS, MP3/MP4, Camera, Video, TV, Radio etc. – Runs various type softwares, serving various applications
  • 83. Other Types of Computers Mainframes – High speed – More expensive – Used to process large amounts of data quickly – Support multiple users – Does server tasks Supercomputers – Fastest speed – Most expensive
  • 84. What is a software? - The instructions needed to direct the computer to complete specific tasks. - Software can be categorized into two types :- Operating System and Its Function
  • 85. Application Software - program that tells a computer how to produce information - examples of application software : Business, scientific, educational programs and etc. System Software - program controlling the actual operations of the computer equipments - the operating system tells computer how to perform functions such as load, store, execute application program, transfer data between I/O devices and main memory Operating System and Its Function – cont.
  • 86. Definition of OS :- A set of programs that control and supervise a computer system’s hardware Purposes of OS :- • To manage the hardware for efficient utilization of computer resources • To interface between a user/an application program with the hardware Operating System and Its Function – cont.
  • 87. • OS is made up of 2 programs; Operating System and Its Function – cont. Control Program Service Program
  • 88. 1. Control program - three main functions Operating System and Its Function – cont. Resource allocation allocate processor time, primary storage, input and output devices Job management to monitor, schedule and control programs for its efficient processing Data management -managing access to data for input of information to printers, disks/displays - all hardware components activities are controlled by the supervisor program
  • 89. 2. Service programs - provides services to the user/programmer - services include language-translator programs and utility programs - language-translator program converts instructions from English-like language to machine-language to be executed by the computer - utility program performs loading, saving, copying, keeping track of files stored on a disk, preparing a formatted disk Operating System and Its Function – cont.
  • 90. LanguageTranslator Utility Program Other Services Data M gmt. Job M gm t. Resource Allocation Supervisor Operating System and Its Function – cont.
  • 91. What an Operating System does? 1. Checks the functionality of the computer’s hardware. It generates an error message (by messages or beeps) if any components are found faulty. 2. Then the OS control programs will load the supervisor program into the computer’s memory – booting 3. Once the supervisor control program in memory, the system displays the prompt sign (C:>), indicating that it is ready to work
  • 92. MS-DOS  DOS is the supervisor program of the computer  It does all the followings • Interface to peripherals – How to interpret input, how to process data, and how to produce output • Application launcher – Most programming software, games etc. use DOS prompt to run application • Utility provider – Manage disks and files, prepare disks for storage, copy files to a disk, to move or rename files, and to delete files
  • 93. MS-DOS – cont. • Using DOS prompt to get command from user • Examples for DOS operation • DOS version/prompt type • Modify date/time • File and directory contents • Clearing a DOS screen • Going to subdirectory and back to root directory • Searching for specific files • Copy files from A drive / C drive
  • 94. TYPES OF OS  Microsoft Windows (98, 2000, XP, Vista)  Mac OS (X)  Linux OS (Hundreds of even thousands of distros ex: Red Hat, Ubuntu, Mandrake etc. Visit http://distrowatch.com/ for listing of Linux OS)  Unix OS etc.
  • 95. TYPES OF BROWSERS  Mozilla Firefox  Internet Explorer  Opera  Safari  Konqueror  Flock Firefox is gaining Popularity over IE Flock
  • 96. Low and High Level Languages Programming Language - a set of written symbols that instruct the computer hardware to perform certain tasks - can be categorized as Low level Language and High Level Language Low Level Language - Language that has the tendency towards specific, delicate machine syntax - Machine Language and Assembly Language
  • 97. - consists of entirely 1’s and 0’s that only the computer understands - depends on different, specific hardware designs - it executes very fast, but is time consuming and difficult to understand - only programmer who has the knowledge of the computer architecture is able to understand the language Low and High Level Languages – cont. Low Level Language – cont. Machine Language
  • 98. -also considered as Low Level Language because it still needs specific knowledge of hardware -it differs from machine language because of it uses mnemonic in spite of 1’s and 0’s to represent the operation codes -mnemonic code is an alphabetic abbreviation that is easy to remember -it produce programs very efficient, less storage usage and the execution is much faster Low Level Language – cont. Assembly Language Low and High Level Languages – cont.
  • 99. - instructions resemble human language and mathematical notation - no detail knowledge of computer hardware and internal operation of a computer - easier to learn because of the English-like language rather than understanding machine codes and instructions - E.g. FORTRAN, COBOL, BASIC, Pascal, C/C++ Low and High Level Languages – cont. High Level Language
  • 101. - the source code will remain unchanged after the conversion but can be updated and changed, then compiled again - after it is compiled, then the object code can be executed -example of HLL program uses compiler is the C and C++ - the interpreter will translate a program one line at a time, executing each line of the program after it is translated - if an error should occur during execution, the error must be rectified or solved before it can proceed to the next line - example of HLL program uses interpreter is the BASIC Assembler, Compiler and Interpreter – cont. Compiler Interpreter
  • 102. Importance of Backup – cont. Data is exposed to several threats.
  • 103. Uninterruptible Power Supply (UPS) How does UPS works? - it is connected in series with the computer system - when power is interrupted, this result the UPS to function as a backup supply of power to the computer system - depends on the type of UPS, it will operate in 20 minutes or more - it is advisable to backup important data within the time limit to prevent any lost of data Importance of Backup – cont.
  • 104. Components of UPS - one rectifier (charger) to convert AC to DC and to fully charge the battery - one battery to supply DC power to the inverter and the supported time are based on the number and size of batteries - one inverter to convert DC to AC - one static bypass switch to control the load from/to the power source to/from the battery and allows certain load to transfer tolerances needed by the computer and its peripherals Importance of Backup – cont.
  • 105. The Computer Virus Crisis The elements of a computer virus : 1. A set of instructions - a program being made to disrupt or interfere other programs 2. Deliberately created - purposely created by humans or by itself 3. Actively propagates - reproducing itself 4. Infects other programs - contaminate or polluting different types of programs 5. Able to do harm - can cause damage to others 6. Able to evolve - developing, growing and changing in programs or systems
  • 106. TheComputerVirusCrisis – cont. What are the damages of the virus to a computer system : 1. Creates garbage in your computer system that takes up space in the memory and into your diskettes 2. Messing up files in their normal standard and altering some of the files 3. Messing up the FAT (File Allocation Table) which contains information of where are the other data's stored on your disk 4. Messing up the boot sector that can restrict your computer from being able to execute at all
  • 107. The Computer Virus Crisis– cont. Types of anti-virus software The Computer Virus Industry Association (CVIA) in the USA has developed three basic categories of anti-virus software. To prevent initial infection To detect infection To identify and remove viruses
  • 108. COMPUTER NETWORKING Network : Computers connected together to communicate among themselves. Resource Sharing File Sharing Communication PCs’ Administration and Security
  • 109. - Computer network technology can be classified by the distance the network technology is designed to span - There are three types of networking : Local Area Network (LAN) Metropolitan Area Network (MAN) Wide Area Network (WAN) COMPUTER NETWORKING –cont.
  • 110. Local Area Network (LAN) - Relatively small refers to the transmission media and computer hardware - The area is not exceeding 10 KM - It only uses one type of transmission medium - It share resources within building or campus COMPUTER NETWORKING –cont.
  • 111. Metropolitan Area Network (MAN) - The network is larger compared to LAN - The area covers a city of 10 to 100KM - It requires efficient hardware and transmission media to cover these areas COMPUTER NETWORKING –cont.
  • 112. Wide Area Network (WAN) - The network is larger than MAN and LAN - It interconnect LAN of opposite sides of country or around the world - It covers huge geographical area in the world COMPUTER NETWORKING –cont.
  • 113. Local Area Network Local Area Network Router Multiplexer Multiplexer Modem Modem Front end Processor Host Computer
  • 114. LAN COMPONENTS Every LAN is made up of a standard set of components:
  • 115. Topology: The physical connection among computers within a network - the topology is the configuration of the hardware and shows which pairs of nodes can communicate -there are three common types of topologies :- LAN TOPOLOGIES Star topology Ring topology Bus topology
  • 117. LAN PROTOCOLS Protocol : A set of rules to access the network to send data. Two common LAN protocols
  • 118. TRANSMISSION MEDIA Transmission Media : The physical medium used for transmission. Types of TM Coaxial Cable Twisted Pair Cable Fiber Optic Cable Satellite Transmission Microwave Transmission
  • 119. TRANSMISSION MEDIA - Twisted Pair Cable Colour-coded insulation Jacket Copper wire conductor
  • 120. Inner conductor Insulation Outer plastic covering TRANSMISSION MEDIA – Coaxial Cable
  • 121. TRANSMISSION MEDIA – Fiber Optic Cable Optical fiber Protective outer sheath Glass covering Strength wires
  • 124. ANY QUESTIONS OR ADDITIONS?