SlideShare a Scribd company logo
PENGANTAR TEKNOLOGI INFORMASI
UNIVERSITAS TEKNOKRAT INDONESIA
FAKULTAS EKONOMI DAN BISNIS
Introduction Information Technology
1
Basic Concepts of Computer Systems
and Information Technology
UNIVERSITAS TEKNOKRAT INDONESIA
FAKULTAS EKONOMI DAN BISNIS
Introduction Information Technology
2
UNIVERSITAS TEKNOKRAT INDONESIA
FAKULTAS EKONOMI DAN BISNIS
Yusra Fernando, M.Komyusra.fernando@teknokrat.ac.id
CONTACT ME
3
Objectives
Students are able to explain the opportunities for utilizing IT
strategies in the current era.
4
Reference
5
5th Edition, Irv Englander
John Wiley and Sons
INFORMATION AND TECHNOLOGY
UNIVERSITAS TEKNOKRAT INDONESIA
FAKULTAS EKONOMI DAN BISNIS
Introduction Information Technology
6
Defining Information
• What is Information?
Information is any knowledge that comes to our attention. That
could be voice, image, text and video
• What is data?
Data is information when dealing with the machine
7
What Counts as information
8
Methods for conveying information
9
Defining Information Technology
• Information Technologies are systems of hardware and/or
software that capture, process, exchange, store and/or
present information using electrical, magnetic and/or
electromagnetic energy.
10
IT Example: Cellular Telephony
11
IT Example: Wireless Internet
12
IT in Society (people)
• Personal Communication
• Conversations (phone, cell)
• Messaging (E-mail, SMS)
• Video Coms
• Entertainment
• Web surfing
• Downloading video and audio files
• Interactive gaming
• Day-to-Day living
Buying airline tecket
Ordering books
Electronic banking/ stock market
13
IT in Society (business)
• Internal Communication
• Computer network
• Corporate website
• Video teleconferencing
• Messaging (SMS, email)
• Electronic Commerce
• Call Centres
• Electronic transactions
• Online sales
• Business operations
Factory operation systems
Databases
14
Examples on IT Careers
• Information Security Jobs
• Address information security
• IT Analyst
• Translate business requirement into
technical specification
• Network Administration
• Configure and operate computer network
• Management Consulting
• Provide consulting for government and
organizations
• Database Administration
Managing corporate database
• Computer Forensics Expert
Extracts computer evidence for
detecting/preventing /prosecuting crimes
• IT Sales:
people on frontline to sell products
• Software development:
develop software solutions
15
An Introduction to Systems Concepts and Systems
Architecture
UNIVERSITAS TEKNOKRAT INDONESIA
FAKULTAS EKONOMI DAN BISNIS
5th Edition, Irv Englander
John Wiley and Sons
16
What is a system?
• What do the following systems have in common?
1. Plumbing system
2. Solar system
3. Home network system
4. Inventory control system
2-17
Plumbing System
2-18
Solar System
2-19
Home Network System
2-20
Inventory Control System
2-21
Definition of a System
• “A system is a collection of components linked together and organized in
such a way as to be recognizable as a single unit.”
• Linked components of a system also define a boundary for the system
• The environment is anything outside of the system
2-22
General Representation of a System
2-23
System Decomposition
• Components
• May be irreducible or
• May be subsystems
• Decomposition
• The division of a system into its components and linkages
• Hierarchical
2-24
System Architecture
“The fundamental properties, and the patterns of relationships,
connections, constraints, and linkages among the components and
between the system and its environment are known collectively as the
architecture of the system”
2-25
Abstractions of Systems
• How are the following two abstractions of a business system different
from one another?
• How are these abstractions different from the real business system?
2-26
Business Organization Chart
2-27
Business Application Architecture
2-28
IT System Architectures
• Distributed processing systems
• Client-Server Computing
• Two-tier architecture
• Three-tier architecture
• N-tier architecture
• Web-Based Computing
• Cloud Computing
• Peer-to-Peer Computing
2-29
Client-Server Computing
• A program on a client computer requests services from a program on a
server computer
• Examples:
• Email services, file services, print services, directory services, Web services,
database services, application services, remote access services
2-30
Basic Client-Server Architecture
2-31
Advantages of Client-Server Architecture
• Centralization of services permits
• easier administration of services by IT professionals
• easier availability and location by users
• consistency of resources, such as files and data, can be managed and assured
• more efficient and cost-effective hardware procurement through purchasing
a small number of very powerful computers
2-32
Clients and Servers on a Network
2-33
Multi-tier Architectures
• Two-tier architecture
• Two computers are involved in a service
• Example: Web browser and Web server model used in intranets and on
the Internet
• Three-tier architecture
• Three computers are involved in a service
• Example: client computer, Web server, database server
• N-tier architecture
2-34
Three-tier Web-based Email Architecture
2-35
Cloud Computing
• Off-site storage facilities for an organization
• Software as a service (SaaS): applications run on a server or
processing may be divided on server and client
• Platform as a service (PaaS): tools for a developer to create and run
applications on a cloud platform
• Infrastructure as a service (IaaS) – cloud-based hardware emulation of
virtual machines and networking
2-36
Cloud Computing Advantages/Risks
• Advantages
• Client’s datacenter needs are simplified; reduced costs
• Supports collaboration
• Scalable to a variety of host platforms
• Reduced maintenance downtime
• Lower investment for short-term projects
• Risks
• Quality of security is critical
• Outages or loss of connectivity may prevent users from working
• Requires long-term commitment and viability of cloud service
• Changes in operating procedures can result in data loss
2-37
Peer-to-Peer Computing
• Computers on a network are treated as equals
• Each computer can share resources with the other computers on the network
• Disadvantages
• Difficult to establish centralized control of services
• Difficult to locate services
• Difficult to synchronize versions of files or software
• Difficult to secure network from unauthorized access and from viruses
• Advantages
• Sharing files between personal computers
• Internet file sharing
2-38
Hybrid Model of Computing
• Client-server technology used to locate systems and files
• Then systems can participate in peer-to-peer transactions
• Examples
• Instant messaging
• Skype
• Napster
2-39
Google: System Architecture
• Provide powerful, fast search capability for material on the Internet
• Derive income from advertising that is targeted to each user based on their
searches
• Basic requirements
• Capable of responding to millions of simultaneous requests from all over the world
• Perform a web crawl of the Internet to retrieve and organize data
• Establish ranking of results with appropriately targeted advertising
• High reliability of the system
• System is easily scalable and cost effective
2-40
Google Data Center Search Application
Architecture
2-41
Simplified Google System Hardware Architecture
2-42
Facebook’s Application Architecture
• N-tier architecture
• Based entirely on open source software
• Serves as an intermediary between web browser and an application
provider’s Web service
• API and protocols allow information exchange between Facebook
servers and the application server
2-43
Component of IT
UNIVERSITAS TEKNOKRAT INDONESIA
FAKULTAS EKONOMI DAN BISNIS
5th Edition, Irv Englander
John Wiley and Sons
44
The Components of IT
• Accepting and storing data and information
• Performing mathematical calculations
• Applying logic to make decisions
• Retrieving, displaying, and sending information
• Consistently repeating the above actions many times
45
Information Technology Categories
• Hardware: the electronic and mechanical components you can see
and touch
• Software: the set of instructions that direct the hardware
• Network technology: increases the power of IT by allowing the
sharing of resource
46
IT Platform
47
Hardware Components
• Processing: Directs execution of instructions and the transformation of data
• Memory: Temporarily stores data and instructions before and after processing
• Input: Provides the interface used for data entry into a device
• Output: Provides the interface to retrieve information from a device
• Storage: Stores data, information, and instructions for the long term
• Communications: Connects one IT device to another
48
The Central Processing Unit
• Core of all computing operations is a chip composed of millions of transistors
called the central processing unit (or CPU).
• A transistor is an electronic switch that can be on (1) or off (0).
• By combining multiple transistors we can represent data in a binary format.
• The CPU works together with memory to control the execution of instructions
and the processing of data.
• CPU speed is measured by its clockspeed in billions of cycles per second
(gigahertz).
49
Memory
• There are two types of memory—long term (ROM) memory and
short-term (RAM) memory
• Both types of memory are built onto memory chips
• Both are measured in number of bytes stored:
• 1000’s (kilobytes—KB)
• Millions (megabytes—MB
• Billions (gigabytes—GB)
50
Read Only Memory
• Read Only Memory (ROM) contains instructions that
are not meant to be changed or changed only
infrequently
• ROM is present in most IT devices
• In computers, ROM holds instructions used to
control the startup process
• There are far fewer ROM chips than RAM chips in a
computer
51
Random Access Memory
• Random Access Memory (RAM) is the predominant
form of memory in a computer.
• The CPU can access any item stored in RAM directly
(randomly).
• RAM is temporary memory so anything in RAM is lost
when the computer is shut down.
• Increasing RAM capacity is the easiest way to increase
effectiveness of a computer.
52
Input Hardware
• Input devices provide one interface between the internal processes of an
IS and its environment.
• It allows us to enter data and commands.
• Input devices include:
• Keyboards
• Pointing devices such as a mouse
• Scanning devices such a barcode scanner
53
Keyboard
• Most widely used input device for computers.
• Highly versatile, providing the capability to enter all types of data as well as
instructions.
• Ergonomic keyboards are keyboards that are designed to keep users safe as
well as enabling them to be more productive.
54
Pointing and Scanning Devices
• Pointing devices such as a mouse allow users to provide instructions to a computer
using physical movements, such as “point” and “click”.
• Pointing devices tend to require less training than a keyboard.
• More useful to entering commands than for entering data.
• Scanning devices such as barcode readers improve speed and efficiency or perform a
task more efficiently.
55
Output Hardware
• Output devices convert IT-processed information into a form usable by
knowledge workers (or other machines)
• Quality and speed of output is important in choosing an output device.
• Common output devices include
• Display devices such as liquid crystal displays (LCDs)
• Printers, typically laser or ink-jet as well as plotters
• Speakers
56
IT Storage Hardware
• Storage refers to hardware media and devices used to contain
large amounts of data and instructions for the long term.
• Storage is much slower to access than memory.
• Examples include:
• Hard drive
• CD and DVDs
• USB flash memory
57
Communications Hardware
• Network interface card (NIC) provides the
physical connection between the computer and a
local network
• Wired
• Wireless
• Modems allow you to connect to a remote
network over a telecommunications line
(telephone line or cable TV service)
58
Software
• Software is information that specifies how the device should work
with other data, information, and knowledge.
• Software is legally protected just like music and books.
• Firmware is software built into chips (hardware) like that in cell
phones and PDAs
• Software gets the job done!
• System Software
• Application Software
59
System Software
• Controls the hardware associated with a system
• Supports the execution of application software
• Two main types of systems software
• Operating Systems (OS) Software –coordinates and handles the details of
working with the computer hardware.
• Utility software – provides additional tools to maintain and service your
system (many utility software tasks are now included in the OS).
60
Basic OS Tasks
61
Application Software
• Application software is a complete, self-contained program or set of
programs for performing a specific job.
• Application software is the software you use to get things done.
• Productivity software – software used by knowledge workers to work
with data, information, and knowledge. For example, MS Office and
Intuit’s Quicken software.
62
Types of Productivity Software
• Document Preparation Software: used in creating documents composed of text, images, and
graphics.
• Electronic Spreadsheet Software: used to perform general calculations and analyses.
• Presentation Graphics Software: used for preparing slides and graphics for business
presentations.
• Database Management System (DBMS) software: used to design, create, update, and query
data.
• Personal Information Management (PIM) software: used to manage personal information.
63
Connecting over Networks
• Networks are everywhere! In this section, we concentrate
on a computer networks.
• A computer network consists of nodes that represent
computer hardware and network user with hardware,
software, and communications media forming links
between nodes.
• Network consists of 4 primary components:
• Data
• Special hardware
• Software that allows computers to share data.
• Communications media to link computers together.
64
Network Categories
• Computer networks are commonly described by the
physical size of the network.
• The most commonly use types are LANs and WANs.
• A Local Area Network (LAN) is confined to a
relatively small area like a building.
• A Wide Area Network (WAN) connects computers
over regions, countries, and continents.
65
Network Hardware
• There are three basic categories of network hardware
1. Hardware to connect a device to a network.
2. Specialized hardware for handling network traffic.
3. Specialized computers that control the network and delivery of data on the
network.
66
Network Connection Hardware
• Modems, cable modems, network interface cards, and wireless cards
• The physical link that creates the network connection is referred to as
the carrier or communications medium.
• Copper wire for telephone systems
• Coaxial cable or fiber-optic cables for faster transmission
• Wireless technologies including infrared light, radio waves, and microwaves.
67
Network Traffic Hardware
• A bridge is a device that lets you connect to networks or break a large network into
two smaller, more efficient networks.
• A router is an intelligent bridge that connects, translates, and then directs data that
cross between two networks.
• A hub (or concentrator) serves as a central connection point for devices on a a
network.
• A wireless Access Point (AP) is a special bridge that connects between wireless
devices and a wired network.
68
Specialized Network Computers
• Servers are specialized computers that manage the various functions
on a network.
• A file server is a fast computer with large amount of RAM and
storage.
• File servers run the network operating system as well as storing
shared software applications and data files.
• Computers connected to a file server are called clients or
workstations.
69
Network Software
• Network operating system software manages network functions and
the flow of data over a computer network.
• Network application software provides the instructions that allow for
the creation of data and for transformation to fit appropriate
protocols for transmission over a network.
• A protocol is a standard set of rules that allows the communication of
data between nodes on a network.
70
Network Benefits
• Efficient communication: E-mail and instant messaging are just two ways that networks allow us to
communicate more efficiently.
• Effective resource management: Networks allow easy sharing of software, hardware, and data
resources.
• Complete, accurate, reliable, and timely information: Multiple users can access or update data
quickly from a central database.
• Expanded marketing and customer service capabilities: Businesses and individuals can carry out
remote business transactions anytime and anywhere.
71
The Internet
• Any computer network that connects several networks together is an internet.
• Typically we refer to the single largest and most popular internet as the “Internet.”
• Over 1 billion people had access to the Internet in 2006.
• The Internet uses the TCP/IP suite of packet switching protocols.
• Any computer using software compatible with TCP/IP, regardless of OS, can connect
and communicate over the Internet.
72
Access the Internet
• Home users access the Internet through dial-up over traditional telephone
lines or broadband through cable or DSL.
• Most users connect through an Internet Service Provider (ISP) using
Internet access software.
• Internet access has moved into libraries, airports, or coffee shops using
Wi-Fi.
• Wi-fi stands for 802.11 standards for wireless network access.
73
The World Wide Web
• The World Wide Web (WWW) is one the two most popular Internet applications (e-mail
is the other.)
• The Web provides a hypertext system that operates over the Internet.
• Hypertext provides an easy way to publish information on a network in documents that
incorporate hyperlinks to other information on the network.
• Web browser software enables user to view hypertext document and use hyperlinks to
browse other related documents.
74
Web Standards
The Web relies on three basic standards:
1. A Uniform Resource Locator (URL) which specifies a unique address for each page
that indicates the location of a document.
2. The Hypertext Transfer Protocol (HTTP) provides rules used by browsers and
servers as they respond to each other.
3. Hypertext Markup Language (HTML) provides a language for encoding the
information so a variety of IT devices can display it.
75
THANK YOU ...
UNIVERSITAS TEKNOKRAT INDONESIA
FAKULTAS EKONOMI DAN BISNIS
YUSRA FERNANDO, S.KOM., M.KOM
76

More Related Content

What's hot

Basic IT knowledge
Basic IT knowledgeBasic IT knowledge
Basic IT knowledgeTechsailor
 
BASIC COMPUTER, ABOUT COM, HISTORY OF COMPUTER AND SOFTWARE
BASIC COMPUTER, ABOUT COM, HISTORY OF COMPUTER AND SOFTWAREBASIC COMPUTER, ABOUT COM, HISTORY OF COMPUTER AND SOFTWARE
BASIC COMPUTER, ABOUT COM, HISTORY OF COMPUTER AND SOFTWARE
osamawajid
 
Basic computer concepts
Basic computer conceptsBasic computer concepts
Basic computer concepts
jhayish
 
Principles of Information Technology
Principles of Information TechnologyPrinciples of Information Technology
Principles of Information TechnologySubair Ali
 
Lesson 2.0 definition, importance, and advantages of computers
Lesson 2.0   definition, importance, and advantages of computersLesson 2.0   definition, importance, and advantages of computers
Lesson 2.0 definition, importance, and advantages of computers
Joshua Hernandez
 
Basic Computer ! Batra Computer Centre
Basic Computer ! Batra Computer CentreBasic Computer ! Batra Computer Centre
Basic Computer ! Batra Computer Centre
jatin batra
 
Introduction to computer office 2003
Introduction to computer office 2003Introduction to computer office 2003
Introduction to computer office 2003manyamfranchise
 
FUNDAMENTALS OF COMPUTER
FUNDAMENTALS OF COMPUTERFUNDAMENTALS OF COMPUTER
FUNDAMENTALS OF COMPUTERthanathip
 
Computer basics
Computer basicsComputer basics
Computer basics
Dr. Dinesh C. Sharma
 
Computer
ComputerComputer
Computer
himabindukursam
 
CHAP 1 - INTRODUCTION TO COMPUTERS
CHAP 1 - INTRODUCTION TO COMPUTERSCHAP 1 - INTRODUCTION TO COMPUTERS
CHAP 1 - INTRODUCTION TO COMPUTERS
Cikgu Johan Johari
 
Introduction to computer
Introduction to computerIntroduction to computer
Introduction to computer
lina hajjar
 
Introduction to Computers Slides
Introduction to Computers SlidesIntroduction to Computers Slides
Introduction to Computers Slides
Saide OER Africa
 
Computer Tutorial Lesson Powerpoint Presentation - For Student and Teacher - ...
Computer Tutorial Lesson Powerpoint Presentation - For Student and Teacher - ...Computer Tutorial Lesson Powerpoint Presentation - For Student and Teacher - ...
Computer Tutorial Lesson Powerpoint Presentation - For Student and Teacher - ...
Red Red
 
Chapter 1 introduction to computers
Chapter 1   introduction to computersChapter 1   introduction to computers
Chapter 1 introduction to computers
haider ali
 
Introduction to Computer
Introduction to ComputerIntroduction to Computer
Introduction to Computer
Meg Grado
 
Introduction to computer
Introduction to computerIntroduction to computer
Introduction to computer
Abacheng Ghadafi
 
Understanding Computers - Introduction to Computers
Understanding Computers - Introduction to ComputersUnderstanding Computers - Introduction to Computers
Understanding Computers - Introduction to Computers
GufranAhmadJU
 
Introduction to computers pdf
Introduction to computers pdfIntroduction to computers pdf
Introduction to computers pdf
blufishocean
 
Basic overview of information technology and uses
Basic overview of information technology and usesBasic overview of information technology and uses
Basic overview of information technology and uses
Ebtissam Al-Madi
 

What's hot (20)

Basic IT knowledge
Basic IT knowledgeBasic IT knowledge
Basic IT knowledge
 
BASIC COMPUTER, ABOUT COM, HISTORY OF COMPUTER AND SOFTWARE
BASIC COMPUTER, ABOUT COM, HISTORY OF COMPUTER AND SOFTWAREBASIC COMPUTER, ABOUT COM, HISTORY OF COMPUTER AND SOFTWARE
BASIC COMPUTER, ABOUT COM, HISTORY OF COMPUTER AND SOFTWARE
 
Basic computer concepts
Basic computer conceptsBasic computer concepts
Basic computer concepts
 
Principles of Information Technology
Principles of Information TechnologyPrinciples of Information Technology
Principles of Information Technology
 
Lesson 2.0 definition, importance, and advantages of computers
Lesson 2.0   definition, importance, and advantages of computersLesson 2.0   definition, importance, and advantages of computers
Lesson 2.0 definition, importance, and advantages of computers
 
Basic Computer ! Batra Computer Centre
Basic Computer ! Batra Computer CentreBasic Computer ! Batra Computer Centre
Basic Computer ! Batra Computer Centre
 
Introduction to computer office 2003
Introduction to computer office 2003Introduction to computer office 2003
Introduction to computer office 2003
 
FUNDAMENTALS OF COMPUTER
FUNDAMENTALS OF COMPUTERFUNDAMENTALS OF COMPUTER
FUNDAMENTALS OF COMPUTER
 
Computer basics
Computer basicsComputer basics
Computer basics
 
Computer
ComputerComputer
Computer
 
CHAP 1 - INTRODUCTION TO COMPUTERS
CHAP 1 - INTRODUCTION TO COMPUTERSCHAP 1 - INTRODUCTION TO COMPUTERS
CHAP 1 - INTRODUCTION TO COMPUTERS
 
Introduction to computer
Introduction to computerIntroduction to computer
Introduction to computer
 
Introduction to Computers Slides
Introduction to Computers SlidesIntroduction to Computers Slides
Introduction to Computers Slides
 
Computer Tutorial Lesson Powerpoint Presentation - For Student and Teacher - ...
Computer Tutorial Lesson Powerpoint Presentation - For Student and Teacher - ...Computer Tutorial Lesson Powerpoint Presentation - For Student and Teacher - ...
Computer Tutorial Lesson Powerpoint Presentation - For Student and Teacher - ...
 
Chapter 1 introduction to computers
Chapter 1   introduction to computersChapter 1   introduction to computers
Chapter 1 introduction to computers
 
Introduction to Computer
Introduction to ComputerIntroduction to Computer
Introduction to Computer
 
Introduction to computer
Introduction to computerIntroduction to computer
Introduction to computer
 
Understanding Computers - Introduction to Computers
Understanding Computers - Introduction to ComputersUnderstanding Computers - Introduction to Computers
Understanding Computers - Introduction to Computers
 
Introduction to computers pdf
Introduction to computers pdfIntroduction to computers pdf
Introduction to computers pdf
 
Basic overview of information technology and uses
Basic overview of information technology and usesBasic overview of information technology and uses
Basic overview of information technology and uses
 

Similar to Chp 01 pti - basic concepts of computer systems and information technology (shared)

Chp 01 PTI - Basic Concepts of Computer Systems and Information technology ...
Chp 01   PTI - Basic Concepts of Computer Systems and Information technology ...Chp 01   PTI - Basic Concepts of Computer Systems and Information technology ...
Chp 01 PTI - Basic Concepts of Computer Systems and Information technology ...
YUSRA FERNANDO
 
Chapter 5-IT infrastructure(REV 2.0).pptx
Chapter 5-IT infrastructure(REV 2.0).pptxChapter 5-IT infrastructure(REV 2.0).pptx
Chapter 5-IT infrastructure(REV 2.0).pptx
MohdSyaifuadJasemi
 
Unit 1
Unit 1Unit 1
Unit 1
Karthi Vel
 
Embedded systems. Mpmx labaratory of the purpose
Embedded systems. Mpmx labaratory of the purposeEmbedded systems. Mpmx labaratory of the purpose
Embedded systems. Mpmx labaratory of the purpose
ShanmukhVegi
 
Chapter #1.pptx
Chapter #1.pptxChapter #1.pptx
Chapter #1.pptx
MoatazSamy8
 
Chapter1_2018.pptxddfsdfffffffffffffffffffffffffff
Chapter1_2018.pptxddfsdfffffffffffffffffffffffffffChapter1_2018.pptxddfsdfffffffffffffffffffffffffff
Chapter1_2018.pptxddfsdfffffffffffffffffffffffffff
IbrahimYasser16
 
Computer network coe351- part1- final
Computer network coe351- part1- finalComputer network coe351- part1- final
Computer network coe351- part1- final
Taymoor Nazmy
 
Computer Architecture
Computer ArchitectureComputer Architecture
Computer Architecture
Haris456
 
Overview of computer
Overview of computerOverview of computer
Overview of computer
Sunny Pavan
 
E-Management, Archival and Retrieval of documents/Office Networking System
E-Management, Archival and Retrieval of documents/Office Networking SystemE-Management, Archival and Retrieval of documents/Office Networking System
E-Management, Archival and Retrieval of documents/Office Networking System
Vaughan Olufemi ACIB, AICEN, ANIM
 
Introduction to Networks & Networking Concepts
Introduction to Networks & Networking ConceptsIntroduction to Networks & Networking Concepts
Introduction to Networks & Networking Concepts
zaisahil
 
UNIT 4 - UNDERSTANDING THE NETWORK ARCHITECTURE.pptx
UNIT 4 - UNDERSTANDING THE NETWORK ARCHITECTURE.pptxUNIT 4 - UNDERSTANDING THE NETWORK ARCHITECTURE.pptx
UNIT 4 - UNDERSTANDING THE NETWORK ARCHITECTURE.pptx
LeahRachael
 
Introduction to IoT (Basics of Networking & Emergence of IoT).pptx
Introduction to IoT (Basics of Networking & Emergence of IoT).pptxIntroduction to IoT (Basics of Networking & Emergence of IoT).pptx
Introduction to IoT (Basics of Networking & Emergence of IoT).pptx
taruian
 
Internet tech & web prog. p1,2,3-ver1
Internet tech & web prog.  p1,2,3-ver1Internet tech & web prog.  p1,2,3-ver1
Internet tech & web prog. p1,2,3-ver1
Taymoor Nazmy
 
Grid computing
Grid computingGrid computing
Grid computing
Chanchal Sachdeva
 
IoT Processing Topologies.pptx
IoT Processing Topologies.pptxIoT Processing Topologies.pptx
IoT Processing Topologies.pptx
taruian
 
Chapter 05- IT infrastucture and emerging technologies.pptx
Chapter 05- IT infrastucture and emerging technologies.pptxChapter 05- IT infrastucture and emerging technologies.pptx
Chapter 05- IT infrastucture and emerging technologies.pptx
jack732582
 
INTERNET OF THINGS.pptx
INTERNET OF THINGS.pptxINTERNET OF THINGS.pptx
INTERNET OF THINGS.pptx
Manikandan Kandasamy
 
B21DA0201_01.ppt
B21DA0201_01.pptB21DA0201_01.ppt
B21DA0201_01.ppt
DrPreethiD1
 

Similar to Chp 01 pti - basic concepts of computer systems and information technology (shared) (20)

Chp 01 PTI - Basic Concepts of Computer Systems and Information technology ...
Chp 01   PTI - Basic Concepts of Computer Systems and Information technology ...Chp 01   PTI - Basic Concepts of Computer Systems and Information technology ...
Chp 01 PTI - Basic Concepts of Computer Systems and Information technology ...
 
Chapter 5-IT infrastructure(REV 2.0).pptx
Chapter 5-IT infrastructure(REV 2.0).pptxChapter 5-IT infrastructure(REV 2.0).pptx
Chapter 5-IT infrastructure(REV 2.0).pptx
 
Networks Intro.ppt
Networks Intro.pptNetworks Intro.ppt
Networks Intro.ppt
 
Unit 1
Unit 1Unit 1
Unit 1
 
Embedded systems. Mpmx labaratory of the purpose
Embedded systems. Mpmx labaratory of the purposeEmbedded systems. Mpmx labaratory of the purpose
Embedded systems. Mpmx labaratory of the purpose
 
Chapter #1.pptx
Chapter #1.pptxChapter #1.pptx
Chapter #1.pptx
 
Chapter1_2018.pptxddfsdfffffffffffffffffffffffffff
Chapter1_2018.pptxddfsdfffffffffffffffffffffffffffChapter1_2018.pptxddfsdfffffffffffffffffffffffffff
Chapter1_2018.pptxddfsdfffffffffffffffffffffffffff
 
Computer network coe351- part1- final
Computer network coe351- part1- finalComputer network coe351- part1- final
Computer network coe351- part1- final
 
Computer Architecture
Computer ArchitectureComputer Architecture
Computer Architecture
 
Overview of computer
Overview of computerOverview of computer
Overview of computer
 
E-Management, Archival and Retrieval of documents/Office Networking System
E-Management, Archival and Retrieval of documents/Office Networking SystemE-Management, Archival and Retrieval of documents/Office Networking System
E-Management, Archival and Retrieval of documents/Office Networking System
 
Introduction to Networks & Networking Concepts
Introduction to Networks & Networking ConceptsIntroduction to Networks & Networking Concepts
Introduction to Networks & Networking Concepts
 
UNIT 4 - UNDERSTANDING THE NETWORK ARCHITECTURE.pptx
UNIT 4 - UNDERSTANDING THE NETWORK ARCHITECTURE.pptxUNIT 4 - UNDERSTANDING THE NETWORK ARCHITECTURE.pptx
UNIT 4 - UNDERSTANDING THE NETWORK ARCHITECTURE.pptx
 
Introduction to IoT (Basics of Networking & Emergence of IoT).pptx
Introduction to IoT (Basics of Networking & Emergence of IoT).pptxIntroduction to IoT (Basics of Networking & Emergence of IoT).pptx
Introduction to IoT (Basics of Networking & Emergence of IoT).pptx
 
Internet tech & web prog. p1,2,3-ver1
Internet tech & web prog.  p1,2,3-ver1Internet tech & web prog.  p1,2,3-ver1
Internet tech & web prog. p1,2,3-ver1
 
Grid computing
Grid computingGrid computing
Grid computing
 
IoT Processing Topologies.pptx
IoT Processing Topologies.pptxIoT Processing Topologies.pptx
IoT Processing Topologies.pptx
 
Chapter 05- IT infrastucture and emerging technologies.pptx
Chapter 05- IT infrastucture and emerging technologies.pptxChapter 05- IT infrastucture and emerging technologies.pptx
Chapter 05- IT infrastucture and emerging technologies.pptx
 
INTERNET OF THINGS.pptx
INTERNET OF THINGS.pptxINTERNET OF THINGS.pptx
INTERNET OF THINGS.pptx
 
B21DA0201_01.ppt
B21DA0201_01.pptB21DA0201_01.ppt
B21DA0201_01.ppt
 

More from YUSRA FERNANDO

Vs Code - Keyboard-Shortcuts-Windows.pdf
Vs Code - Keyboard-Shortcuts-Windows.pdfVs Code - Keyboard-Shortcuts-Windows.pdf
Vs Code - Keyboard-Shortcuts-Windows.pdf
YUSRA FERNANDO
 
Chp 03 - Software PTI - (Shared).pdf
Chp 03 - Software PTI - (Shared).pdfChp 03 - Software PTI - (Shared).pdf
Chp 03 - Software PTI - (Shared).pdf
YUSRA FERNANDO
 
Chp 04 - Hardware PTI - (Shared).pdf
Chp 04 - Hardware PTI - (Shared).pdfChp 04 - Hardware PTI - (Shared).pdf
Chp 04 - Hardware PTI - (Shared).pdf
YUSRA FERNANDO
 
7. DATA RESOURCE MANAGEMENT.pdf
7. DATA RESOURCE MANAGEMENT.pdf7. DATA RESOURCE MANAGEMENT.pdf
7. DATA RESOURCE MANAGEMENT.pdf
YUSRA FERNANDO
 
8. IT and Decision Making.pdf
8. IT and Decision Making.pdf8. IT and Decision Making.pdf
8. IT and Decision Making.pdf
YUSRA FERNANDO
 
06 - IT Infrastructure (shared).pdf
06 - IT Infrastructure (shared).pdf06 - IT Infrastructure (shared).pdf
06 - IT Infrastructure (shared).pdf
YUSRA FERNANDO
 
Fox, Richard - Information Technology _ An Introduction for Today’s Digital W...
Fox, Richard - Information Technology _ An Introduction for Today’s Digital W...Fox, Richard - Information Technology _ An Introduction for Today’s Digital W...
Fox, Richard - Information Technology _ An Introduction for Today’s Digital W...
YUSRA FERNANDO
 
Bab 1 pengantar desain web
Bab 1   pengantar desain webBab 1   pengantar desain web
Bab 1 pengantar desain web
YUSRA FERNANDO
 
Chapter 3.3 css - tugas css (shared)
Chapter 3.3   css - tugas css (shared)Chapter 3.3   css - tugas css (shared)
Chapter 3.3 css - tugas css (shared)
YUSRA FERNANDO
 
Javascript yusra 2021 (shared)
Javascript   yusra 2021 (shared)Javascript   yusra 2021 (shared)
Javascript yusra 2021 (shared)
YUSRA FERNANDO
 
3. latihan css 01 (shared)
3. latihan css   01 (shared)3. latihan css   01 (shared)
3. latihan css 01 (shared)
YUSRA FERNANDO
 
2 property css (shared)
2   property css (shared)2   property css (shared)
2 property css (shared)
YUSRA FERNANDO
 
Css pengenalan css
Css   pengenalan cssCss   pengenalan css
Css pengenalan css
YUSRA FERNANDO
 
Chapter 1 introduction html (shared)
Chapter 1   introduction html (shared)Chapter 1   introduction html (shared)
Chapter 1 introduction html (shared)
YUSRA FERNANDO
 
Chapter 00 introduction - web desain -(shared)
Chapter 00   introduction - web desain -(shared)Chapter 00   introduction - web desain -(shared)
Chapter 00 introduction - web desain -(shared)
YUSRA FERNANDO
 
Kepribadian dan Nilai
Kepribadian dan NilaiKepribadian dan Nilai
Kepribadian dan Nilai
YUSRA FERNANDO
 
Emosi dan Suasana Hati
Emosi dan Suasana HatiEmosi dan Suasana Hati
Emosi dan Suasana Hati
YUSRA FERNANDO
 
Sikap dan Kepuasan Kerja
Sikap dan Kepuasan KerjaSikap dan Kepuasan Kerja
Sikap dan Kepuasan Kerja
YUSRA FERNANDO
 
Konsep Dasar Perilaku Organisasi
Konsep Dasar Perilaku OrganisasiKonsep Dasar Perilaku Organisasi
Konsep Dasar Perilaku Organisasi
YUSRA FERNANDO
 
Konsep Dasar Perilaku Organisasi
Konsep Dasar Perilaku OrganisasiKonsep Dasar Perilaku Organisasi
Konsep Dasar Perilaku Organisasi
YUSRA FERNANDO
 

More from YUSRA FERNANDO (20)

Vs Code - Keyboard-Shortcuts-Windows.pdf
Vs Code - Keyboard-Shortcuts-Windows.pdfVs Code - Keyboard-Shortcuts-Windows.pdf
Vs Code - Keyboard-Shortcuts-Windows.pdf
 
Chp 03 - Software PTI - (Shared).pdf
Chp 03 - Software PTI - (Shared).pdfChp 03 - Software PTI - (Shared).pdf
Chp 03 - Software PTI - (Shared).pdf
 
Chp 04 - Hardware PTI - (Shared).pdf
Chp 04 - Hardware PTI - (Shared).pdfChp 04 - Hardware PTI - (Shared).pdf
Chp 04 - Hardware PTI - (Shared).pdf
 
7. DATA RESOURCE MANAGEMENT.pdf
7. DATA RESOURCE MANAGEMENT.pdf7. DATA RESOURCE MANAGEMENT.pdf
7. DATA RESOURCE MANAGEMENT.pdf
 
8. IT and Decision Making.pdf
8. IT and Decision Making.pdf8. IT and Decision Making.pdf
8. IT and Decision Making.pdf
 
06 - IT Infrastructure (shared).pdf
06 - IT Infrastructure (shared).pdf06 - IT Infrastructure (shared).pdf
06 - IT Infrastructure (shared).pdf
 
Fox, Richard - Information Technology _ An Introduction for Today’s Digital W...
Fox, Richard - Information Technology _ An Introduction for Today’s Digital W...Fox, Richard - Information Technology _ An Introduction for Today’s Digital W...
Fox, Richard - Information Technology _ An Introduction for Today’s Digital W...
 
Bab 1 pengantar desain web
Bab 1   pengantar desain webBab 1   pengantar desain web
Bab 1 pengantar desain web
 
Chapter 3.3 css - tugas css (shared)
Chapter 3.3   css - tugas css (shared)Chapter 3.3   css - tugas css (shared)
Chapter 3.3 css - tugas css (shared)
 
Javascript yusra 2021 (shared)
Javascript   yusra 2021 (shared)Javascript   yusra 2021 (shared)
Javascript yusra 2021 (shared)
 
3. latihan css 01 (shared)
3. latihan css   01 (shared)3. latihan css   01 (shared)
3. latihan css 01 (shared)
 
2 property css (shared)
2   property css (shared)2   property css (shared)
2 property css (shared)
 
Css pengenalan css
Css   pengenalan cssCss   pengenalan css
Css pengenalan css
 
Chapter 1 introduction html (shared)
Chapter 1   introduction html (shared)Chapter 1   introduction html (shared)
Chapter 1 introduction html (shared)
 
Chapter 00 introduction - web desain -(shared)
Chapter 00   introduction - web desain -(shared)Chapter 00   introduction - web desain -(shared)
Chapter 00 introduction - web desain -(shared)
 
Kepribadian dan Nilai
Kepribadian dan NilaiKepribadian dan Nilai
Kepribadian dan Nilai
 
Emosi dan Suasana Hati
Emosi dan Suasana HatiEmosi dan Suasana Hati
Emosi dan Suasana Hati
 
Sikap dan Kepuasan Kerja
Sikap dan Kepuasan KerjaSikap dan Kepuasan Kerja
Sikap dan Kepuasan Kerja
 
Konsep Dasar Perilaku Organisasi
Konsep Dasar Perilaku OrganisasiKonsep Dasar Perilaku Organisasi
Konsep Dasar Perilaku Organisasi
 
Konsep Dasar Perilaku Organisasi
Konsep Dasar Perilaku OrganisasiKonsep Dasar Perilaku Organisasi
Konsep Dasar Perilaku Organisasi
 

Recently uploaded

Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
Vlad Stirbu
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 

Recently uploaded (20)

Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 

Chp 01 pti - basic concepts of computer systems and information technology (shared)

  • 1. PENGANTAR TEKNOLOGI INFORMASI UNIVERSITAS TEKNOKRAT INDONESIA FAKULTAS EKONOMI DAN BISNIS Introduction Information Technology 1
  • 2. Basic Concepts of Computer Systems and Information Technology UNIVERSITAS TEKNOKRAT INDONESIA FAKULTAS EKONOMI DAN BISNIS Introduction Information Technology 2
  • 3. UNIVERSITAS TEKNOKRAT INDONESIA FAKULTAS EKONOMI DAN BISNIS Yusra Fernando, M.Komyusra.fernando@teknokrat.ac.id CONTACT ME 3
  • 4. Objectives Students are able to explain the opportunities for utilizing IT strategies in the current era. 4
  • 5. Reference 5 5th Edition, Irv Englander John Wiley and Sons
  • 6. INFORMATION AND TECHNOLOGY UNIVERSITAS TEKNOKRAT INDONESIA FAKULTAS EKONOMI DAN BISNIS Introduction Information Technology 6
  • 7. Defining Information • What is Information? Information is any knowledge that comes to our attention. That could be voice, image, text and video • What is data? Data is information when dealing with the machine 7
  • 8. What Counts as information 8
  • 9. Methods for conveying information 9
  • 10. Defining Information Technology • Information Technologies are systems of hardware and/or software that capture, process, exchange, store and/or present information using electrical, magnetic and/or electromagnetic energy. 10
  • 11. IT Example: Cellular Telephony 11
  • 12. IT Example: Wireless Internet 12
  • 13. IT in Society (people) • Personal Communication • Conversations (phone, cell) • Messaging (E-mail, SMS) • Video Coms • Entertainment • Web surfing • Downloading video and audio files • Interactive gaming • Day-to-Day living Buying airline tecket Ordering books Electronic banking/ stock market 13
  • 14. IT in Society (business) • Internal Communication • Computer network • Corporate website • Video teleconferencing • Messaging (SMS, email) • Electronic Commerce • Call Centres • Electronic transactions • Online sales • Business operations Factory operation systems Databases 14
  • 15. Examples on IT Careers • Information Security Jobs • Address information security • IT Analyst • Translate business requirement into technical specification • Network Administration • Configure and operate computer network • Management Consulting • Provide consulting for government and organizations • Database Administration Managing corporate database • Computer Forensics Expert Extracts computer evidence for detecting/preventing /prosecuting crimes • IT Sales: people on frontline to sell products • Software development: develop software solutions 15
  • 16. An Introduction to Systems Concepts and Systems Architecture UNIVERSITAS TEKNOKRAT INDONESIA FAKULTAS EKONOMI DAN BISNIS 5th Edition, Irv Englander John Wiley and Sons 16
  • 17. What is a system? • What do the following systems have in common? 1. Plumbing system 2. Solar system 3. Home network system 4. Inventory control system 2-17
  • 22. Definition of a System • “A system is a collection of components linked together and organized in such a way as to be recognizable as a single unit.” • Linked components of a system also define a boundary for the system • The environment is anything outside of the system 2-22
  • 23. General Representation of a System 2-23
  • 24. System Decomposition • Components • May be irreducible or • May be subsystems • Decomposition • The division of a system into its components and linkages • Hierarchical 2-24
  • 25. System Architecture “The fundamental properties, and the patterns of relationships, connections, constraints, and linkages among the components and between the system and its environment are known collectively as the architecture of the system” 2-25
  • 26. Abstractions of Systems • How are the following two abstractions of a business system different from one another? • How are these abstractions different from the real business system? 2-26
  • 29. IT System Architectures • Distributed processing systems • Client-Server Computing • Two-tier architecture • Three-tier architecture • N-tier architecture • Web-Based Computing • Cloud Computing • Peer-to-Peer Computing 2-29
  • 30. Client-Server Computing • A program on a client computer requests services from a program on a server computer • Examples: • Email services, file services, print services, directory services, Web services, database services, application services, remote access services 2-30
  • 32. Advantages of Client-Server Architecture • Centralization of services permits • easier administration of services by IT professionals • easier availability and location by users • consistency of resources, such as files and data, can be managed and assured • more efficient and cost-effective hardware procurement through purchasing a small number of very powerful computers 2-32
  • 33. Clients and Servers on a Network 2-33
  • 34. Multi-tier Architectures • Two-tier architecture • Two computers are involved in a service • Example: Web browser and Web server model used in intranets and on the Internet • Three-tier architecture • Three computers are involved in a service • Example: client computer, Web server, database server • N-tier architecture 2-34
  • 35. Three-tier Web-based Email Architecture 2-35
  • 36. Cloud Computing • Off-site storage facilities for an organization • Software as a service (SaaS): applications run on a server or processing may be divided on server and client • Platform as a service (PaaS): tools for a developer to create and run applications on a cloud platform • Infrastructure as a service (IaaS) – cloud-based hardware emulation of virtual machines and networking 2-36
  • 37. Cloud Computing Advantages/Risks • Advantages • Client’s datacenter needs are simplified; reduced costs • Supports collaboration • Scalable to a variety of host platforms • Reduced maintenance downtime • Lower investment for short-term projects • Risks • Quality of security is critical • Outages or loss of connectivity may prevent users from working • Requires long-term commitment and viability of cloud service • Changes in operating procedures can result in data loss 2-37
  • 38. Peer-to-Peer Computing • Computers on a network are treated as equals • Each computer can share resources with the other computers on the network • Disadvantages • Difficult to establish centralized control of services • Difficult to locate services • Difficult to synchronize versions of files or software • Difficult to secure network from unauthorized access and from viruses • Advantages • Sharing files between personal computers • Internet file sharing 2-38
  • 39. Hybrid Model of Computing • Client-server technology used to locate systems and files • Then systems can participate in peer-to-peer transactions • Examples • Instant messaging • Skype • Napster 2-39
  • 40. Google: System Architecture • Provide powerful, fast search capability for material on the Internet • Derive income from advertising that is targeted to each user based on their searches • Basic requirements • Capable of responding to millions of simultaneous requests from all over the world • Perform a web crawl of the Internet to retrieve and organize data • Establish ranking of results with appropriately targeted advertising • High reliability of the system • System is easily scalable and cost effective 2-40
  • 41. Google Data Center Search Application Architecture 2-41
  • 42. Simplified Google System Hardware Architecture 2-42
  • 43. Facebook’s Application Architecture • N-tier architecture • Based entirely on open source software • Serves as an intermediary between web browser and an application provider’s Web service • API and protocols allow information exchange between Facebook servers and the application server 2-43
  • 44. Component of IT UNIVERSITAS TEKNOKRAT INDONESIA FAKULTAS EKONOMI DAN BISNIS 5th Edition, Irv Englander John Wiley and Sons 44
  • 45. The Components of IT • Accepting and storing data and information • Performing mathematical calculations • Applying logic to make decisions • Retrieving, displaying, and sending information • Consistently repeating the above actions many times 45
  • 46. Information Technology Categories • Hardware: the electronic and mechanical components you can see and touch • Software: the set of instructions that direct the hardware • Network technology: increases the power of IT by allowing the sharing of resource 46
  • 48. Hardware Components • Processing: Directs execution of instructions and the transformation of data • Memory: Temporarily stores data and instructions before and after processing • Input: Provides the interface used for data entry into a device • Output: Provides the interface to retrieve information from a device • Storage: Stores data, information, and instructions for the long term • Communications: Connects one IT device to another 48
  • 49. The Central Processing Unit • Core of all computing operations is a chip composed of millions of transistors called the central processing unit (or CPU). • A transistor is an electronic switch that can be on (1) or off (0). • By combining multiple transistors we can represent data in a binary format. • The CPU works together with memory to control the execution of instructions and the processing of data. • CPU speed is measured by its clockspeed in billions of cycles per second (gigahertz). 49
  • 50. Memory • There are two types of memory—long term (ROM) memory and short-term (RAM) memory • Both types of memory are built onto memory chips • Both are measured in number of bytes stored: • 1000’s (kilobytes—KB) • Millions (megabytes—MB • Billions (gigabytes—GB) 50
  • 51. Read Only Memory • Read Only Memory (ROM) contains instructions that are not meant to be changed or changed only infrequently • ROM is present in most IT devices • In computers, ROM holds instructions used to control the startup process • There are far fewer ROM chips than RAM chips in a computer 51
  • 52. Random Access Memory • Random Access Memory (RAM) is the predominant form of memory in a computer. • The CPU can access any item stored in RAM directly (randomly). • RAM is temporary memory so anything in RAM is lost when the computer is shut down. • Increasing RAM capacity is the easiest way to increase effectiveness of a computer. 52
  • 53. Input Hardware • Input devices provide one interface between the internal processes of an IS and its environment. • It allows us to enter data and commands. • Input devices include: • Keyboards • Pointing devices such as a mouse • Scanning devices such a barcode scanner 53
  • 54. Keyboard • Most widely used input device for computers. • Highly versatile, providing the capability to enter all types of data as well as instructions. • Ergonomic keyboards are keyboards that are designed to keep users safe as well as enabling them to be more productive. 54
  • 55. Pointing and Scanning Devices • Pointing devices such as a mouse allow users to provide instructions to a computer using physical movements, such as “point” and “click”. • Pointing devices tend to require less training than a keyboard. • More useful to entering commands than for entering data. • Scanning devices such as barcode readers improve speed and efficiency or perform a task more efficiently. 55
  • 56. Output Hardware • Output devices convert IT-processed information into a form usable by knowledge workers (or other machines) • Quality and speed of output is important in choosing an output device. • Common output devices include • Display devices such as liquid crystal displays (LCDs) • Printers, typically laser or ink-jet as well as plotters • Speakers 56
  • 57. IT Storage Hardware • Storage refers to hardware media and devices used to contain large amounts of data and instructions for the long term. • Storage is much slower to access than memory. • Examples include: • Hard drive • CD and DVDs • USB flash memory 57
  • 58. Communications Hardware • Network interface card (NIC) provides the physical connection between the computer and a local network • Wired • Wireless • Modems allow you to connect to a remote network over a telecommunications line (telephone line or cable TV service) 58
  • 59. Software • Software is information that specifies how the device should work with other data, information, and knowledge. • Software is legally protected just like music and books. • Firmware is software built into chips (hardware) like that in cell phones and PDAs • Software gets the job done! • System Software • Application Software 59
  • 60. System Software • Controls the hardware associated with a system • Supports the execution of application software • Two main types of systems software • Operating Systems (OS) Software –coordinates and handles the details of working with the computer hardware. • Utility software – provides additional tools to maintain and service your system (many utility software tasks are now included in the OS). 60
  • 62. Application Software • Application software is a complete, self-contained program or set of programs for performing a specific job. • Application software is the software you use to get things done. • Productivity software – software used by knowledge workers to work with data, information, and knowledge. For example, MS Office and Intuit’s Quicken software. 62
  • 63. Types of Productivity Software • Document Preparation Software: used in creating documents composed of text, images, and graphics. • Electronic Spreadsheet Software: used to perform general calculations and analyses. • Presentation Graphics Software: used for preparing slides and graphics for business presentations. • Database Management System (DBMS) software: used to design, create, update, and query data. • Personal Information Management (PIM) software: used to manage personal information. 63
  • 64. Connecting over Networks • Networks are everywhere! In this section, we concentrate on a computer networks. • A computer network consists of nodes that represent computer hardware and network user with hardware, software, and communications media forming links between nodes. • Network consists of 4 primary components: • Data • Special hardware • Software that allows computers to share data. • Communications media to link computers together. 64
  • 65. Network Categories • Computer networks are commonly described by the physical size of the network. • The most commonly use types are LANs and WANs. • A Local Area Network (LAN) is confined to a relatively small area like a building. • A Wide Area Network (WAN) connects computers over regions, countries, and continents. 65
  • 66. Network Hardware • There are three basic categories of network hardware 1. Hardware to connect a device to a network. 2. Specialized hardware for handling network traffic. 3. Specialized computers that control the network and delivery of data on the network. 66
  • 67. Network Connection Hardware • Modems, cable modems, network interface cards, and wireless cards • The physical link that creates the network connection is referred to as the carrier or communications medium. • Copper wire for telephone systems • Coaxial cable or fiber-optic cables for faster transmission • Wireless technologies including infrared light, radio waves, and microwaves. 67
  • 68. Network Traffic Hardware • A bridge is a device that lets you connect to networks or break a large network into two smaller, more efficient networks. • A router is an intelligent bridge that connects, translates, and then directs data that cross between two networks. • A hub (or concentrator) serves as a central connection point for devices on a a network. • A wireless Access Point (AP) is a special bridge that connects between wireless devices and a wired network. 68
  • 69. Specialized Network Computers • Servers are specialized computers that manage the various functions on a network. • A file server is a fast computer with large amount of RAM and storage. • File servers run the network operating system as well as storing shared software applications and data files. • Computers connected to a file server are called clients or workstations. 69
  • 70. Network Software • Network operating system software manages network functions and the flow of data over a computer network. • Network application software provides the instructions that allow for the creation of data and for transformation to fit appropriate protocols for transmission over a network. • A protocol is a standard set of rules that allows the communication of data between nodes on a network. 70
  • 71. Network Benefits • Efficient communication: E-mail and instant messaging are just two ways that networks allow us to communicate more efficiently. • Effective resource management: Networks allow easy sharing of software, hardware, and data resources. • Complete, accurate, reliable, and timely information: Multiple users can access or update data quickly from a central database. • Expanded marketing and customer service capabilities: Businesses and individuals can carry out remote business transactions anytime and anywhere. 71
  • 72. The Internet • Any computer network that connects several networks together is an internet. • Typically we refer to the single largest and most popular internet as the “Internet.” • Over 1 billion people had access to the Internet in 2006. • The Internet uses the TCP/IP suite of packet switching protocols. • Any computer using software compatible with TCP/IP, regardless of OS, can connect and communicate over the Internet. 72
  • 73. Access the Internet • Home users access the Internet through dial-up over traditional telephone lines or broadband through cable or DSL. • Most users connect through an Internet Service Provider (ISP) using Internet access software. • Internet access has moved into libraries, airports, or coffee shops using Wi-Fi. • Wi-fi stands for 802.11 standards for wireless network access. 73
  • 74. The World Wide Web • The World Wide Web (WWW) is one the two most popular Internet applications (e-mail is the other.) • The Web provides a hypertext system that operates over the Internet. • Hypertext provides an easy way to publish information on a network in documents that incorporate hyperlinks to other information on the network. • Web browser software enables user to view hypertext document and use hyperlinks to browse other related documents. 74
  • 75. Web Standards The Web relies on three basic standards: 1. A Uniform Resource Locator (URL) which specifies a unique address for each page that indicates the location of a document. 2. The Hypertext Transfer Protocol (HTTP) provides rules used by browsers and servers as they respond to each other. 3. Hypertext Markup Language (HTML) provides a language for encoding the information so a variety of IT devices can display it. 75
  • 76. THANK YOU ... UNIVERSITAS TEKNOKRAT INDONESIA FAKULTAS EKONOMI DAN BISNIS YUSRA FERNANDO, S.KOM., M.KOM 76