SlideShare a Scribd company logo
INFORMATION TECHNOLOGY
INFORMATION AND COMMUNICATION
TECHNOLOGY
PROCESS DATA INTO INFORMATION
• Calculate
• Compare
• Sort
• Classify
• Summarize
This data is transmitted into distant places in the
form of sound, picture and computerized data.
INFORMATION AND COMMUNICATION
TECHNOLOGY
• ICT is basically an electronic based system of information
transmission, reception, processing an retrieval.
• ICT is a blend of two fields: Information technology and
telecommunication.
• Information technology is a scientific method used to store
information, to arrange it for proper use and to
communicate it to others.
• Telecommunication is the method used to communicate
information to far off places instantly.
COMPONENTS OF COMPUTER BASED
INFORMATION SYSTEM
COMPONENTS OF COMPUTER BASED
INFORMATION SYSTEM
1. Software
2. Hardware
3. Data
4. People
5. Procedures
HARDWARE
• Hardwares are computer Equipment. Such as:
1. Keyboard
2. Mouse
3. CPU
4. Monitor
5. Speakers etc
SOFTWARE
• Softwares are computer Programs and the manuals that support them.
• There are two types of software
i. System software
ii. Application software
i. SYSTEM SOFTWARE:
It is used to run your system or we can say that if perform system activities.
Examples: Operating system, utility programs.
ii. APPLICATION SOFTWARE:
It fulfills the requirement of user.
Examples: Word processing, web browsers etc
DATA
• Data are facts and figures that are used by programs to
produce useful information
• Data is in machine readable form.
• Data ca be text, graphics or figures.
PROCEDURES
• Strategies, policies, methods, and rules for
using a CBIS.
• Procedures are to people what software is to
hardware
PEOPLE
• From the front-line help-desk workers, to systems analysts, to
programmers, the people involved with information systems are an
essential element that must not be overlooked.
• Who design and operate the software and hardware
• People determine whether or not an information system is going
to succeed or fail.
FLOW OF INFORMATION
• Flow of information means transfer of information from one place to another
through different electronic and optical equipment.
• In telephone information is sent through wires in the form of electrical
signals .
• In radio, television and cell phone information is sent either through space in
the form of electromagnetic waves or through optical fibre in the form of
light.
ELEMENTS OF A COMMUNICATION
SYSTEM
Communication system has three essential elements
1. Transmitter
2. Transmission channel
3. Receiver
TRANSMISSION OF ELECTRICAL SIGNALS
THROUGH WIRES
• Alexander Graham Bell in 1876 made a simple telephone model to send
voice in the form of electrical signal from one place to another.
• It consists of a metal reed, an electrical coil and a vibrating diaphragm.
• Modern telephone also uses diaphragms to turn voices into electrical
signal that are transmitted over phone lines. Telephone system has two
parts: the mouthpiece and the earpiece
• The mouthpiece and receiver contain carbon granules and a thin metal
diaphragm.
• When we speak into the mouthpiece, the sound vibrations also vibrate
the diaphragm. A slight vibration of the diaphragm compresses the
carbon and thus an electrical current can flow through the wire.
TRANSMISSION OF ELECTRICAL SIGNALS
THROUGH WIRES IN ALEXANDER GRAHAM BELL
PHONE
• The first telephone had two parts: a transmitter and a receiver. The transmitter
comprised three parts—a drumlike device (a cylinder with a covered end), a needle,
and a battery. The covered end of the drumlike device was attached to the needle.
The needle was connected by wire to the battery, and the battery was connected by
wire to a receiver. When Bell spoke into the open end of the drumlike device, his
voice made the paper and needle vibrate. The vibrations were then converted into
an electric current which traveled along the wire to the receiver.
TRANSMISSION OF LIGHT SIGNALS
THROUGH OPTICAL FIBRES
• Light wave have much higher frequency than radio waves.
• Rate of sending information through light beam is larger than that of radio wave or
microwave.
• Optical fibre is bundle of glass fiber.
• Its central part is called core.
• Outer cover has low refractive index.
TRANSMISSION OF LIGHT SIGNALS
THROUGH OPTICAL FIBRES
• The information is converted into electric voltage signals. This varying voltage is
used to produce light.
• Two different type of light source are used in fibre optic system: LED and ILD.
• LED is less costly.
TRANSMISSION OF RADIO WAVES THROUGH
SPACE
• In order to send information over a long distance, it has to be superimposed on
electromagnetic waves.
• Sound waves produced are changed
into electrical signals through microphone
• Sound signals are imposed on
electromagnetic waves and then amplified.
• These signals are then fed into the antenna.
• The charges on antenna move when the
Signal strike it. Finally the signal is Transmitted.
Modulation is the process of converting data into
radio waves.
EMW are waves that are created as a result of vibrations between an electric field and a magnetic field
TRANSMISSION OF RADIO WAVES THROUGH
SPACE
• The antenna at the receiver end
will receive these waves.
• The waves are amplified.
• Demodulation is extracting the
original information-bearing
signal from a carrier wave.
TELECOMMUNICATION DEVICES
CELL PHONE
• It’s a two way communication technology.
• It send and receive the message in the form of radio
waves.
• Cell phone network consists of Base station and Mobile
Switching Center.
• BS is a wireless communication station set up at a
particular geographical location.
• The geographical area covered by a single BS is known as
cell.
• The group of cells form a cluster. All the BSs within a
cluster are connected to MSC.
CELL PHONE
• The MSC stores information about the subscribers located within the cluster
and is responsible for directing calls to them.
• When a transmitter send a signal, are converted into radio waves.
• A particular frequency is allot to these signals.
• This signal is then sent to the base station of the receiver through MSC.
COMPUTER
• Computer is an electronic device used for storing and processing data in
binary form according to the instruction.
• Used for calculation.
• Computer works through an interaction of hardware and software.
• Hardware are the physical components of computer.
• The most important piece of hardware is the CPU that contains
microprocessor.
• It is the brain of computer. It translates instructions and perform calculation.
COMPUTER
• Software are programs or set of
instructions that tells the computer what
to do.
• There are system and application
software.
FAX MACHINE
• When you enter a document into the fax
machine, the scanner turns it into a digital
signal that is transferred over the phone
line.
• The recipient fax machine receives the
signal, which then decodes it to reproduce
the original document before printing it.
PHOTO PHONE
• It is a telecommunication device.
• On 3rd June 1880, four years after Graham Bell
patented the telephone, he transmitted the first
wireless telephone message on his newly
invented “Photo phone.” All he needed in the
19th century were four years to go from wired
voice communications to wireless voice
communications.
• The photo phone was in fact, the World’s first
device for wireless communications, and it was
invented jointly by Alexander Graham Bell and
his assistant Charles Sumner Tainter.
INTERNET AND EMAIL
• Internet is world wide system of computer networks.
• It is a network of networks.
• Email is a method of exchanging message between people using
electronic devices.
• Email operates across computer networks.
• Email is free tool.
• it is quick.
• It is simple.
• It allows for easy referencing.
• It is accessible from everywhere.
• It is paperless therefore beneficial for the planet.
INFORMATION STORAGE DEVICES
• Data storage is the recording (storing) of information (data) in a
storage medium.
• Storage device is used to store information in computer.
• Storage devices work on different principles using electronics,
magnetism and laser technology.
Primary Memory
• Primary memory, also known as the main memory, is the area in a
computer which stores data and information for fast access.
• It consists of two parts; ROM and RAM.
INFORMATION STORAGE DEVICES
• ROM contains the programming that allows
a computer to start up or regenerate each
time it is turned on.
• RAM is volatile memory . That means data is
retained in RAM as long as the computer is
on, but it is lost when the computer is
turned off. When the computer is rebooted,
the OS and other files are reloaded into
RAM, usually from an HDD or SSD.
INFORMATION STORAGE DEVICES
• Secondary storage devices:
• Secondary storage is a memory that
is stored external to the computer.
• It is mainly used for the permanent
and long-term storage of programs
and data.
• Hard Disk, CD, DVD, Pen/Flash drive,
SSD, etc, are examples of secondary
storage.
AUDIO AND VIDEO CASSETTES
• These devices are based on magnetism.
• At first, the tapes were wound in wheel- like
reels, but then cassettes and cartridge came
along, which offered more protection for the
tape inside.
• Data on the tape is written and read sequentially.
• Finding a specific record takes time, because the
machine has to read every record.
• It can store music and sounds.
FLOPPY DISK
• Floppy disk is a magnetic storage device.
• It was used with late 20th century computers.
• Floppy disks were popular from 1970 to 1990.
HARD DISK
• Hard disk is magnetic disc
• Data on magnetic disc can be recorded and
erased several times.
• It is located within a drive unit and
sometimes external.
• It is non-volatile storage.
• It contains platters and magnetic disks
rotating at high speed.
• Data is written on platters using a magnetic
head inside and air-sealed casing.
FLASH DRIVE
• USB flash drive is a portable storage device
• It is compact ,fast and store large amount of data in a
small space
• They are removable and rewriteable
• Also known as pen drive.

More Related Content

Similar to INFORMATION TECHNOLOGY.pptx

Mba i-ifm-u-4-data communication and network
Mba i-ifm-u-4-data communication and networkMba i-ifm-u-4-data communication and network
Mba i-ifm-u-4-data communication and network
Rai University
 
INFORMATION AND COMMUNICATION TECHNOLOGY.pptx
INFORMATION AND COMMUNICATION TECHNOLOGY.pptxINFORMATION AND COMMUNICATION TECHNOLOGY.pptx
INFORMATION AND COMMUNICATION TECHNOLOGY.pptx
ReymondDalupang
 
Bba i-introduction to computer-u-4-data communication and network
Bba  i-introduction to computer-u-4-data communication and networkBba  i-introduction to computer-u-4-data communication and network
Bba i-introduction to computer-u-4-data communication and network
Rai University
 
Transmission Media
Transmission MediaTransmission Media
Transmission Media
Kereen Tatham
 
Information and communication technology
Information and communication technologyInformation and communication technology
Information and communication technology
Dr. B T Sampath Kumar
 
Transmission media
Transmission mediaTransmission media
Transmission media
FazailAhmad2
 
Data communication
Data communicationData communication
Data communication
Abdul Rehman
 
class Xii communication technology
 class Xii communication technology class Xii communication technology
class Xii communication technology
Archana Dwivedi
 
Networking Terminology
Networking TerminologyNetworking Terminology
Networking Terminology
SabinDhakal13
 
CN L5 — копия.pptx
CN L5 — копия.pptxCN L5 — копия.pptx
CN L5 — копия.pptx
AssemNazirova2
 
BAIT1003 Chapter 8
BAIT1003 Chapter 8BAIT1003 Chapter 8
BAIT1003 Chapter 8
limsh
 
Data Communication 1
Data Communication 1Data Communication 1
Data Communication 1
admercano101
 
Networking devices
Networking devicesNetworking devices
Networking devices
Ravi KC
 
Lecture 3 network communication media and devices
Lecture 3 network communication media and devicesLecture 3 network communication media and devices
Lecture 3 network communication media and devices
Albert Abbosey
 
chapter 1 dc ppt.pptx
chapter 1 dc ppt.pptxchapter 1 dc ppt.pptx
chapter 1 dc ppt.pptx
John160915
 
Computer Networks Part 1.pptx
Computer Networks Part 1.pptxComputer Networks Part 1.pptx
Computer Networks Part 1.pptx
zjjsjsnn
 
north western railway jodhpur
north western railway jodhpurnorth western railway jodhpur
north western railway jodhpur
Neha Chouhan
 
Dcn
DcnDcn
Wireless devices by hm
Wireless devices by hmWireless devices by hm
Wireless devices by hm
Hamza Mughal
 
Physical Layer
Physical LayerPhysical Layer
Physical Layer
Are-Da Shalan
 

Similar to INFORMATION TECHNOLOGY.pptx (20)

Mba i-ifm-u-4-data communication and network
Mba i-ifm-u-4-data communication and networkMba i-ifm-u-4-data communication and network
Mba i-ifm-u-4-data communication and network
 
INFORMATION AND COMMUNICATION TECHNOLOGY.pptx
INFORMATION AND COMMUNICATION TECHNOLOGY.pptxINFORMATION AND COMMUNICATION TECHNOLOGY.pptx
INFORMATION AND COMMUNICATION TECHNOLOGY.pptx
 
Bba i-introduction to computer-u-4-data communication and network
Bba  i-introduction to computer-u-4-data communication and networkBba  i-introduction to computer-u-4-data communication and network
Bba i-introduction to computer-u-4-data communication and network
 
Transmission Media
Transmission MediaTransmission Media
Transmission Media
 
Information and communication technology
Information and communication technologyInformation and communication technology
Information and communication technology
 
Transmission media
Transmission mediaTransmission media
Transmission media
 
Data communication
Data communicationData communication
Data communication
 
class Xii communication technology
 class Xii communication technology class Xii communication technology
class Xii communication technology
 
Networking Terminology
Networking TerminologyNetworking Terminology
Networking Terminology
 
CN L5 — копия.pptx
CN L5 — копия.pptxCN L5 — копия.pptx
CN L5 — копия.pptx
 
BAIT1003 Chapter 8
BAIT1003 Chapter 8BAIT1003 Chapter 8
BAIT1003 Chapter 8
 
Data Communication 1
Data Communication 1Data Communication 1
Data Communication 1
 
Networking devices
Networking devicesNetworking devices
Networking devices
 
Lecture 3 network communication media and devices
Lecture 3 network communication media and devicesLecture 3 network communication media and devices
Lecture 3 network communication media and devices
 
chapter 1 dc ppt.pptx
chapter 1 dc ppt.pptxchapter 1 dc ppt.pptx
chapter 1 dc ppt.pptx
 
Computer Networks Part 1.pptx
Computer Networks Part 1.pptxComputer Networks Part 1.pptx
Computer Networks Part 1.pptx
 
north western railway jodhpur
north western railway jodhpurnorth western railway jodhpur
north western railway jodhpur
 
Dcn
DcnDcn
Dcn
 
Wireless devices by hm
Wireless devices by hmWireless devices by hm
Wireless devices by hm
 
Physical Layer
Physical LayerPhysical Layer
Physical Layer
 

More from samina khan

UNDERSTANDING SELF AND OTHERS.pptx
UNDERSTANDING SELF AND OTHERS.pptxUNDERSTANDING SELF AND OTHERS.pptx
UNDERSTANDING SELF AND OTHERS.pptx
samina khan
 
scaffolding in teaching.pptx
scaffolding in teaching.pptxscaffolding in teaching.pptx
scaffolding in teaching.pptx
samina khan
 
REFLECTIVE TEACHING.pptx
REFLECTIVE TEACHING.pptxREFLECTIVE TEACHING.pptx
REFLECTIVE TEACHING.pptx
samina khan
 
PEDAGOGICAL SKILLS.pptx
PEDAGOGICAL SKILLS.pptxPEDAGOGICAL SKILLS.pptx
PEDAGOGICAL SKILLS.pptx
samina khan
 
What is an Autobiography?
 What is an Autobiography? What is an Autobiography?
What is an Autobiography?
samina khan
 
Picture description
Picture descriptionPicture description
Picture description
samina khan
 
The Internet and World Wide Web
The Internet and World Wide WebThe Internet and World Wide Web
The Internet and World Wide Web
samina khan
 
Computer security & ethics
Computer security  & ethicsComputer security  & ethics
Computer security & ethics
samina khan
 
Computer logic and gates
Computer logic and gatesComputer logic and gates
Computer logic and gates
samina khan
 
Problem solving
Problem solvingProblem solving
Problem solving
samina khan
 
Computer networks
Computer networksComputer networks
Computer networks
samina khan
 
Classroom management
Classroom managementClassroom management
Classroom management
samina khan
 
More on number system
More on number systemMore on number system
More on number system
samina khan
 
Stress management
Stress managementStress management
Stress management
samina khan
 
Classroom management
Classroom managementClassroom management
Classroom management
samina khan
 
The future of technology
The future of technologyThe future of technology
The future of technology
samina khan
 
Lesson plan:Multiplication and division of binary numbers
Lesson plan:Multiplication and division of binary numbersLesson plan:Multiplication and division of binary numbers
Lesson plan:Multiplication and division of binary numbers
samina khan
 
Computer networks grade 7
Computer networks grade 7Computer networks grade 7
Computer networks grade 7
samina khan
 
Applications of computer
Applications of computerApplications of computer
Applications of computer
samina khan
 
Data protection and security
Data protection and securityData protection and security
Data protection and security
samina khan
 

More from samina khan (20)

UNDERSTANDING SELF AND OTHERS.pptx
UNDERSTANDING SELF AND OTHERS.pptxUNDERSTANDING SELF AND OTHERS.pptx
UNDERSTANDING SELF AND OTHERS.pptx
 
scaffolding in teaching.pptx
scaffolding in teaching.pptxscaffolding in teaching.pptx
scaffolding in teaching.pptx
 
REFLECTIVE TEACHING.pptx
REFLECTIVE TEACHING.pptxREFLECTIVE TEACHING.pptx
REFLECTIVE TEACHING.pptx
 
PEDAGOGICAL SKILLS.pptx
PEDAGOGICAL SKILLS.pptxPEDAGOGICAL SKILLS.pptx
PEDAGOGICAL SKILLS.pptx
 
What is an Autobiography?
 What is an Autobiography? What is an Autobiography?
What is an Autobiography?
 
Picture description
Picture descriptionPicture description
Picture description
 
The Internet and World Wide Web
The Internet and World Wide WebThe Internet and World Wide Web
The Internet and World Wide Web
 
Computer security & ethics
Computer security  & ethicsComputer security  & ethics
Computer security & ethics
 
Computer logic and gates
Computer logic and gatesComputer logic and gates
Computer logic and gates
 
Problem solving
Problem solvingProblem solving
Problem solving
 
Computer networks
Computer networksComputer networks
Computer networks
 
Classroom management
Classroom managementClassroom management
Classroom management
 
More on number system
More on number systemMore on number system
More on number system
 
Stress management
Stress managementStress management
Stress management
 
Classroom management
Classroom managementClassroom management
Classroom management
 
The future of technology
The future of technologyThe future of technology
The future of technology
 
Lesson plan:Multiplication and division of binary numbers
Lesson plan:Multiplication and division of binary numbersLesson plan:Multiplication and division of binary numbers
Lesson plan:Multiplication and division of binary numbers
 
Computer networks grade 7
Computer networks grade 7Computer networks grade 7
Computer networks grade 7
 
Applications of computer
Applications of computerApplications of computer
Applications of computer
 
Data protection and security
Data protection and securityData protection and security
Data protection and security
 

Recently uploaded

Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 

Recently uploaded (20)

Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 

INFORMATION TECHNOLOGY.pptx

  • 1.
  • 4. PROCESS DATA INTO INFORMATION • Calculate • Compare • Sort • Classify • Summarize This data is transmitted into distant places in the form of sound, picture and computerized data.
  • 5. INFORMATION AND COMMUNICATION TECHNOLOGY • ICT is basically an electronic based system of information transmission, reception, processing an retrieval. • ICT is a blend of two fields: Information technology and telecommunication. • Information technology is a scientific method used to store information, to arrange it for proper use and to communicate it to others. • Telecommunication is the method used to communicate information to far off places instantly.
  • 6. COMPONENTS OF COMPUTER BASED INFORMATION SYSTEM
  • 7. COMPONENTS OF COMPUTER BASED INFORMATION SYSTEM 1. Software 2. Hardware 3. Data 4. People 5. Procedures
  • 8. HARDWARE • Hardwares are computer Equipment. Such as: 1. Keyboard 2. Mouse 3. CPU 4. Monitor 5. Speakers etc
  • 9. SOFTWARE • Softwares are computer Programs and the manuals that support them. • There are two types of software i. System software ii. Application software i. SYSTEM SOFTWARE: It is used to run your system or we can say that if perform system activities. Examples: Operating system, utility programs. ii. APPLICATION SOFTWARE: It fulfills the requirement of user. Examples: Word processing, web browsers etc
  • 10. DATA • Data are facts and figures that are used by programs to produce useful information • Data is in machine readable form. • Data ca be text, graphics or figures.
  • 11. PROCEDURES • Strategies, policies, methods, and rules for using a CBIS. • Procedures are to people what software is to hardware
  • 12. PEOPLE • From the front-line help-desk workers, to systems analysts, to programmers, the people involved with information systems are an essential element that must not be overlooked. • Who design and operate the software and hardware • People determine whether or not an information system is going to succeed or fail.
  • 13. FLOW OF INFORMATION • Flow of information means transfer of information from one place to another through different electronic and optical equipment. • In telephone information is sent through wires in the form of electrical signals . • In radio, television and cell phone information is sent either through space in the form of electromagnetic waves or through optical fibre in the form of light.
  • 14.
  • 15. ELEMENTS OF A COMMUNICATION SYSTEM Communication system has three essential elements 1. Transmitter 2. Transmission channel 3. Receiver
  • 16. TRANSMISSION OF ELECTRICAL SIGNALS THROUGH WIRES • Alexander Graham Bell in 1876 made a simple telephone model to send voice in the form of electrical signal from one place to another. • It consists of a metal reed, an electrical coil and a vibrating diaphragm. • Modern telephone also uses diaphragms to turn voices into electrical signal that are transmitted over phone lines. Telephone system has two parts: the mouthpiece and the earpiece • The mouthpiece and receiver contain carbon granules and a thin metal diaphragm. • When we speak into the mouthpiece, the sound vibrations also vibrate the diaphragm. A slight vibration of the diaphragm compresses the carbon and thus an electrical current can flow through the wire.
  • 17. TRANSMISSION OF ELECTRICAL SIGNALS THROUGH WIRES IN ALEXANDER GRAHAM BELL PHONE • The first telephone had two parts: a transmitter and a receiver. The transmitter comprised three parts—a drumlike device (a cylinder with a covered end), a needle, and a battery. The covered end of the drumlike device was attached to the needle. The needle was connected by wire to the battery, and the battery was connected by wire to a receiver. When Bell spoke into the open end of the drumlike device, his voice made the paper and needle vibrate. The vibrations were then converted into an electric current which traveled along the wire to the receiver.
  • 18.
  • 19. TRANSMISSION OF LIGHT SIGNALS THROUGH OPTICAL FIBRES • Light wave have much higher frequency than radio waves. • Rate of sending information through light beam is larger than that of radio wave or microwave. • Optical fibre is bundle of glass fiber. • Its central part is called core. • Outer cover has low refractive index.
  • 20. TRANSMISSION OF LIGHT SIGNALS THROUGH OPTICAL FIBRES • The information is converted into electric voltage signals. This varying voltage is used to produce light. • Two different type of light source are used in fibre optic system: LED and ILD. • LED is less costly.
  • 21.
  • 22.
  • 23. TRANSMISSION OF RADIO WAVES THROUGH SPACE • In order to send information over a long distance, it has to be superimposed on electromagnetic waves. • Sound waves produced are changed into electrical signals through microphone • Sound signals are imposed on electromagnetic waves and then amplified. • These signals are then fed into the antenna. • The charges on antenna move when the Signal strike it. Finally the signal is Transmitted. Modulation is the process of converting data into radio waves. EMW are waves that are created as a result of vibrations between an electric field and a magnetic field
  • 24. TRANSMISSION OF RADIO WAVES THROUGH SPACE • The antenna at the receiver end will receive these waves. • The waves are amplified. • Demodulation is extracting the original information-bearing signal from a carrier wave.
  • 26. CELL PHONE • It’s a two way communication technology. • It send and receive the message in the form of radio waves. • Cell phone network consists of Base station and Mobile Switching Center. • BS is a wireless communication station set up at a particular geographical location. • The geographical area covered by a single BS is known as cell. • The group of cells form a cluster. All the BSs within a cluster are connected to MSC.
  • 27. CELL PHONE • The MSC stores information about the subscribers located within the cluster and is responsible for directing calls to them. • When a transmitter send a signal, are converted into radio waves. • A particular frequency is allot to these signals. • This signal is then sent to the base station of the receiver through MSC.
  • 28.
  • 29. COMPUTER • Computer is an electronic device used for storing and processing data in binary form according to the instruction. • Used for calculation. • Computer works through an interaction of hardware and software. • Hardware are the physical components of computer. • The most important piece of hardware is the CPU that contains microprocessor. • It is the brain of computer. It translates instructions and perform calculation.
  • 30. COMPUTER • Software are programs or set of instructions that tells the computer what to do. • There are system and application software.
  • 31. FAX MACHINE • When you enter a document into the fax machine, the scanner turns it into a digital signal that is transferred over the phone line. • The recipient fax machine receives the signal, which then decodes it to reproduce the original document before printing it.
  • 32. PHOTO PHONE • It is a telecommunication device. • On 3rd June 1880, four years after Graham Bell patented the telephone, he transmitted the first wireless telephone message on his newly invented “Photo phone.” All he needed in the 19th century were four years to go from wired voice communications to wireless voice communications. • The photo phone was in fact, the World’s first device for wireless communications, and it was invented jointly by Alexander Graham Bell and his assistant Charles Sumner Tainter.
  • 33. INTERNET AND EMAIL • Internet is world wide system of computer networks. • It is a network of networks. • Email is a method of exchanging message between people using electronic devices. • Email operates across computer networks. • Email is free tool. • it is quick. • It is simple. • It allows for easy referencing. • It is accessible from everywhere. • It is paperless therefore beneficial for the planet.
  • 34. INFORMATION STORAGE DEVICES • Data storage is the recording (storing) of information (data) in a storage medium. • Storage device is used to store information in computer. • Storage devices work on different principles using electronics, magnetism and laser technology. Primary Memory • Primary memory, also known as the main memory, is the area in a computer which stores data and information for fast access. • It consists of two parts; ROM and RAM.
  • 35. INFORMATION STORAGE DEVICES • ROM contains the programming that allows a computer to start up or regenerate each time it is turned on. • RAM is volatile memory . That means data is retained in RAM as long as the computer is on, but it is lost when the computer is turned off. When the computer is rebooted, the OS and other files are reloaded into RAM, usually from an HDD or SSD.
  • 36. INFORMATION STORAGE DEVICES • Secondary storage devices: • Secondary storage is a memory that is stored external to the computer. • It is mainly used for the permanent and long-term storage of programs and data. • Hard Disk, CD, DVD, Pen/Flash drive, SSD, etc, are examples of secondary storage.
  • 37. AUDIO AND VIDEO CASSETTES • These devices are based on magnetism. • At first, the tapes were wound in wheel- like reels, but then cassettes and cartridge came along, which offered more protection for the tape inside. • Data on the tape is written and read sequentially. • Finding a specific record takes time, because the machine has to read every record. • It can store music and sounds.
  • 38. FLOPPY DISK • Floppy disk is a magnetic storage device. • It was used with late 20th century computers. • Floppy disks were popular from 1970 to 1990.
  • 39. HARD DISK • Hard disk is magnetic disc • Data on magnetic disc can be recorded and erased several times. • It is located within a drive unit and sometimes external. • It is non-volatile storage. • It contains platters and magnetic disks rotating at high speed. • Data is written on platters using a magnetic head inside and air-sealed casing.
  • 40. FLASH DRIVE • USB flash drive is a portable storage device • It is compact ,fast and store large amount of data in a small space • They are removable and rewriteable • Also known as pen drive.