SlideShare a Scribd company logo
LECTURE 2 – IT FUNDAMENTALS



Electronic Data Processing

      ElectronicDataProcessing (EDP) – the processing of data through the use of computers

      DataProcessing– the manipulating of data into a more useful form. It is the modern name
       for paperwork and involves the collecting, processing, and distributing of facts and figures
       to achieve a desired result.

Data Processing Cycle

      Input – in this stage the initial data, or input data, are prepared in some convenient form for
       processing.

      Processing – in this step the input data are charged, and usually combined with other
       information, to produce data into more useful form.

      Output – here the results of the preceding processing steps are collected.

Classification of Data Processing

      BusinessDataProcessing – characterized by the need to establish, retain, and process files
       of data for producing useful information. Generally, it involves a large volume of input data,
       limited arithmetical operations, and a relatively large volume of output.

      Scientific Data Processing – involves a limited volume of input and many logical or
       arithmetic calculations. Unlike business problems, most of the scientific problems are non-
       repetitive, requiring a “one-time” solution.

Data Processing Operations

      Recording – refers to the transfer on data into some form or document. It relates to the
       documentation of intermediate figures and facts resulting from calculations.

      Verifying – refers to the careful checking of the recorded data for any errors.

      Duplicating – refers to the reproduction of the data into many forms or document.

      Classifying – refers to identifying and arranging items with likes characteristics into groups
       or classes.

      Sorting – refers to arranging or rearranging data in a predetermined sequence to facilitate
       processing. Sorting is done in alphabetic or a numeric order.

      Calculating – refers to arithmetic manipulation of the data.
   SummarizingorReporting – it is here where a collection of data is condensed and certain
       conclusions from the data are represented in a meaningful format that is clear, concise and
       effective.

      Merging – this operation takes two or more sets of data, all sets having been sorted by the
       same key, and puts them together to form a single sorted set of data.

      Storing – refers to placing similar data into files for future reference.

      Retrieving – refers to recovering stored data and/or information when needed.

      Feedback – refers to the comparison of the output(s) and the goal set in advance, any
       discrepancy is analyzed, corrected, and fed back to proper stage in the processing
       operation.

Methods of Processing Data

      BatchProcessing – a technique in which data to be processed are collected into groups to
       permit convenient, efficient, and serial processing.

      On-lineProcessing – a technique that uses devices directly connected to the CPU either for
       entry or inquiry purposes.

      Real-timeProcessing – a method which has the capability of a fast response to obtain data
       form an activity or a physical process.

      DistributedProcessing – it generally consists of remote terminals linked to a large central
       computer system to help the user conduct inquiries about accounts, process jobs, or other
       data processing operations.

Elements of an EDP System

I. Hardware – the physical equipment that make up a computer system. It includes its peripheral s
and components.

       Examples: Monitor, CPU, Keyboard, Mouse, Speaker

   CentralProcessingUnit (CPU) – heart and brain of the computer system. It is where data
   processing takes place.

   Parts of CPU

      MainMemory (Primary Storage) – data and instructions are stored here. Sometimes known
       as the ‘internal’ memory of the computer.

      ArithmeticLogicUnit (ALU) – accomplishes the arithmetical and logical operations.

              Accumulator – a kind of holding area which retains answers that are produce by
               adders.
   Adders – add the bits coming from the memory and produces a 1 or 0 depending
               upon the components of the received bits (contraction for binary digit).

      Control Unit – supervises all the activities based on a set of instructions programs stored in
       the main memory. It selects, interprets and executes the instructions.

              Registers – functions as temporary storage devices during process of computation.

Input/Output Devices

      InputDevices – physical equipment which reads or translates data consisting of alphabets,
       numbers, or symbols into a form that can be understand by the computer.

               Example of Input Devices: keyboard, mouse, scanner, joystick, graphics pad, bar
               code reader

      OutputDevices – physical equipments which translate the outcome of the computations
       and related activities carried out in the CPU. Its objective is to convert data and information
       onto a form, such as a printed report or visual display that can be understood by humans.

               Example of Output Devices: monitor, printer, plotter, desktop speaker

Types of Computer Memory

      InternalMemory – contained in the silicon chip and can hold instructions and data which
       the computer is currently working on or information which the CPU needs to work very
       rapidly because the speed of the CPU is very high and acquires information to be readily
       available.

              RandomAccessMemory (RAM) – stores instructions which later can be erased or
               changed. All information stored here are lost and erased when computer is turned
               off.

              ReadOnlyMemory(ROM) – contains permanently stored instructions that a
               computer is required to keep able to perform its basic routine operations. Part of
               CPU.

      ExternalMemory – uses tapes and disk to store information. External memory is physically
       separated from CPU.

               Examples: diskette, compact disk, tape backup, hard disk

II. Software – the tangible element composed of programs that instruct the computer what to do.

       Examples: DOS Operating System, Windows 98, MS Office, Cartoon Manila, etc.

   Types of Software
I. SystemsSoftware – the programs or instructions which direct the internal operations of the
   computer. Also called operating software and are normally contained in a disk pack or floppy
   diskette or already embedded on a chip.

Classification of System Software

   A. OperatingSystem – most important type. It is a group of related programs that
      supervises or monitors the execution of an application program and provides services
      such as language translation, input/output control, and job scheduling.
   B. LanguageTranslators – programs which convert human readable form into a series of
      binary pattern of zeroes and ones.

              LowLevelLanguage – Machine Language, Assembly Language difficult to learn,
               coding was tedious, and difficult to correct and find error in programs.

              HighLevelLanguage – COBOL, BASIC, FORTRAN, RPG or PASCAL

   C. UtilityorServicePrograms – use for specialized data process problems.

II. ApplicationSoftware – Provides a solution to a specific business, scientific, engineering or
   research problems, or which perform specific operations or applications. Used to predict
   weather conditions, to keep track of an organization’s inventories, can assist an individual in
   balancing his checkbook, or game program for entertainment (e.g. Pac-man).

Types of Application Software

      Customized – a program developed to solve a specific problem peculiar to a particular
       company or user.

      Packaged – Pre-written programs for common applications that can be used by a
       number of users with little or no changes.

   Examples:

   Formicrocomputers (Personal Computer) – word processing, spreadsheet analysis and
   database management system.

   WordProcessing (e.g. MS Word) – a text editing program which allows the user to type,
   compose and correct manuscripts without the need to retype when errors or changes on
   such manuscript are made.

   Spreadsheet (e.g. Excel) – allows the user to do “what if problems”. These are powerful;
   business tools for budget reporting, financial projections and cost estimating.

   Database (e.g. Access) – allows the user to create and store information based on his own
   requirements. Also called “electronic filing”.
III. Peopleware – this refers to the people who work with the computer so that it can be used to
find solutions to problems. Also, these refer to persons who used the information generated by the
computer.

      SystemAnalyst – primarily responsible for the analysis, design, development and
       implementation of systems for such applications as payroll, inventory control, accounts
       receivable, and sales analysis.

      DatabaseAdministrator – designs, creates, and maintains the organization’s database.

      DataCommunicationSpecialist – designs and maintains computer networks that link
       computers and terminals for data communications.

      ComputerProgrammers – write programs or perform programming.

              Applicationprogrammers – translate specifications given by system analyst and
               prepare programs for applications.

              SystemProgrammers – develop and maintain system software.

      OperationsPersonnel

              Dataencoder – responsible for transferring data from the source document (e.g.
               Time cards) into a form which the computer can understand.

              Datacontrollers – verify and check whether the data prepared are accurate and
               complete.

              Computeroperators – actually handle the machine; responsible to load and unload
               the programs, mount the data tapes, disks, or cards; prepare to receive the output
               data from printer.

              Librarian – a person who catalog, monitor, and control the distribution of disks,
               tapes, system documentation, and computer-related literature.

      Computer Instructor – conducts the training sessions.

Preventive Maintenance for Computers

      Do not place a PC directly near a heating or cooling source, such as heating vents or air
       conditioners. Both excessive heat and cold can damage a PC

      Do not connect power sources directly into wall outlets but rather connect them first to
       some form of surge protector. Surge protector prevents electrical surges from destroying
       hard drives and erasing data

      Accumulation of dust can seriously hamper a PC’s ability to cool down, and even if you
       never open your computer’s case, duct can still get in through the drive openings.
   Be careful when moving PC from one location to another. Even small jolts can dislodge chips
    and expansion board.

   Keep the root directory organized. Only keep your system’s start up and software
    initialization files in the root directory.

   Do not store data files in the same directory that your store your software. This will
    eliminate the possibility of accidentally erasing or overwriting a software file.

   Keep a set of rescue disk for the operating system.

   Keep a backup copy of original software, either CD of floppy disk. This type of software
    copying perfectly legal.

   Keep meticulous records of default settings, any changes you make in the system’s CMOS
    setup that differ from the default settings, and any maintenance you perform in the system.

   Keep records of any expansion cards you install and the procedures you follow to install
    them.

   Save all documentation that comes with your PC and its components. You may need to refer
    to the documentation if something goes wrong.

   Do not compress your hard drive. Compressed hard drives are more likely to become
    corrupted than those that have not been compressed.

   Keep backup copies of any important data on removable medium. Hard drives can fail and
    having important data on more than one medium can save a lot of stress and headaches.

   Install a virus scan program that automatically scans for viruses when the system boots. Do
    not download any files from the internet unless you are certain that the source is not
    transmitting a virus to you.

More Related Content

What's hot

computer Unit 1
computer Unit 1computer Unit 1
computer Unit 1
Aqeel Rehman
 
It in business lect 2
It in business  lect 2It in business  lect 2
It in business lect 2
Mahii_Raza
 
Sap basis online training
Sap basis online trainingSap basis online training
Sap basis online training
keylabstraining
 
L1 computer architecture lesson 1
L1 computer architecture  lesson 1L1 computer architecture  lesson 1
L1 computer architecture lesson 1
AartiThakur36
 
Computer & it's components
Computer & it's componentsComputer & it's components
Computer & it's components
luckygamer
 
Computer education presentation - ARCH 383
Computer education presentation - ARCH 383Computer education presentation - ARCH 383
Computer education presentation - ARCH 383
LipikaPandey
 
Itc chapter # 4
Itc   chapter # 4Itc   chapter # 4
Itc chapter # 3
Itc   chapter # 3Itc   chapter # 3
Cliff sugerman
Cliff sugermanCliff sugerman
Cliff sugerman
clifford sugerman
 
Basic Concepts Of Information Technology (It)
Basic Concepts Of Information Technology (It)Basic Concepts Of Information Technology (It)
Basic Concepts Of Information Technology (It)
Dr. Dheeraj Mehrotra (National Awardee)
 
Basic computer organization
Basic computer organizationBasic computer organization
Basic computer organization
SAMIR NAIK
 
Copy of business hardware
Copy of business hardwareCopy of business hardware
Copy of business hardware
Jomel Penalba
 
System unit & its components
System unit & its componentsSystem unit & its components
System unit & its components
adpafit
 
01 introduction to information technology
01 introduction to information technology01 introduction to information technology
01 introduction to information technology
Dinesh Gunathilaka
 
Yadu computer internals final-2
Yadu  computer internals final-2Yadu  computer internals final-2
Yadu computer internals final-2
parulata
 
Basic overview of information technology and uses
Basic overview of information technology and usesBasic overview of information technology and uses
Basic overview of information technology and uses
Ebtissam Al-Madi
 
The computer system2007
The computer system2007The computer system2007
The computer system2007
Sue Cooksey
 
The Computer System2007
The Computer System2007The Computer System2007
The Computer System2007
Sue Cooksey
 
Management information system software
Management information system softwareManagement information system software
Management information system software
Online
 
Camd lab manual
Camd lab manualCamd lab manual
Camd lab manual
SmitPatel888407
 

What's hot (20)

computer Unit 1
computer Unit 1computer Unit 1
computer Unit 1
 
It in business lect 2
It in business  lect 2It in business  lect 2
It in business lect 2
 
Sap basis online training
Sap basis online trainingSap basis online training
Sap basis online training
 
L1 computer architecture lesson 1
L1 computer architecture  lesson 1L1 computer architecture  lesson 1
L1 computer architecture lesson 1
 
Computer & it's components
Computer & it's componentsComputer & it's components
Computer & it's components
 
Computer education presentation - ARCH 383
Computer education presentation - ARCH 383Computer education presentation - ARCH 383
Computer education presentation - ARCH 383
 
Itc chapter # 4
Itc   chapter # 4Itc   chapter # 4
Itc chapter # 4
 
Itc chapter # 3
Itc   chapter # 3Itc   chapter # 3
Itc chapter # 3
 
Cliff sugerman
Cliff sugermanCliff sugerman
Cliff sugerman
 
Basic Concepts Of Information Technology (It)
Basic Concepts Of Information Technology (It)Basic Concepts Of Information Technology (It)
Basic Concepts Of Information Technology (It)
 
Basic computer organization
Basic computer organizationBasic computer organization
Basic computer organization
 
Copy of business hardware
Copy of business hardwareCopy of business hardware
Copy of business hardware
 
System unit & its components
System unit & its componentsSystem unit & its components
System unit & its components
 
01 introduction to information technology
01 introduction to information technology01 introduction to information technology
01 introduction to information technology
 
Yadu computer internals final-2
Yadu  computer internals final-2Yadu  computer internals final-2
Yadu computer internals final-2
 
Basic overview of information technology and uses
Basic overview of information technology and usesBasic overview of information technology and uses
Basic overview of information technology and uses
 
The computer system2007
The computer system2007The computer system2007
The computer system2007
 
The Computer System2007
The Computer System2007The Computer System2007
The Computer System2007
 
Management information system software
Management information system softwareManagement information system software
Management information system software
 
Camd lab manual
Camd lab manualCamd lab manual
Camd lab manual
 

Similar to Lecture 2 it fundamentals

Lesson 1 introduction
Lesson 1 introductionLesson 1 introduction
Lesson 1 introduction
Vhe Cagande
 
Zimsec Computer Science Notes
Zimsec Computer Science NotesZimsec Computer Science Notes
Zimsec Computer Science Notes
Doubt Jafali
 
For first periodical test
For first periodical testFor first periodical test
For first periodical test
roselynrequiso
 
What is computer
What is computerWhat is computer
What is computer
roselynrequiso
 
For first periodical test
For first periodical testFor first periodical test
For first periodical test
roselynrequiso
 
What Is Computer
What Is ComputerWhat Is Computer
What Is Computer
roselynrequiso
 
Introduction to pc operations nc ii
Introduction to pc operations nc iiIntroduction to pc operations nc ii
Introduction to pc operations nc ii
NSU-Biliran Campus
 
Introductiontopcoperationsncii 130724004019-phpapp01
Introductiontopcoperationsncii 130724004019-phpapp01Introductiontopcoperationsncii 130724004019-phpapp01
Introductiontopcoperationsncii 130724004019-phpapp01
Lanie Plecerda
 
Introduction to computers MRS. SOWMYA JYOTHI
Introduction to computers MRS. SOWMYA JYOTHIIntroduction to computers MRS. SOWMYA JYOTHI
Introduction to computers MRS. SOWMYA JYOTHI
Sowmya Jyothi
 
MIS Management Information Systems
MIS Management Information SystemsMIS Management Information Systems
MIS Management Information Systems
Thomas Mon
 
Information systems and its components 1
Information systems and its components 1Information systems and its components 1
Information systems and its components 1
Ashish Desai
 
Performing computer operation PCO.pptx
Performing computer operation PCO.pptxPerforming computer operation PCO.pptx
Performing computer operation PCO.pptx
Rhayz Rhayz
 
BASIC COMPUTER COURSE ! BATRA COMPUTER CENTRE
BASIC COMPUTER COURSE ! BATRA COMPUTER CENTREBASIC COMPUTER COURSE ! BATRA COMPUTER CENTRE
BASIC COMPUTER COURSE ! BATRA COMPUTER CENTRE
jatin batra
 
Clifford sugerman
Clifford sugermanClifford sugerman
Clifford sugerman
clifford sugerman
 
Lecture 12-1234865709062834-2
Lecture 12-1234865709062834-2Lecture 12-1234865709062834-2
Lecture 12-1234865709062834-2
Sami Khan
 
Tìm hiểu về Công nghệ thông tin (IT) toàn tập
Tìm hiểu về Công nghệ thông tin (IT) toàn tậpTìm hiểu về Công nghệ thông tin (IT) toàn tập
Tìm hiểu về Công nghệ thông tin (IT) toàn tập
INFOCHIEF institute
 
Lecture 1 2
Lecture 1 2Lecture 1 2
Lecture 1 2
guest8d58d3
 
Basics of Operating System
Basics of Operating SystemBasics of Operating System
Basics of Operating System
Soumit Ghosh
 
Concepts and components of information system
Concepts  and components of information systemConcepts  and components of information system
Concepts and components of information system
Rohit Kumar
 
1. Components of Information Systems.pdf
1. Components of Information Systems.pdf1. Components of Information Systems.pdf
1. Components of Information Systems.pdf
calf_ville86
 

Similar to Lecture 2 it fundamentals (20)

Lesson 1 introduction
Lesson 1 introductionLesson 1 introduction
Lesson 1 introduction
 
Zimsec Computer Science Notes
Zimsec Computer Science NotesZimsec Computer Science Notes
Zimsec Computer Science Notes
 
For first periodical test
For first periodical testFor first periodical test
For first periodical test
 
What is computer
What is computerWhat is computer
What is computer
 
For first periodical test
For first periodical testFor first periodical test
For first periodical test
 
What Is Computer
What Is ComputerWhat Is Computer
What Is Computer
 
Introduction to pc operations nc ii
Introduction to pc operations nc iiIntroduction to pc operations nc ii
Introduction to pc operations nc ii
 
Introductiontopcoperationsncii 130724004019-phpapp01
Introductiontopcoperationsncii 130724004019-phpapp01Introductiontopcoperationsncii 130724004019-phpapp01
Introductiontopcoperationsncii 130724004019-phpapp01
 
Introduction to computers MRS. SOWMYA JYOTHI
Introduction to computers MRS. SOWMYA JYOTHIIntroduction to computers MRS. SOWMYA JYOTHI
Introduction to computers MRS. SOWMYA JYOTHI
 
MIS Management Information Systems
MIS Management Information SystemsMIS Management Information Systems
MIS Management Information Systems
 
Information systems and its components 1
Information systems and its components 1Information systems and its components 1
Information systems and its components 1
 
Performing computer operation PCO.pptx
Performing computer operation PCO.pptxPerforming computer operation PCO.pptx
Performing computer operation PCO.pptx
 
BASIC COMPUTER COURSE ! BATRA COMPUTER CENTRE
BASIC COMPUTER COURSE ! BATRA COMPUTER CENTREBASIC COMPUTER COURSE ! BATRA COMPUTER CENTRE
BASIC COMPUTER COURSE ! BATRA COMPUTER CENTRE
 
Clifford sugerman
Clifford sugermanClifford sugerman
Clifford sugerman
 
Lecture 12-1234865709062834-2
Lecture 12-1234865709062834-2Lecture 12-1234865709062834-2
Lecture 12-1234865709062834-2
 
Tìm hiểu về Công nghệ thông tin (IT) toàn tập
Tìm hiểu về Công nghệ thông tin (IT) toàn tậpTìm hiểu về Công nghệ thông tin (IT) toàn tập
Tìm hiểu về Công nghệ thông tin (IT) toàn tập
 
Lecture 1 2
Lecture 1 2Lecture 1 2
Lecture 1 2
 
Basics of Operating System
Basics of Operating SystemBasics of Operating System
Basics of Operating System
 
Concepts and components of information system
Concepts  and components of information systemConcepts  and components of information system
Concepts and components of information system
 
1. Components of Information Systems.pdf
1. Components of Information Systems.pdf1. Components of Information Systems.pdf
1. Components of Information Systems.pdf
 

More from Tricia Andrea Lorena Pongyan

Principles of design and color theory
Principles of design and color theoryPrinciples of design and color theory
Principles of design and color theory
Tricia Andrea Lorena Pongyan
 
Nstp 2
Nstp 2Nstp 2
Reviewer in com graphics
Reviewer in com graphicsReviewer in com graphics
Reviewer in com graphics
Tricia Andrea Lorena Pongyan
 
Nstp 2
Nstp 2Nstp 2
Study and thinking skills
Study and thinking skillsStudy and thinking skills
Study and thinking skills
Tricia Andrea Lorena Pongyan
 
Lecture 1 fundamentals of computer
Lecture 1   fundamentals of computerLecture 1   fundamentals of computer
Lecture 1 fundamentals of computer
Tricia Andrea Lorena Pongyan
 

More from Tricia Andrea Lorena Pongyan (9)

History of arts and design
History of arts and designHistory of arts and design
History of arts and design
 
Principles of design and color theory
Principles of design and color theoryPrinciples of design and color theory
Principles of design and color theory
 
English
EnglishEnglish
English
 
Principles of design and color theory
Principles of design and color theoryPrinciples of design and color theory
Principles of design and color theory
 
Nstp 2
Nstp 2Nstp 2
Nstp 2
 
Reviewer in com graphics
Reviewer in com graphicsReviewer in com graphics
Reviewer in com graphics
 
Nstp 2
Nstp 2Nstp 2
Nstp 2
 
Study and thinking skills
Study and thinking skillsStudy and thinking skills
Study and thinking skills
 
Lecture 1 fundamentals of computer
Lecture 1   fundamentals of computerLecture 1   fundamentals of computer
Lecture 1 fundamentals of computer
 

Recently uploaded

Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
Zilliz
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 

Recently uploaded (20)

Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 

Lecture 2 it fundamentals

  • 1. LECTURE 2 – IT FUNDAMENTALS Electronic Data Processing  ElectronicDataProcessing (EDP) – the processing of data through the use of computers  DataProcessing– the manipulating of data into a more useful form. It is the modern name for paperwork and involves the collecting, processing, and distributing of facts and figures to achieve a desired result. Data Processing Cycle  Input – in this stage the initial data, or input data, are prepared in some convenient form for processing.  Processing – in this step the input data are charged, and usually combined with other information, to produce data into more useful form.  Output – here the results of the preceding processing steps are collected. Classification of Data Processing  BusinessDataProcessing – characterized by the need to establish, retain, and process files of data for producing useful information. Generally, it involves a large volume of input data, limited arithmetical operations, and a relatively large volume of output.  Scientific Data Processing – involves a limited volume of input and many logical or arithmetic calculations. Unlike business problems, most of the scientific problems are non- repetitive, requiring a “one-time” solution. Data Processing Operations  Recording – refers to the transfer on data into some form or document. It relates to the documentation of intermediate figures and facts resulting from calculations.  Verifying – refers to the careful checking of the recorded data for any errors.  Duplicating – refers to the reproduction of the data into many forms or document.  Classifying – refers to identifying and arranging items with likes characteristics into groups or classes.  Sorting – refers to arranging or rearranging data in a predetermined sequence to facilitate processing. Sorting is done in alphabetic or a numeric order.  Calculating – refers to arithmetic manipulation of the data.
  • 2. SummarizingorReporting – it is here where a collection of data is condensed and certain conclusions from the data are represented in a meaningful format that is clear, concise and effective.  Merging – this operation takes two or more sets of data, all sets having been sorted by the same key, and puts them together to form a single sorted set of data.  Storing – refers to placing similar data into files for future reference.  Retrieving – refers to recovering stored data and/or information when needed.  Feedback – refers to the comparison of the output(s) and the goal set in advance, any discrepancy is analyzed, corrected, and fed back to proper stage in the processing operation. Methods of Processing Data  BatchProcessing – a technique in which data to be processed are collected into groups to permit convenient, efficient, and serial processing.  On-lineProcessing – a technique that uses devices directly connected to the CPU either for entry or inquiry purposes.  Real-timeProcessing – a method which has the capability of a fast response to obtain data form an activity or a physical process.  DistributedProcessing – it generally consists of remote terminals linked to a large central computer system to help the user conduct inquiries about accounts, process jobs, or other data processing operations. Elements of an EDP System I. Hardware – the physical equipment that make up a computer system. It includes its peripheral s and components. Examples: Monitor, CPU, Keyboard, Mouse, Speaker CentralProcessingUnit (CPU) – heart and brain of the computer system. It is where data processing takes place. Parts of CPU  MainMemory (Primary Storage) – data and instructions are stored here. Sometimes known as the ‘internal’ memory of the computer.  ArithmeticLogicUnit (ALU) – accomplishes the arithmetical and logical operations.  Accumulator – a kind of holding area which retains answers that are produce by adders.
  • 3. Adders – add the bits coming from the memory and produces a 1 or 0 depending upon the components of the received bits (contraction for binary digit).  Control Unit – supervises all the activities based on a set of instructions programs stored in the main memory. It selects, interprets and executes the instructions.  Registers – functions as temporary storage devices during process of computation. Input/Output Devices  InputDevices – physical equipment which reads or translates data consisting of alphabets, numbers, or symbols into a form that can be understand by the computer. Example of Input Devices: keyboard, mouse, scanner, joystick, graphics pad, bar code reader  OutputDevices – physical equipments which translate the outcome of the computations and related activities carried out in the CPU. Its objective is to convert data and information onto a form, such as a printed report or visual display that can be understood by humans. Example of Output Devices: monitor, printer, plotter, desktop speaker Types of Computer Memory  InternalMemory – contained in the silicon chip and can hold instructions and data which the computer is currently working on or information which the CPU needs to work very rapidly because the speed of the CPU is very high and acquires information to be readily available.  RandomAccessMemory (RAM) – stores instructions which later can be erased or changed. All information stored here are lost and erased when computer is turned off.  ReadOnlyMemory(ROM) – contains permanently stored instructions that a computer is required to keep able to perform its basic routine operations. Part of CPU.  ExternalMemory – uses tapes and disk to store information. External memory is physically separated from CPU. Examples: diskette, compact disk, tape backup, hard disk II. Software – the tangible element composed of programs that instruct the computer what to do. Examples: DOS Operating System, Windows 98, MS Office, Cartoon Manila, etc. Types of Software
  • 4. I. SystemsSoftware – the programs or instructions which direct the internal operations of the computer. Also called operating software and are normally contained in a disk pack or floppy diskette or already embedded on a chip. Classification of System Software A. OperatingSystem – most important type. It is a group of related programs that supervises or monitors the execution of an application program and provides services such as language translation, input/output control, and job scheduling. B. LanguageTranslators – programs which convert human readable form into a series of binary pattern of zeroes and ones.  LowLevelLanguage – Machine Language, Assembly Language difficult to learn, coding was tedious, and difficult to correct and find error in programs.  HighLevelLanguage – COBOL, BASIC, FORTRAN, RPG or PASCAL C. UtilityorServicePrograms – use for specialized data process problems. II. ApplicationSoftware – Provides a solution to a specific business, scientific, engineering or research problems, or which perform specific operations or applications. Used to predict weather conditions, to keep track of an organization’s inventories, can assist an individual in balancing his checkbook, or game program for entertainment (e.g. Pac-man). Types of Application Software  Customized – a program developed to solve a specific problem peculiar to a particular company or user.  Packaged – Pre-written programs for common applications that can be used by a number of users with little or no changes. Examples: Formicrocomputers (Personal Computer) – word processing, spreadsheet analysis and database management system. WordProcessing (e.g. MS Word) – a text editing program which allows the user to type, compose and correct manuscripts without the need to retype when errors or changes on such manuscript are made. Spreadsheet (e.g. Excel) – allows the user to do “what if problems”. These are powerful; business tools for budget reporting, financial projections and cost estimating. Database (e.g. Access) – allows the user to create and store information based on his own requirements. Also called “electronic filing”.
  • 5. III. Peopleware – this refers to the people who work with the computer so that it can be used to find solutions to problems. Also, these refer to persons who used the information generated by the computer.  SystemAnalyst – primarily responsible for the analysis, design, development and implementation of systems for such applications as payroll, inventory control, accounts receivable, and sales analysis.  DatabaseAdministrator – designs, creates, and maintains the organization’s database.  DataCommunicationSpecialist – designs and maintains computer networks that link computers and terminals for data communications.  ComputerProgrammers – write programs or perform programming.  Applicationprogrammers – translate specifications given by system analyst and prepare programs for applications.  SystemProgrammers – develop and maintain system software.  OperationsPersonnel  Dataencoder – responsible for transferring data from the source document (e.g. Time cards) into a form which the computer can understand.  Datacontrollers – verify and check whether the data prepared are accurate and complete.  Computeroperators – actually handle the machine; responsible to load and unload the programs, mount the data tapes, disks, or cards; prepare to receive the output data from printer.  Librarian – a person who catalog, monitor, and control the distribution of disks, tapes, system documentation, and computer-related literature.  Computer Instructor – conducts the training sessions. Preventive Maintenance for Computers  Do not place a PC directly near a heating or cooling source, such as heating vents or air conditioners. Both excessive heat and cold can damage a PC  Do not connect power sources directly into wall outlets but rather connect them first to some form of surge protector. Surge protector prevents electrical surges from destroying hard drives and erasing data  Accumulation of dust can seriously hamper a PC’s ability to cool down, and even if you never open your computer’s case, duct can still get in through the drive openings.
  • 6. Be careful when moving PC from one location to another. Even small jolts can dislodge chips and expansion board.  Keep the root directory organized. Only keep your system’s start up and software initialization files in the root directory.  Do not store data files in the same directory that your store your software. This will eliminate the possibility of accidentally erasing or overwriting a software file.  Keep a set of rescue disk for the operating system.  Keep a backup copy of original software, either CD of floppy disk. This type of software copying perfectly legal.  Keep meticulous records of default settings, any changes you make in the system’s CMOS setup that differ from the default settings, and any maintenance you perform in the system.  Keep records of any expansion cards you install and the procedures you follow to install them.  Save all documentation that comes with your PC and its components. You may need to refer to the documentation if something goes wrong.  Do not compress your hard drive. Compressed hard drives are more likely to become corrupted than those that have not been compressed.  Keep backup copies of any important data on removable medium. Hard drives can fail and having important data on more than one medium can save a lot of stress and headaches.  Install a virus scan program that automatically scans for viruses when the system boots. Do not download any files from the internet unless you are certain that the source is not transmitting a virus to you.